Abstract

Low-dimensional chaotic mappings are simple functions that have low computation cost and are easy to realize, but applying them in a cryptographic algorithm will lead to security vulnerabilities. To overcome this shortcoming, this paper proposes the coupled chaotic system, which coupled the piecewise and Henon mapping. Simulation results indicate that the novel mapping has better complexity and initial sensitivity and larger key space compared with the original mapping. Then, a new color image encryption algorithm is proposed based on the new chaotic mapping. The algorithm has two processes: diffusion and confusion. In this scheme, the key is more than , and SSIM and PSNR are 0.009675 and 8.6767, respectively. The secret key is applied in the shuffling and diffusion. Security analysis indicates that the proposed scheme can resist cryptanalytic attacks. It has superior performance and has high security.

1. Introduction

Chaos has always been a very active research topic in the field of nonlinear science. There are many common characteristics of digital chaotic system and cryptography, such as sensitivity and being aperiodic and pseudorandom. These characteristics promote the application of digital chaotic system in cryptographic algorithm design. Image encryption is one of the main means of information protection. An image will have some characteristics such as high correlation, large data size, and high data dimension, which should be considered additional, when it is encrypted. Because of the low efficiency of real-time processing, traditional encryption algorithms are not suitable for digital images such as DES, 3DES, and AES [1]. Therefore, many image encryption schemes based on different fields have been proposed in recent years such as cellular automata [2, 3], wavelet transform [4, 5], compressing sensing [6], selective encryption [7], DNA coding [8, 9], and chaos [1014].

Because of the large key space, strong dynamic characteristics, complex attractor, and strong ergodicity of high-dimensional chaotic system, it is more secure than low dimension. The high computational cost of high-dimensional chaotic system makes it occupy more hardware and software resources, which is difficult to implement. By contrast, the low-dimensional chaotic system is a simple function, which is easier to implement. Due to the computation precision of software and hardware, the chaotic complexity in real-numbered chaos is often affected by dynamic degradation (collapsing effect) [14, 15]. With the study going on, low-dimensional chaotic maps have been performed perfectly on its characteristics [16, 17]. In particular, some algorithms based on low-dimensional chaotic maps have been widely studied and cracked [1820]. Therefore, when a low-dimensional chaotic mapping is applied in cryptography, it is necessary to enhance all of its chaotic characteristics.

Aiming at the degradation of digital chaotic property caused by innate structural defects, many algorithms such as [21, 22], pseudorandom perturbation [23], switching systems [24, 25], and combination systems based on modular operation [2629] have been proposed to overcome this. However, due to the uncertain parameters, it still includes partial periodic regions which do not maintain long stable synchronization. Each of the existing approaches has its own limitations and drawbacks [30].

Many image encryption algorithms have been proposed based on Shannon’s theory about shuffling and diffusion [5, 12, 31, 32]. Shuffling can rearrange pixels by some rules [33] and diffusion can substitute pixels by a series generated by a chaotic map. The inherent features of a chaotic map can be suitable for the two security notions.

Generally, most of algorithms come with the common limitations. Firstly, the key is independent of the original image; that is, if the key is unchanged, the different original images that need to be encrypted will use the same key [3436]. Secondly, the encryption scheme based on low-dimensional chaotic maps is not suitable for practical use because of its small key space, short period, and low complexity [1417]. At last, the ciphertext is only related to the key and has no relationship with the plaintext and middle ciphertext, which cannot resist the plaintext attack and the ciphertext attack.

In this paper, we propose a novel color image encryption algorithm based on an efficient chaotic system coupling two low-dimensional chaotic maps. Firstly, the new chaotic system utilizes combination method to formulate a 3D chaotic map. It not only retains the complexity of its underlying maps but also enlarges the dimensions from 2D to 3D. Also, it enlarges the key space. Thus, the chaotic map can depict highly chaotic behavior for all parameters. Secondly, the initial key is derived from plaintext, and different images have different initial key, which improves the security of the algorithm. Finally, the formula of this algorithm is related not only to the key and plaintext but also to the intermediate ciphertext, which increases the complexity among plaintext, ciphertext, and key.

The other sections of this paper are organized as follows: Section 2 represents the proposed chaotic system and introduces the new 3D chaotic map and then proves its chaotic properties. In Section 3, a detailed explanation of the proposed encryption algorithm is provided. Some analysis of its security and performance is carried out in Section 4 and the conclusion is given in Section 5.

