| Literature DB >> 32029798 |
Ahmed A Abd El-Latif1,2,3, Bassem Abd-El-Atty4, Mohamed Amin4, Abdullah M Iliyasu5,6,7.
Abstract
Designing efficient and secure cryptosystems has been a preoccupation for many scientists and engineers for a long time wherein they use chaotic systems to design new cryptosystems. While one dimensional (1-D) chaotic maps possess powerful properties compared to higher dimension ones, they are vulnerable to various attacks due to their small key space, chaotic discontinuous ranges, and degradation in chaotic dynamical behaviours. Moreover, when simulated on a computer, every such chaotic system produces a periodic cycle. Meanwhile, quantum random walks exhibit the potential for deployment in efficient cryptosystem design, which makes it an excellent solution for this problem. In this context, we present a new method for constructing substitution boxes (S-boxes) based on cascaded quantum-inspired quantum walks and chaos inducement. The performance of the proposed S-box scheme is investigated via established S-box evaluation criterion and outcomes suggest that the constructed S-box has significant qualities for viable applications information security. Further, we present an efficient scheme for pseudo-random numbers generation (PRNG) whose sustainability over long periods remedies the periodicity problem associated with traditional cryptographic applications. Furthermore, by combining the two mechanisms, an atypical image encryption scheme is introduced. Simulation results and analysis validate that the proposed image encryption algorithm will offer gains in many cryptographic applications.Entities:
Year: 2020 PMID: 32029798 PMCID: PMC7005306 DOI: 10.1038/s41598-020-58636-w
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
16 × 16 S-box constructed via proposed scheme.
| 205 | 51 | 93 | 103 | 62 | 198 | 199 | 224 | 149 | 114 | 75 | 48 | 132 | 102 | 142 | 125 |
| 204 | 173 | 253 | 23 | 180 | 65 | 245 | 50 | 208 | 118 | 117 | 121 | 156 | 38 | 152 | 138 |
| 193 | 128 | 243 | 127 | 105 | 96 | 4 | 154 | 76 | 251 | 196 | 169 | 95 | 120 | 190 | 98 |
| 211 | 179 | 175 | 188 | 81 | 219 | 41 | 84 | 218 | 195 | 200 | 153 | 248 | 209 | 36 | 207 |
| 30 | 157 | 183 | 67 | 143 | 194 | 135 | 133 | 64 | 236 | 3 | 33 | 254 | 86 | 49 | 79 |
| 227 | 240 | 249 | 104 | 163 | 250 | 115 | 78 | 74 | 68 | 178 | 17 | 162 | 159 | 12 | 139 |
| 18 | 11 | 164 | 191 | 61 | 235 | 87 | 181 | 222 | 113 | 108 | 226 | 106 | 221 | 37 | 241 |
| 29 | 177 | 174 | 2 | 6 | 202 | 99 | 92 | 184 | 158 | 172 | 171 | 0 | 242 | 215 | 28 |
| 40 | 5 | 189 | 214 | 206 | 24 | 165 | 110 | 26 | 155 | 246 | 14 | 111 | 230 | 237 | 52 |
| 69 | 182 | 59 | 122 | 197 | 231 | 116 | 234 | 56 | 35 | 167 | 13 | 101 | 126 | 27 | 210 |
| 42 | 119 | 91 | 60 | 147 | 216 | 166 | 89 | 203 | 112 | 53 | 55 | 71 | 124 | 39 | 130 |
| 85 | 31 | 72 | 19 | 45 | 185 | 168 | 150 | 186 | 90 | 22 | 212 | 1 | 15 | 107 | 141 |
| 140 | 144 | 77 | 151 | 131 | 232 | 238 | 247 | 136 | 217 | 233 | 58 | 21 | 145 | 88 | 225 |
| 129 | 228 | 201 | 146 | 255 | 46 | 32 | 7 | 44 | 82 | 70 | 20 | 97 | 43 | 83 | 134 |
| 187 | 10 | 239 | 34 | 47 | 137 | 109 | 229 | 252 | 213 | 161 | 94 | 123 | 170 | 160 | 63 |
| 80 | 220 | 57 | 148 | 9 | 16 | 54 | 25 | 100 | 244 | 73 | 66 | 8 | 176 | 192 | 223 |
Evaluation of the performance of proposed S-box construction alongside other methods.
| S-box scheme | BIC-NL | Nonlinearity | BIC-SAC | SAC | LP | DP |
|---|---|---|---|---|---|---|
| Proposed | 103.93 | 106 | 0.5023 | 0.4958 | 0.1250 | 0.0313 |
| EL-Latif | 103.70 | 106.25 | 0.5065 | 0.5037 | 0.1016 | 0.0391 |
| Belazi | 103.78 | 105.50 | 0.4970 | 0.5000 | 0.1250 | 0.0468 |
| Khan | 103.07 | 103.25 | 0.4864 | 0.5151 | 0.1563 | 0.17187 |
| Wang | 103.36 | 104.87 | 0.5017 | 0.4918 | 0.1328 | 0.0391 |
| Tang | 103.00 | 105.00 | 0.5044 | 0.4971 | 0.1328 | 0.0391 |
| Özkaynak | 103.14 | 104.62 | 0.4942 | 0.4982 | 0.1406 | 0.0391 |
| Belazi | 103.80 | 105.25 | 0.4996 | 0.4956 | 0.1562 | 0.0391 |
| Hussain | 104.29 | 103.25 | 0.5021 | 0.5056 | 0.1289 | 0.04609 |
Figure 1Outline of the proposed PRNG sequence generation mechanism.
