Lightweight Substitution Box Using Elliptic Curve Cryptography for Image Encryption Applications

Khan, N.A. and Awang, A. (2023) Lightweight Substitution Box Using Elliptic Curve Cryptography for Image Encryption Applications. In: UNSPECIFIED.

Full text not available from this repository.
Official URL: https://www.scopus.com/inward/record.uri?eid=2-s2....

Abstract

This article proposes a Substitution box (S-box) in the light of Elliptic Curve Cryptography (ECC) for efficient image encryption. Conventional S-box design is accomplished by various methods having diverse benefits and drawbacks. Nonlinear equations and chaos theory are the most eminent techniques for the S-box design. One of the techniques used for the S-box design and user authentication is the ECC. There are various ECC-based S-boxes in the literature. However, majority of them are designed by adhering to intricate schemes generating a computational burden for multimedia devices. It is observed that a comparative degree of security can be obtained by parameter selection rather than following enigmatic and hybrid cryptographic schemes. In fewer computations, the proposed S-box has achieved an equivalent level of security. When compared to other ECC-based S-boxes, the proposed lightweight S-box exhibits a similar level of nonlinearity as well. Finally, the proposed S-box is used in practice to encrypt images, and the statistical analysis of the encrypted images likewise produces excellent results. A comparison between various S-box encrypted images and the proposed S-box encrypted images has been carried out for further evaluation. Together all these features make the proposed lightweight S-box a much better option in the present resource-constrained Internet of Things (IoT) era. © 2023 IEEE.

Item Type: Conference or Workshop Item (UNSPECIFIED)
Additional Information: cited By 0; Conference of 2023 IEEE Global Communications Conference, GLOBECOM 2023 ; Conference Date: 4 December 2023 Through 8 December 2023; Conference Code:197692
Uncontrolled Keywords: Authentication; Chaos theory; Computation theory; Geometry; Image processing; Nonlinear equations; Public key cryptography, Box designs; Computational burden; Curve cryptography; Elliptic curve; Elliptic curve cryptography; Encrypted images; Images encryptions; S-boxes; Substitution box; User authentication, Internet of things
Depositing User: Mr Ahmad Suhairi UTP
Date Deposited: 04 Jun 2024 14:11
Last Modified: 04 Jun 2024 14:11
URI: https://khub.utp.edu.my/scholars/id/eprint/18928

Actions (login required)

View Item
View Item