2. 3D Piecewise-Henon Map

With the continuous improvement of computing speed and performance of modern computers, nonlinear systems have developed greatly. However, because of the computational accuracy of computer software and hardware limiting, the complexity of chaotic mapping in real number field will gradually decline. In addition, the orbit of the low-dimensional chaotic map will degenerate (collapse effect) in some periods. Therefore, low-dimensional chaotic systems are rarely used alone [37, 38]. In particular, Henon and logistic mappings are quite different in theory when they are used alone [39, 40]. Therefore, we combine the characteristics of Henon mapping and the piecewise mapping to construct a new chaotic mapping with larger dimension and better chaotic characteristics, 3D piecewise-Henon mapping (3D-PHM).3D-PHM is as follows:where and are real control parameters; is a piecewise function; that is,is the Henon mapping.

The initial values , , and are selected in the interval . From 3D-PHM, three state values are obtained by each integer , which are denoted as , , and . The range of the value is confined in . Because of its good simplicity, ergodicity, and sensitivity to initial conditions, the system has good cryptographic performance.

2.1. Graphical Analysis

The control parameters and in 3D-PHM are very important. We drew a contour map of the approximate entropy of the system with different values, which is shown in Figure 1; and are varied from 0 to 15, and the . In Figure 1(a), the complexity of the system is good in most of the regions, and, with the increase of parameters and , the approximate entropy is high, except for some regions (Figure 1(b) is the enlargement of part (a); the low value position can be seen). Therefore, when studying the characteristics of 3D-PHM, we will set the control parameters of the system (formula (1)) as .

Lyapunov exponent is an important parameter of chaotic systems. When one of Lyapunov exponents is positive, the system will be a chaotic system. Provided that there are two or more positive Lyapunov exponents, the system is a hyperchaotic system. Eigenvalue method is used to calculate Lyapunov exponent of 3D-PHM, which is (0.3055, 0.3158, 0.1529), when , and . The Jacobian of equation (1) is as follows:

The initial point is , and the other iteration points obtained from the iterative equation are , respectively. The first (n−1) Jacobian matrices are , , and , respectively. When the increment is small enough, its evolution satisfies the linear differential equation: where J = . Let the three eigenvalues of matrix J be , respectively.

Figure 2 shows the chaotic attractor of , which has no obvious uneven distribution in the region. It has a very good ergodicity when .

2.2. Comparative Analysis of Permutation Entropy of Henon, 3D-Henon, and 3D-PHM Maps

The complexity of a chaotic system indicates the uncertainty of a mapping, which can be measured by entropy. For a symbol sequence, the higher its entropy is, the higher its complexity is; otherwise, the lower its complexity is.

Permutation entropy (PE) is the algorithm of complexity for measuring time series, which was proposed by Christoph Bandt and Pompe in 2002. The permutation entropy is defined as follows [34]:where is the embedded dimension of the reconstructed sequence and is the probability of the occurrence of each symbol. In theory, when , reaches the maximum , but, in practice, . In general, will be standardized by ; that is,

Obviously, the complexity of the series can be reflected by . The smaller is, the stronger regularity of the chaotic series is. On the contrary, the larger is, the higher complexity of the chaotic sequence is and the greater the complexity of the chaotic sequence is. The comparisons of PE among Henon mapping, 3D-Henon, and 3D-PHM are shown in Figure 3. As is shown, PE of 3D-PHM is higher than those of 3D-Henon mapping and Henon mapping. Henon mapping is the least complex. PE of 3D-PHM is significantly higher than that of Henon mapping. That means the complexity of Henon mapping is increased significantly.

2.3. Sensitive to Initial Conditions

The initial condition sensitiveness is another important characteristic of chaotic systems. Figure 4 illustrates the sensitivity of 3D-PHM to small changes in initial conditions. For two very close initial values and , where , 3D-PHM can produce two completely different sequences and the gaps between their trajectories and increase considerably.

2.4. The NIST Statistical Test

For all 15 tests in the NIST suite, the significance level was set to 1%. If , the binary sequence is accepted to be random with a confidence of 99%; otherwise, it is considered as nonrandom. To perform this battery of tests, we have generated up to points by 3D-PHM. We convert these sequences into binary form and NIST tests were performed on them. The test results are shown in Table 1 and all the tests were successful. It is shown that 3D-PHM has a strong randomness and can resist many statistical attacks. Hence, the tested binary sequences generated by 3D-PLM are random with respect to all the 15 tests of NIST suite.

