

Ullah, Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field. Prasad, A novel S-Box generation of AES using elliptic curve cryptography (ECC). Azam, A novel image encryption scheme based on an elliptic curve. Asif, A method of generating 8 × 8 substitution boxes based on elliptic curves. Miller, Use of elliptic curves in cryptography, Lect. Z’aba, Improved S-box construction from binomial power functions, in Conf. Pasalic, Constructions of resilient S-boxes with strictly almost optimal nonlinearity through disjoint linear codes. Jakobovic, Cellular automata based S-boxes. Bouyuklieva, Bijective S-boxes of different sizes obtained from quasi-cyclic codes. Ruisanchez, A new algorithm to construct S-boxes with high diffusion. Jakobovic, On the design of S-box constructions with genetic programming, in GECCO 2019 companion-proceedings of the 2019 genetic and evolutionary computation conference companion (2019), pp. Smaliukas, An algorithm for key-dependent S-box generation in block cipher system. Maftab-Khan, Efficient cryptographic substitution box design using travelling salesman problem and chaos.


Arabia, An optimized implementation of the S-Box using residues of prime numbers. 2008 International Conference on Computational Intelligence and Security. Duong, Gray S-box for advanced encryption standard. Cao, A new S-box structure named affine-power-affine. Yang, An improved AES S-box and its performance analysis. Dawson, Multi-objective optimisation of bijective S-boxes. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) 2259, 103–111 (2001) Whiting, A simple algebraic representation of rijndael. Jianwei, Architectural optimization of parallel authenticated encryption algorithm for satellite application. Zaidan, Enhancing selective encryption for H.264/AVC using advanced encryption standard. Kumar, Smart grid security with AES hardware chip. Rijmen, The design of rijndael AES-the advanced encryption standard (Springer, New York, 2001) Shannon, Communication theory of secrecy systems. Mat, A Survey on the cryptographic encryption algorithms. Ghrera, A recent survey on data hiding techniques, in Proc. Yadav, Traditional and hybrid encryption techniques: a survey (Springer, Singapore, 2018), pp. The overall results determine that the proposed algorithm contains good cryptographic properties and low computational complexity makes it viable to low profile applications. The decryption is successfully done for noisy data with minor distortions. The encryption scheme can also resist channel noise as well as noise-induced by a malicious user. Moreover, the algorithm satisfies all major performance and quality metrics. The statistical findings and simulation results imply that the algorithm is resistant to various attacks. The resiliency of the algorithm can further be enhanced by increasing the number of rounds and S-boxes deployed. The modular approach followed in the design framework and integration of chaotic maps into the system makes the algorithm viable for a variety of image encryption applications. The chaotic sequences are then accordingly applied to the proposed algorithm. A detailed investigation is presented to analyze the behavior of chaos for secure communication. The proposed work incorporates three distinct chaotic maps. The confusion is mainly done through the application of the elliptic curve and S 8 symmetric group. The core structure of this algorithm relies on confusion and diffusion operations. In this manuscript, we proposed an algorithm for image encryption applications. These modern applications demand diverse security requirements and innovative security platforms. The recent decade has seen a tremendous escalation of multimedia and its applications.
