Security Improvement Of Aes Algorithm Using S-Box Modification Based On Strict Avalanche Criterion On Image Encryption

Main Article Content

David Topanto
Alamsyah Alamsyah

Abstract

Communication is something that cannot be separated from humans as social creatures. Images are the most commonly used visual communication in today's era. On the other hand, sending images via wireless networks is very vulnerable to piracy. AES, as one of the best cryptographic algorithms, can be applied as a solution. Even so, the AES algorithm still has weaknesses, which are weak against linear attacks and differential cryptanalysis. One solution to overcome the weaknesses of the AES algorithm is to use a stronger S-box. One of the methods to measure the strength of an S-box is the Strict Avalanche Criterion (SAC). The dataset is divided into four categories based on the image type and size of the pixels. Data that has been encrypted using the proposed algorithm will be compared with data that has been encrypted using the standard AES algorithm. Cipherimages (encrypted data) are tested using histogram analysis, information entropy, and sensitivity analysis. The results obtained from cipher image testing are differences in histogram analysis testing in grayscale and color images. The information entropy value is 0.000131583% better than the AES standard, the NPCR is 0.17613% better than the AES standard, and the UACI value. 0.211148% better than AES standard in sensitivity analysis testing. Based on these data, the proposed algorithm has a higher level of security than the standard AES algorithm on image encryption.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
D. Topanto and A. Alamsyah, “Security Improvement Of Aes Algorithm Using S-Box Modification Based On Strict Avalanche Criterion On Image Encryption”, J. Soft Comput. Explor., vol. 3, no. 1, pp. 55-61, Mar. 2022.
Section
Articles

References

F. H. Istanto, “Gambar sebagai alat komunikasi visual,” Nirmana, vol. 2, pp. 23–35, 2000.

H. Cheng, “Partial encryption of compressed images and videos,” IEEE Trans. Signal Process., vol. 48, no. 8, pp. 2439–2451, 2000, doi: 10.1109/78.852023.

R. Munir, “Pengantar kriptografi IF5054 kriptografi,” Dep. Tek. Inform. Inst. Teknol. Bandung, vol. 1, p. 320, 2004.

D. A. A. Pertiwi and D. Djuniadi, “Simulations of text encryption and decryption by applying vertical bit rotation algorithm,” J. Soft Comput. Explor., vol. 2, no. 2, pp. 61–66, 2021.

P. Singhai and A. Shrivastava, “An efficient Image security mechanism based on advanced encryption standard,” Int. J. Adv. Technol. Eng. Explor., vol. 2, no. 13, pp. 175–182, 2015.

E. Setyaningsih, “Optimasi algoritma super enkripsi untuk meningkatkan pengamanan data citra digitaldalam pengiriman mms pada piranti cerdas,” J. Teknol. Technoscientia, vol. 5, no. 2, pp. 142–151, 2013.

Y. Zhang, “Test and verification of AES used for image encryption,” 3D Res., vol. 9, no. 1, pp. 1–27, 2018, doi: 10.1007/s13319-017-0154-7.

W. D. Smith, “AES seems weak linear time secure cryptography,” Work, vol. 2007, pp. 1–24, 2007.

L. Lacko-Bartošová, “Linear and differential cryptanalysis of reduced-round AES,” Tatra Mt. Math. Publ., vol. 50, no. 1, pp. 51–61, 2011, doi: 10.2478/v10127-011-0036-y.

A. Alamsyah, “A novel construction of perfect strict avalanche criterion s-box using simple irreducible polynomials,” Sci. J. Informatics, vol. 7, no. 1, pp. 10–22, 2020, doi: 10.15294/sji.v7i1.24006.

Alamsyah, A. Bejo, and T. B. Adji, “S-box construction of highly strict avalanche criterion using algebraic technique,” Proc. 3rd Int. Conf. Informatics Comput. ICIC 2018, pp. 1–4, 2018, doi: 10.1109/IAC.2018.8780454.

A. S. Mabruri, “Data security system of text messaging based on android mobile devices using advanced encrytion standard dynamic,” J. Soft Comput. Explor., no. October 2000, pp. 39–46, 2020.

L. Janczewski, H. B. Wolfe, and S. Shenoi, “Security and privacy protection in information processing systems: 28th ifip tc 11 international conference, SEC 2013 Auckland, New Zealand, July 8-10, 2013 Proceedings,” IFIP Adv. Inf. Commun. Technol., vol. 405, no. July, 2013, doi: 10.1007/978-3-642-39218-4.

M. N. Ardian, “Improved security of AES algorithm using modified shiftrows transformation with dynamic s-box in image encryption,” vol. 6, no. 1, pp. 1–10, 2019.

A. Yosanny, “Perancangan enkripsi pada citra bitmap dengan algoritma des, triple des, dan idea,” ComTech Comput. Math. Eng. Appl., vol. 1, no. 2, p. 853, 2010, doi: 10.21512/comtech.v1i2.2618.

B. Kaliski, “PKCS #7: cryptographic message syntax,” Netw. Work. Gr., 1998.

J. Daemen and V. Rijmen, “The block cipher rijndael,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 1820, pp. 277–284, 2000, doi: 10.1007/10721064_26.

S. M. Wadi and N. Zainal, “High definition image encryption algorithm based on AES modification,” Wirel. Pers. Commun., vol. 79, no. 2, pp. 811–829, 2014, doi: 10.1007/s11277-014-1888-7.

Abstract viewed = 317 times