2.5. Approximate Probability Density

Probability distribution function is a tool to measure whether a dynamic system is a uniform distribution [41]. In order to measure the probability density of the system, we divide the three-dimensional attractor into a group of small cubes in , and the number of cubes is , which is defined by

Let be the number of iterations in transition regime, large enough, and after iterations of 3D-PHM, the proportion of the box reached by the orbit is calculated by where is a special function about the set which is defined as follows:

In addition, in order to get the number of times the trajectory passes through a particular cube , we need to calculate the relative times of trajectory accessing this box relative to . Given that is large enough, the approximate probability density function under all conditions and all and then

In order to define the 3D-PHM system to random, it will be further required that the variables defined above and the invariant measure mathematicians called must be independent of the starting point . Moreover, when the track is evenly distributed throughout the space, in that way, for all , the following formula holds right:where represents the natural Lebesgue metric of [42].

For computing the approximate density function of 3D-PHM, cube is divided into boxes. When and iterates with mapping (1), , where . The control parameter and the initial values are fixed at and . In Figure 5(a), the trajectory will visit more than 99% cubes , when exceeds . The calculation using mean square error (MSE) is carried out to measure the difference between the values of and . This metric is as follows:where denotes the Euclidian norm. Obviously, in Figure 5(b), MSE values decrease to zero with the number of iterations increasing, which means the point of the trajectory is distributed uniformly in the phase space.

The histogram of the approximate density function is displayed in Figure 6(b). It shows a standard normalized distribution perfectly. The series, which is generated by 3D-PHM, is distributed uniformly in the phase space without any concentration in Figure 6(a). It implies strong chaoticity and ergodicity.

3. The Color Image Encryption Algorithm

To thwart a powerful attack based on statistical analysis, Shannon suggests using confusion and diffusion for encryption [43]. Generally, the security of image encryption technology is defined by shuffling and diffusion. Shuffling is a method to change the positions of pixels in an image. Shuffling can make it difficult to predict the initial positions of an encrypted pixel.

The diffusion operation can be implemented by a chaotic map; it can change the behavior of the whole chaotic system through a small change of the chaotic map. The two implementations can be applied to all kinds of pictures.

Our proposed scheme also has two major steps.

First, the plain image is destroyed by shuffling with 3D-PHM. The second step is to diffuse the shuffled image, which is to reach a high complexity. The block diagram of the proposed scheme is shown in Figure 7. The details of the proposed encrypting algorithm are outlined as follows:(1)Primary Stages. Convert the image with the size of into three monochromatic images, where the size is , namely, , , and , and then each matrix is converted into a vector (), represented by , , and .(2)Generate the Initial Conditions. Let the control parameter at and be large enough and choose an initial pixel and calculate the sum of all pixels in every component of the plain image. The formula is as follows: represents the initial values of the scheme and the formula is as follows:(3)Generate the Key to Shuffling. Formula (1) of 3D-PHM and the initial condition are used to generate three real-valued sequences with the length of , namely, , , and , where , , and , . The interval is divided into subintervals on average, and the length of each interval is . What function does is to map the value of interval to the set of integers .where , and get the integer key sequence , , and ; obviously .(4)Shuffle Images. Use Algorithm 1 to generate the shuffled vectors , , and corresponding to the three monochromatic components of the initial plain images , , and .For example, provide that , , and then . So generate three shuffled images , and .(5)Generate the Chaotic Mask Sequence. Use formula (17) to obtain the integer chaotic masks, , and , respectively, where . The formula is as follows:(6)Diffusion of the Cipher Image. Formulas (18)–(20) are used to obtain three encrypted image integer matrices , , and . For example, for the red component, the pixel sequence of the scrambled image is , the chaotic mask series is , and the ciphertext is . Here, the round encryption scheme is introduced as follows:where are the parameters introduced when encrypting the first scrambling pixel, which can be used as the initial key in the encryption and are results of the th round encryption. Generally, . The relationship among the ciphertext, plaintext (or intermediate ciphertext), and the key not only is XOR but also includes nonlinear module. Thus, the proposed algorithm can resist plaintext attack. Then convert each component into matrices , , and , whose size is . Finally, the color cipher is combined.

