Statistical analysis of S-box in image encryption applications based on majority logic criterion

The S-box is used in various block ciphers and the complexity of encryption essentially depends on the strength of S-box. The strength of an S-box can be measured by analyzing its statistical and algebraic properties. The S-box is the only non-linear component in various block ciphers capable of creating confusion. Many S-boxes have been proposed with similar algebraic and statistical properties. Therefore, it is sometimes difficult to choose an S-box for a particular application. The performances of these S-boxes vary and depend on the nature of data and their application. In this paper, we propose a criterion to analyze the prevailing S-boxes and study their strengths and weaknesses in order to determine their suitability in image encryption applications. The proposed criterion uses the results from correlation analysis, entropy analysis, contrast analysis, homogeneity analysis, energy analysis, and mean of absolute deviation analysis. These analyses are applied to advanced encryption standard (AES), affine-power-affine (APA), gray, Lui J, residue prime, S 8 AES, SKIPJACK, and Xyi Sboxes. The results of these analyses are further examined and a majority logic criterion is used to determine the appropriateness of an S-box to image encryption applications.

[1]  Bo Zhang,et al.  Unsupervised image segmentation using local homogeneity analysis , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[2]  Eltayeb Salih Abuelyman,et al.  An Optimized Implementation of the S-Box using Residues of Prime Numbers , 2008 .

[3]  A. A. Zaidan,et al.  Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study , 2010 .

[4]  Ling-guo Cui,et al.  A NEW S-BOX STRUCTURE NAMED AFFINE-POWER-AFFINE , 2007 .

[5]  An AES S-box to Increase Complexity , 2005 .

[6]  Chin-Tu Chen,et al.  Split-and-merge image segmentation based on localized feature analysis and statistical tests , 1991, CVGIP Graph. Model. Image Process..

[7]  K. Ramar,et al.  Public Key Cryptosystems Based on Chaotic-Chebyshev Polynomials , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[8]  Minh-Triet Tran,et al.  Gray S-Box for Advanced Encryption Standard , 2008, 2008 International Conference on Computational Intelligence and Security.

[9]  Iqtadar Hussain,et al.  A New Algorithm to Construct Secure Keys for AES , 2010 .

[10]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[11]  Xun Yi,et al.  A Method for Obtaining Cryptogra hically Strong 8x8 S-boxes , 1997 .

[12]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[13]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[14]  E. S. Gadelmawla,et al.  A vision system for surface roughness characterization using the gray level co-occurrence matrix , 2004 .

[15]  Rasul Enayatifar,et al.  Image encryption via logistic map function and heap tree , 2011 .