The proposed algorithm called Image encryption based on chaos, elliptic curve, dynamic S-boxes and variable permutations (IECC) is a symmetric cryptosystem for encrypting bmp images, in this case 512 × 512 pixelfigures are used for testing. This algorithm consists of 15 rounds with a different S-box for each round and each set of S-boxes is different for each image encryption. Based on the above, a permutation is applied beforethe first round, additionally, in round 15 the inverse permutation of the first round intervenes. Both the S-boxes and the permutations are built using the E. Lorenz equations, which obtain solutions with two different points of the elliptic curve chosen randomly in each process. To measure the resistance to differential attack of the proposed cryptosystem, the following measurements are carried out: Number of Pixels Change Rate NPCR, Unified Average Changing Intensity - UACI. Also, taking into account that the generation of the boxes is dynamic, the algebraic attack is avoided; furthermore, with this symmetric cryptosystem it is possible to distribute keys and sign, since an asymmetric system is used in its construction. On the other hand, four types of noise are applied to the encrypted images to evaluate the resistance of the encryption algorithm to this type of attack. Ten instruments are used to measure the quality of encryption; namely: entropy, correlation, discrete Fourier transform, NPCR, UACI, Avalanche Criteria - AC, contrast, energy, homogeneity and a goodness of fit test is proposed using the χ2 distribution
The proposed algorithm called Image encryption based on chaos, elliptic curve, dynamic S-boxes and variable permutations (IECC) is a symmetric cryptosystem for encrypting bmp images, in this case 512 × 512 pixel figures are used for testing. This algorithm consists of 15 rounds with a different S-box for each round and each set of S-boxes is different for each image encryption. Based on the above, a permutation is applied before the first round, additionally, in round 15 the inverse permutation of the first round intervenes. Both the S-boxes and the permutations are built using the E. Lorenz equations, which obtain solutions with two different points of the elliptic curve chosen randomly in each process. To measure the resistance to differential attack of the proposed cryptosystem, the following measurements are carried out: Number of Pixels Change Rate - NPCR, Unified Average Changing Intensity - UACI. Also, taking into account that the generation of the boxes is dynamic, the algebraic attack is avoided; furthermore, with this symmetric cryptosystem it is possible to distribute keys and sign, since an asymmetric system is used in its construction. On the other hand, four types of noise are applied to the encrypted images to evaluate the resistance of the encryption algorithm to this type of attack. Ten instruments are used to measure the quality of encryption; namely: entropy, correlation, discrete Fourier transform, NPCR, UACI, Avalanche Criteria - AC, contrast, energy, homogeneity and a goodness of fit test is proposed using the χ2 distribution.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.