Input: the integers and , and the vectors , and
Output: the shuffled images vectors, and
while kRmn
end
   ,
   while
  if ()
   ;
  else
   ;
  end
   ; ;
  end
Input: and and , , , and
 Output: , and
 Initialize: ,
while
  if
  ;
   ;
  else
   ;
   ;
   ;
  end
  ;
end

Decryption is the inverse of encryption, but decryption starts with the last pixel and goes back to the first. The process of decryption is given as follows:(1)Splitting the ciphered image into three separated components and then converting them into encrypted pixel sequences , , and ().(2)Formula (17) is used to obtain the secret key sequences , , and , and formulas (21)–(23) are used to obtain the shuffled sequences , , and when the round number .(3)Use the vectors , , and as input with Algorithm 2 to generate the deshuffled vectors , , and .(4)Obtain pixel sequences, , and , and combine them into the plain image .

4. Simulation and Experimental Analysis

For all the analysis, the control parameters , the round number , the initial value, and . The proposed color image cryptosystem is executed on the standard test image named “Lena” with the size . The ciphertext of the three color components of the color image is shown in Figure 8.

In order to demonstrate that the proposed image encryption algorithm is secure against most common attacks, key space and key sensitivity tests are analyzed, and security analyses such as chosen plaintext attack, histogram analysis, correlation of the image, difference measurement, and information entropy are also carried out.

4.1. Key Space Analysis

In order to resist brute-force attacks, it is necessary to extend a key space as large as feasible. Generally, the security will be accepted when the key space is greater than . The proposed algorithm takes the initial three states of formula (1) as the initial secret keys, expressed by double-precision real type. So the key space is . In addition, can also be the initial key. So the key space of the proposed algorithm is . Therefore, it is sufficiently large to prevent a brute-force attack [35, 44, 45]. The comparison of key space sizes between the proposed scheme and similar works is displayed in Table 2.

4.2. Key Sensitivity Analysis

A secure image encryption scheme requires a high secret key sensitivity. It means that even a very small change between the initial keys can cause two completely different decrypted images. The plaintext and the ciphertext are shown in Figures 9(a) and 9(b). In Figure 9(c), the right decryption is shown and the wrong result is shown in Figure 9(d), where the initial value is and . It is easy to distinguish that the last image is completely different from the original image. The proposed scheme is sensitive to the key.

4.3. Image Histogram Analysis

For the three color components of RGB images, the graph with the number of pixels at each gray level is histogram. Histogram analyses for the original image and the encrypted image by the proposed scheme are carried out in this paper. Histograms for three components of the original and encrypted images are shown in Figure 10. From Figures 10(b), 10(d), and 10(f), the histograms are quite uniform and they are different from the plaintext. It means the that result of the algorithm can resist the known plaintext attack [47].

It is necessary to verify the security of the encrypted image with histogram analysis, but it is not enough. In order to further verify the uniform distribution of the ciphertext, the Chi-square test is applied. It is as follows:where are the occurrence times for every gray level (0 to 255) of the cipher and is the mean occurrence frequency of the uniform distribution, which is 1024 in the image with the size of . For a secure cryptosystem, the values of in encrypted images must be less than the values of in plain images. In Table 3, values of in the plain image are much larger than values of in the encryption image, which means the security of the proposed algorithm has good encryption effect.

4.4. Correlations of Adjacent Pixels

Besides histograms analysis, the correlation between adjacent pixels in the plain and encrypted image is conducted. The correlation coefficients of several adjacent pixel pairs (including horizontal, vertical, and diagonal pixel pairs) which are selected from the image are computed. The formula is as follows: where and represent the gray values of two adjacent pixels in the plain and encrypted image and is the number of adjacent pixels pairs selected randomly from the plain or encrypted image. , , and represent the two means of two adjacent pixels. When , it will indicate that the adjacent pixels are highly correlated, and when , it will mean that the adjacent pixels are low correlated.

For the correlation analysis experiment, we randomly selected 10000 pairs of adjacent pixels from the plain and encrypted images in horizontal, vertical, and diagonal directions. The experimental results are shown in Figure 11, where represents the coordinate of pixels in an image. From Figure 11, the correlation of the plain image is significantly higher than that of the encrypted image.

