Multiple RGB Images Security based on Substitution–Permutation Network over the Residue Classes of Eisenstein Integer Z[Ω]π

Authors

  • Maha Alammar Department of Mathematics, College of Science, King Saud University, P.O. Box 22452 Riyadh 11495, Saudi Arabia
  • Muhammad Sajjad National University of Technology (NUTECH), Islamabad, Pakistan https://orcid.org/0000-0003-0006-1156
  • Mushtaq K. Abdalrahem College of Pharmacy, University of Al-Ameed
  • Robinson Julian Serna Escuela de Matemáticas y Estadística, Universidad Pedagógica y Tecnológica de Colombia, Tunja, Colombia

DOI:

https://doi.org/10.29020/nybg.ejpam.v18i3.6470

Keywords:

Eisenstein integers; Multiple Image Encryption; Substitution Permutation Network; Security Analysis

Abstract

This paper presents a multiple RGB image encryption scheme that utilizes a pair of 8×8 S-boxes constructed over the residue classes of Eisenstein integers Z[Ω]π, implemented within a three-stage Substitution–Permutation Network (SPN) architecture. The S-boxes are generated using Eisenstein integer algebra through affine transformations and their corresponding inverse functions, ensuring strong nonlinearity. The first S-box serves as a substitution function, while the second contributes to both permutation and diffusion. Enhanced cryptographic strength is achieved through modular arithmetic in Z[Ω]π, which supports essential encryption properties such as confusion and diffusion. Further complexity is introduced by combining the two S-boxes
via an XOR operation to construct a third S-box, promoting greater inter-channel diffusion among the RGB components. The proposed SPN framework is designed to resist differential and linear cryptanalysis through its layered substitution, permutation, and XOR-based mixing operations. Separate yet interlinked processing pathways for each image channel ensure secure and efficient encryption. Experimental evaluations validate the proposed method, demonstrating high entropy, low inter-channel correlation, and robust resistance to various attacks, making it a strong candidate for secure multimedia communication applications.

Author Biography

  • Muhammad Sajjad, National University of Technology (NUTECH), Islamabad, Pakistan

    Dr. Muhammad Sajjad is a dedicated mathematician from Pakistan, currently serving as an Assistant Professor at the National University of Technology (NUTECH), Islamabad. He earned his PhD from Quaid-i-Azam University Islamabad, Pakistan, in 2024 and is an esteemed member of the American Mathematical Society (AMS). Recognised for his outstanding contributions to cybersecurity and cryptography, Dr. Sajjad has received several prestigious accolades, including two international research awards in cybersecurity and cryptography, the Computer Scientist Award from China, and the National Cryptology Award from NCCS Pakistan. His research spans multiple disciplines, including mathematics, electrical engineering, and computer science, with a strong emphasis on vector algebras, non-commutative and non-associative algebras, number theory, coding theory, channel coding, cryptography, cryptology, post-quantum cryptography, graph theory, and elliptic curves. His work is particularly focused on designing efficient error-correcting codes, advancing data security, and exploring complex algebraic structures. Dr. Sajjad is an active contributor to the global academic community, having delivered talks at prestigious international conferences. His research collaborations extend to leading universities in South America, Denmark, and Saudi Arabia, further strengthening his impact on the field. He has undergone professional training in various aspects of academic management and possesses strong programming skills in Python, MATLAB, C++, and more. Over his academic career, he has taught 21 bachelor's and master's courses and published 14 research papers. Through his dedication to teaching, research, and innovation, Dr. Muhammad Sajjad continues to shape the future of mathematical sciences and information security.

Downloads

Published

2025-08-01

Issue

Section

Coding Theory and Cryptology

How to Cite

Multiple RGB Images Security based on Substitution–Permutation Network over the Residue Classes of Eisenstein Integer Z[Ω]π. (2025). European Journal of Pure and Applied Mathematics, 18(3), 6470. https://doi.org/10.29020/nybg.ejpam.v18i3.6470