S-box Construction on AES Algorithm using Affine Matrix Modification to Improve Image Encryption Security

Alamsyah Alamsyah(1), Budi Prasetiyo(2), Yusuf Muhammad(3),


(1) Department of Computer Science, Universitas Negeri Semarang, Indonesia
(2) Department of Computer Science, Universitas Negeri Semarang, Indonesia
(3) Department of Computer Science, Universitas Negeri Semarang, Indonesia

Abstract

Abstract.

Purpose: In this study, the AES algorithm was improved by constructing the S-box using a modified affine matrix and implementing it so that there was an increase in security in image encryption.

Methods: The method used in this study starts from selecting the best irreducible polynomial based on previous studies. The irreducible polynomial chosen is . With this irreducible polynomial, an inverse multiplicative matrix is formed. The formed inverse mutiplicative matrix is implemented in the affine transformation process using the best 3 affine matrices based on previous research and 8-bit additional constants using AES S-box. This formulation produces 3 different S-boxes, i.e., S-box1, S-box2, and S-box3. Finally, the resulting S-boxes are implemented to carry out the image encryption process and are tested for their security level.

Result: The test results show an increase in image encryption security compared to previous studies. The increase in security occurred at the entropy value of 7.9994 and the NPCR value of 99.6288%.

Novelty: The novelty of this paper is the improvement of the S-box construction which is implemented in image encryption resulting in increased security in image encryption.

Keywords

AES; S-box; Affine matrix; Affine transformation; Image encryption

Full Text:

PDF

References

J. Daemen and V. Rijmen, The Design of Rijndael. Springer-Verlag Berlin Heidelberg New York, 2002. doi: 10.1007/978-3-662-04722-4.

J. Daemen and V. Rijmen, “New criteria for linear maps in AES-like ciphers,”. November 2007, 2008, doi: 10.1007/s12095-008-0003-x.

W. Stallings, Cryptography and Network Security: Principles and Practice, Seventh Ed. Pearson, 2017.

C. Paar and J. Pelzl;, Understanding Cryptography, 1st ed., vol. 1. Springer-Verlag Berlin Heidelberg, 2010. doi: 10.1017/CBO9781107415324.004.

Alamsyah, A. Bejo, and T. B. Adji, “The replacement of irreducible polynomial and affine mapping for the construction of a strong S-box,” Nonlinear Dyn., vol. 93, no. 4, pp. 2105–2118, 2018, doi: 10.1007/s11071-018-4310-2.

Alamsyah, “Improving the Quality of AES S-box by Modifications Irreducible Polynomial and Affine Matrix,” in 2020 5th International Conference on Informatics and Computing, ICIC 2020, 2020. doi: 10.1109/ICIC50835.2020.9288567.

Alamsyah, “A Novel Construction of Perfect Strict Avalanche Criterion S-box using Simple Irreducible Polynomials,” Sci. J. Informatics, vol. 7, no. 1, pp. 10–22, 2020, doi: 10.15294/sji.v7i1.24006.

J. Zheng and Q. Zeng, “An image encryption algorithm using a dynamic S-box and chaotic maps,” Appl. Intell., vol. 52, no. 13, pp. 15703–15717, 2022, doi: 10.1007/s10489-022-03174-3.

A. Mahboob, M. Asif, M. Nadeem, A. Saleem, S. M. Eldin, and I. Siddique, “A Cryptographic Scheme for Construction of Substitution Boxes using Quantic Fractional Transformation,” IEEE Access, vol. PP, p. 1, 2022, doi: 10.1109/ACCESS.2022.3230141.

A. Alkhayyat, M. Ahmad, N. Tsafack, M. Tanveer, D. Jiang, and A. A. Abd El-Latif, “A Novel 4D Hyperchaotic System Assisted Josephus Permutation for Secure Substitution-Box Generation,” J. Signal Process. Syst., vol. 94, no. 3, pp. 315–328, 2022, doi: 10.1007/s11265-022-01744-9.