In addition, the correlation coefficients of the original image are computed, which are listed in Table 4. of the original image are close to 1. Otherwise, the encrypted are close to 0. It means that the proposed algorithm removed the correlation between adjacent pixels of the original image. Then, comparisons are conducted among different algorithms in Table 4. The correlation coefficient of the plain image is extremely different from the encrypted image and the former is close to zero. The encrypted of ours is more close to zero than others.

4.5. The Difference Measurements

The degradation rate of the image after encryption can also prove the encrypted effect of an encryption system. To measure the difference between the original and the encrypted images, we have the two following effective statistical tools.

4.5.1. The Structural Similarity Index

The structural similarity (SSIM) index can indicate the similarity between the two images. The SSIM belongs to . When the SSIM is 1, it indicates that the two images are completely similar. It is defined by the attribute of the object structure in the reflection scene independent of brightness and contrast, which is from the angle of image composition. The value of SSIM is composed of brightness, contrast, and structure of images. Mean values are used by estimating the brightness, and the standard deviation is used by estimating the contrast, and the covariance is used by measuring the similarity of the structure. The formula used to calculate SSIM of two images is as follows: where and represent the means of gray pixels in two images; and are the standard deviations of the two images; and are the variances of the two images; represents the covariance of the two images; and are two constants, where and . Generally, , , and . The SSIM of different encryption schemes are listed in Table 5. The SSIM between the original image and other encrypted schemes of “Lena” approach zero. Compared with others, the proposed algorithm has higher superiority.

4.5.2. Peak Signal-to-Noise Ratio Analysis

Peak signal-to-noise ratio (PSNR) is the most common and widely used objective evaluation index of images. For a perfect image encryption scheme, the smaller values of the PSNR are (generally, less than 10), the better schemes are. The calculation is as follows:where is the mean square error of an image; is a pixel of the encrypted image and is a pixel of the original image, the coordinate of which is ; is the range of pixel in the image. We calculated PSNR of each color component of the encrypted image (Lena) and found that it was less than 10. Values of PSNR of this encryption scheme are compared with the results of other schemes; see Table 6. From the comparison in Table 6, we can see that the results of PSNR of this scheme are better than those of other existing algorithms.

4.6. Analysis of Antidifferential Attack

In the encryption algorithm, diffusion is an important property, which was proposed by Shannon in [43]. A good encryption system must have good diffusivity. It means that one pixel in the original image is changed, and the encrypted image will be changed completely in an unpredictable way.

The important significance of the diffusion depends on how complex the algorithm is, which can resist the analysis of the algorithm by the attacker. The number of pixel change rate (NPCR) is usually used to test the effect of changing a pixel in the encrypted scheme, which calculates the percentage of two different image pixels.

The average intensity of the two images is tested by UACI. Here, and are two cipher images whose corresponding plain images have only one pixel difference. is defined as and UACI is defined as where and are rows and columns of the image, respectively. Ideally, the means of NPCR and UACI are and . For grayscale image with 256 levels, . The expected values of NPCR and UACI are and , respectively.

In the experiment, 100 group pixels of Lena image were selected for encryption. Every group has two images. One is the original image, and the other is image with one pixel changed, which is an image where one pixel is changed randomly in the original image. The results of NPCR and UACI are shown in Figures 12 and 13. Results of the proposed algorithm are distributed near the ideal value (horizontal lines in the figure). The mean values of NPCR and UACI in the proposed scheme are 99.6214% and 33.4149%, respectively, which are very close to the ideal values.

The comparison with other algorithms is shown in Table 7. The results show that the proposed algorithm can resist plaintext attack, ciphertext attack, and known plaintext attack well, and it is also superior to other algorithms. The reason is, in other schemes, the ciphertext diffusion effect of the algorithm works only in one round of pixel substitution, in which the change of any one pixel in plaintext can only affect the ciphertext behind the changed pixel. In this paper, two or more rounds of diffusion are carried out. Therefore, each pixel in the encrypted image will be affected.

4.7. Analysis of Chosen Plaintext Attack

The ability of a scheme to resist the chosen plaintext attack should be tested in the following way. The formula is as follows [61]:where and are two plain images and and are two encrypted images which are encrypted by the same plain images. When the equation holds right, the algorithm will be highly vulnerable to chosen plaintext attack. Figure 14(a) indicates (XOR operation to the encrypted images of Lena and baboon), and Figure 14(b) indicates (XOR operation to the plain images of Lena and baboon). Obviously, Figures 14(a) and 14(b) are completely different, indicating that the equation is not tenable. Therefore, the algorithm can resist chosen plaintext attack.