Results for NIST SP 800-22 tests.
| Test-Name | P-Value | Result |
|---|---|---|
| Overlapping templates | 0.215108 | Passed |
| No overlapping templates | 0.079004 | Passed |
| DFT | 0.304052 | Passed |
| Frequency | 0.291883 | Passed |
| Block-frequency | 0.693686 | Passed |
| Universal | 0.612656 | Passed |
| Rank | 0.058737 | Passed |
| Long runs of ones | 0.137157 | Passed |
| Runs | 0.384907 | Passed |
| Serial 1 | 0.914512 | Passed |
| Serial 2 | 0.971079 | Passed |
| Random excursions variant x = 1 | 0.506620 | Passed |
| Random excursions x = 1 | 0.125622 | Passed |
| Linear complexity | 0.107102 | Passed |
| Cumulative sums (reverse) | 0.065686 | Passed |
| Cumulative sums (forward) | 0.520534 | Passed |
| Approximate entropy | 0.012095 | Passed |
Figure 2General framework for the proposed image encryption technique.
Figure 3Test images (a–f), their encrypted (in (g–l)), and decrypted (in (m–r)) versions.
Correlation coefficients for adjacent pixel pairing for greyscale images (in Fig. 3(a–c)).
| Image | Direction | ||
|---|---|---|---|
| Horizontal | Vertical | Diagonal | |
| Original (Bridge) | 0.9160 | 0.9416 | 0.8845 |
| Encrypted (Bridge) | 0.0002 | 0.0026 | −0.0003 |
| Original (Boat) | 0.9436 | 0.9246 | 0.8811 |
| Encrypted (Boat) | −0.0034 | −0.0043 | −0.0012 |
| Original (Baboon) | 0.8304 | 0.8776 | 0.7963 |
| Encrypted (Baboon) | −0.0050 | 0.0001 | 0.0006 |
Correlation coefficients for adjacent pixel pairing for colour images (in Fig. 3(d–f)).
| Image | Direction | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Horizontal | Vertical | Diagonal | |||||||
| R | G | B | R | G | B | R | G | B | |
| Original (Sailboat) | 0.9552 | 0.9555 | 0.9644 | 0.9582 | 0.9567 | 0.9606 | 0.9311 | 0.9249 | 0.9373 |
| Encrypted (Sailboat) | −0.0003 | −0.0082 | −0.0003 | −0.0022 | −0.0020 | 0.0047 | 0.0013 | 0.0004 | 0.0010 |
| Original (Tree) | 0.9392 | 0.9485 | 0.9438 | 0.9584 | 0.9696 | 0.9615 | 0.9221 | 0.9339 | 0.9308 |
| Encrypted (Tree) | −0.0029 | −0.0048 | −0.0023 | −0.0013 | −0.0012 | −0.0050 | −0.0007 | 0.0012 | −0.0061 |
| Original (House) | 0.9357 | 0.9636 | 0.9764 | 0.9678 | 0.9812 | 0.9824 | 0.9107 | 0.9490 | 0.9641 |
| Encrypted (House) | 0.0027 | −0.0081 | −0.0009 | −0.0023 | 0.0005 | 0.0030 | −0.0040 | 0.0007 | −0.0029 |
Figure 4Correlation distribution for neighbouring pixel pairs along horizontal, vertical and diagonal directions for Bridge image in Fig. 3(a).
Figure 5Correlation distribution for neighbouring pixel pairs along horizontal, vertical and diagonal directions for red channel of Sailboat image in Fig. 3(d).
Figure 6Correlation distribution for neighbouring pixel pairs along horizontal, vertical and diagonal directions for green channel of Sailboat image in Fig. 3(d).
Figure 7Correlation distribution for neighbouring pixel pairs along horizontal, vertical and diagonal directions for blue channel of Sailboat image in Fig. 3(d).
NPCR test results.
| Image | NPCR (%) |
|---|---|
| Bridge | 99.63837 |
| Boat | 99.59717 |
| Baboon | 99.61395 |
| Sailboat | 99.61853 |
| Tree | 99.61294 |
| House | 99.60124 |
Figure 8Histograms of original and encrypted greyscale images (in Fig. 3(a–c)).
Figure 9Histograms of original and encrypted R, G, and B channels of the Sailboat image (in Fig. 3(d)).
Information entropy of original and encrypted images.
| Image | Original | Encrypted |
|---|---|---|
| Bridge | 7.66847 | 7.99710 |
| Boat | 7.15866 | 7.99734 |
| Baboon | 7.22794 | 7.99729 |
| Sailboat | 7.35408 | 7.99727 |
| Tree | 7.18159 | 7.99700 |
| House | 6.40067 | 7.99704 |
Description of key space of our presented mechanism alongside those from similar methods.
| Algorithm | Description | Key space |
|---|---|---|
| Proposed | Cascaded quantum walks as a quantum-inspired random generator and chaotic dynamics induction with its cryptographic applications | Key parameters ( |
| Yang | PRNG mechanism based on running 1-Dimensional 1-Particle quantum walks on a circle | Key parameters ( |
| Yang | Image encryption algorithm based on running 1-Dimensional 2-Particle quantum walks on a circle | The key parameters ( |
| Yang | Quantum hash function based on controlled 1-Dimensional 2-Particle quantum walks on a circle with its application to image encryption | Key parameters ( |
| Abd-El-Atty | Quantum greyscale image encryption algorithm based on controlled 1-Dimensional 1-Particle quantum walks on a circle | Key parameters ( |
Figure 10Decrypted Bridge image (in Fig. 3(g)) for several S-box keys.
Figure 11Decrypted Sailboat image for several PRNG keys.
Figure 12Probability distribution for running two-walker quantum walks on a circle with 11 vertices for 51 steps, where the initial coin particles are and . Here, it is deducible that for a circle with only odd v nodes, the probability has nonzero in any position if the number of steps t is greater than the number of nodes v.