H. Zhu, X. Tong, Z. Wang, and J. Ma, “A novel method of dynamic S-box design based on combined chaotic map and fitness function,” Multimed. Tools Appl., vol. 79, no. 17–18, pp. 12329–12347, 2020, doi: 10.1007/s11042-019-08478-0.

A. H. Zahid et al., “Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications,” IEEE Access, vol. 9, pp. 98460–98475, 2021, doi: 10.1109/ACCESS.2021.3095618.

R. Hoseini, S. Behnia, S. Sarmady, and S. Fathizadeh, “Construction of dynamical S-boxes based on image encryption approach,” Soft Comput., vol. 26, no. 24, pp. 13985–13997, 2022, doi: 10.1007/s00500-022-07443-8.

S. Ibrahim and A. M. Abbas, “A Novel Optimization Method for Constructing Cryptographically Strong Dynamic S-Boxes,” IEEE Access, vol. 8, pp. 225004–225017, 2020, doi: 10.1109/ACCESS.2020.3045260.

W. J. Jun and T. S. Fun, “A New Image Encryption Algorithm Based on Single S-Box and Dynamic Encryption Step,” IEEE Access, vol. 9, pp. 120596–120612, 2021, doi: 10.1109/ACCESS.2021.3108789.

X. Wang and J. Yang, “A novel image encryption scheme of dynamic S-boxes and random blocks based on spatiotemporal chaotic system,” Optik (Stuttg)., vol. 217, no. May, p. 164884, 2020, doi: 10.1016/j.ijleo.2020.164884.

A. Shafique and F. Ahmed, “Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain,” Wirel. Pers. Commun., vol. 115, no. 3, pp. 2243–2268, 2020, doi: 10.1007/s11277-020-07680-w.

R. H. Sani, S. Behnia, and J. Ziaei, “Construction of S-box based on chaotic piecewise map: Watermark application,” Multimed. Tools Appl., 2022, doi: 10.1007/s11042-022-13278-0.

R. H. Sani, S. Behnia, and A. Akhshani, “Creation of S-box based on a hierarchy of Julia sets: image encryption approach,” Multidimens. Syst. Signal Process., vol. 33, no. 1, pp. 39–62, 2022, doi: 10.1007/s11045-021-00786-9.

Y. Su, X. Tong, M. Zhang, and Z. Wang, “A new S-box three-layer optimization method and its application,” Nonlinear Dyn., vol. 9, 2022, doi: 10.1007/s11071-022-07956-9.

C. Yang, I. Taralova, S. El Assad, and J. J. Loiseau, “Image encryption based on fractional chaotic pseudo-random number generator and DNA encryption method,” Nonlinear Dyn., vol. 109, no. 3, pp. 2103–2127, 2022, doi: 10.1007/s11071-022-07534-z.

F. Masood et al., “A new color image encryption technique using DNA computing and Chaos-based substitution box,” Soft Comput., vol. 26, no. 16, pp. 7461–7477, 2022, doi: 10.1007/s00500-021-06459-w.

M. Tanveer et al., “Multi-Images Encryption Scheme Based on 3D Chaotic Map and Substitution Box,” IEEE Access, vol. 9, pp. 73924–73937, 2021, doi: 10.1109/ACCESS.2021.3081362.

Alamsyah, M. A. Muslim, and B. Prasetiyo, “Data hiding security using bit matching-based steganography and cryptography without change the stego image quality,” J. Theor. Appl. Inf. Technol., vol. 82, no. 1, pp. 106–112, 2015.

X. Chai, Z. Gan, K. Yuan, Y. Chen, and X. Liu, “A novel image encryption scheme based on DNA sequence operations and chaotic systems,” Neural Comput. Appl., vol. 31, no. 1, pp. 219–237, 2019, doi: 10.1007/s00521-017-2993-9.

Refbacks

  • There are currently no refbacks.




Scientific Journal of Informatics (SJI)
p-ISSN 2407-7658 | e-ISSN 2460-0040
Published By Department of Computer Science Universitas Negeri Semarang
Website: https://journal.unnes.ac.id/nju/index.php/sji
Email: [email protected]

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.