4.8. Analysis of Plaintext Attacks

In many methods of cryptanalysis, attackers try to identify the relationship between plaintext and ciphertext by searching ways to reduce the key space or the equivalent key space. This kind of attack usually uses white or black pixels to generate ciphertext by the proposed algorithm. Then the key is inferred from the corresponding ciphertext image. In order to resist this attack, this encryption scheme should eliminate any relationship between ciphertext and plaintext.

The proposed scheme, even if a specific plaintext is selected, such as black and white images, cannot generate recognizable patterns. It is because the encryption algorithm not only depends on the change of pixel position but also depends on the high complexity of the novel chaotic and good multiple diffusion characteristics of the encryption algorithm. Especially when the algorithm is used to encrypt adjacent columns/rows, the adjacent pixels will have little correlation.

The results of our proposed algorithm are depicted in Figure 15. The size of the white and black images is . They are encrypted by the proposed algorithm. From Figures 15(b) and 15(d), the encrypted images are different from the original images. Then, our proposed encryption algorithm can resist the known plaintext attack.

4.9. Analysis of Noise Attack
4.9.1. Analysis of Pepper and Salt Noise Attack

The ability of the encryption system to resist noise attack is tested by adding salt and pepper noise with different intensities when encrypting the image. Figure 16 shows the decrypted images where densities of 0.05 and 0.1 are added, respectively. The decrypted images become slightly blurred, but the contents of the images can still be recognized.

4.9.2. Analysis of Gaussian Noise

The Gaussian noise with variance of 0.01 and zero mean was added to the encryption process, and the result is shown in Figure 17(a). Take the Gaussian noise with variance of 0.5 and zero mean, and the result is shown in Figure 17(b). Although the decrypted image is still fuzzy, it can still distinguish the basic image content. It illustrates that the proposed algorithm can resist the Gaussian noise.

4.10. Information Entropy

Information entropy (EN) can describe the complexity, which can quantify the randomness of a chaotic system. Let represent a source of information, and the entropy can be calculated by where is the probability of the symbol which can appear in the chaotic system. For a random signal consisting of symbols, is equal to 8. The information entropy value of the proposed scheme is calculated. The results between the proposed algorithm and other schemes are shown in Table 8 and our values are 7.9984, 7.9982, and 7.9979, respectively, which are higher than others, ensuring that our scheme is more complex.

4.11. Computational Complexity and Speed Test

The computational complexity of algorithms is often used to describe the execution time of programs or the space occupied by algorithms in memory or disk. It is often represented by symbol .

The function represents the time of an algorithm (or the number of steps), where is the size of the problem to be solved and . Theoretically, the function . It means that there is a positive constant which makes . Given that the size of the image is , the times of scrambling statements are during the image encryption. Take two rounds as an example; the times of the diffusion statement are . The times of decrypted statement are the same as those of the encryption. So, we can write the expression as . Therefore, the complexity of the algorithm is . Thus, the proposed algorithm can resist different cryptographic analysis.

The speed of every scheme is shown in Table 9. We implement our scheme and other schemes using Matlab R2016b on an Intel Core i5-4590 @ 3.30 GHz Processor, 4 GB RAM, and Windows 10 operating system. Compared with DES, AES, and logistic mapping encryption scheme, our chaotic encrypted algorithm is more quick than traditional ones.

5. Conclusion

This paper has proposed a new color image encryption based on 3D-PHM. 3D-PHM shows better chaotic complexity and performance than the original mappings. It enlarges the dimensions of Henon mapping and the complexity of low-dimensional chaotic mapping is increased, and the method can also be applied to other low-dimensional chaotic mappings. At the same time, the parameter range of 3D-PHM is also enlarged, which increases the key space of the original mapping. Based on the new chaotic mapping, this paper proposes the color image encryption scheme, which is associated with the key, plaintext, and intermediate ciphertext. Security and performance evaluation shows that the proposed cipher has various desirable characteristics such as efficiency, flexibility, and resistance against cryptanalytic attacks.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare no conflicts of interest.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (no. 61471158).