A group theoretic approach to construct cryptographically strong substitution boxes

被引:100
作者
Hussain, Iqtadar [1 ]
Shah, Tariq [1 ]
Gondal, Muhammad Asif [2 ]
Khan, Waqar Ahmad [2 ]
Mahmood, Hasan [3 ]
机构
[1] Quaid I Azam Univ, Dept Math, Islamabad, Pakistan
[2] Natl Univ Comp & Emerging Sci, Dept Sci & Humanities, Islamabad, Pakistan
[3] Quaid I Azam Univ, Dept Elect, Islamabad, Pakistan
关键词
Substitution box (S-box); Mobius transformation; Majority logic criteria (MLC);
D O I
10.1007/s00521-012-0914-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a method to construct a substitution box used in encryption applications. The proposed algorithm for the construction of substitution box relies on the linear fractional transform method. The design methodology is simple, while the confusion-creating ability of the new substitution box is complex. The strength of the proposed substitution box is evaluated, and an insight is provided to quantify the confusion-creating ability. In addition, tests are performed to assess the vulnerability of the encrypted data to algebraic and statistical attacks. The substitution box is critically analyzed by strict avalanche criterion, bit independent criterion, differential approximation probability test, linear approximation probability test, non-linearity test, and majority logic criterion. The performance of the proposed substitution box is also compared with those of some of the well-known counterparts including AES, APA, Gray, S-8, Skipjack, Xyi, and prime of residue substitution boxes. It is apparent that the performance, in terms of confusion-creating ability, of the new substitution box is better than those of some of the existing non-linear components used in encryption systems. The majority logic criterion is applied to these substitution boxes to further evaluate the strength and usefulness.
引用
收藏
页码:97 / 104
页数:8
相关论文
共 11 条
  • [1] Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
  • [2] Cui L., 2007, INT J INNOV COMPUT I, VI 3, P45
  • [3] Daemen Joan, 2020, Information Security and Cryptography, V2nd
  • [4] Feng D, 2000, DESIGN ANAL BLOCK CI
  • [5] Hussain I, 2011, P PAKISTAN ACAD SCI, V48, P111
  • [6] Hussain I., 2010, INT J CONT MATH SCI, V5, P1263
  • [7] Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher
    Kim, Jongsung
    Phan, Raphael C. -W.
    [J]. CRYPTOLOGIA, 2009, 33 (03) : 246 - 270
  • [8] Matsui M., LNCS, V765, P386
  • [9] Shah T., 2011, STAT ANAL S BOX IMAG, V6, P4110, DOI DOI 10.5897/IJPS11.531
  • [10] Gray S-box for Advanced Encryption Standard
    Tran, Minh-Triet
    Bui, Doan-Khanh
    Duong, Anh-Duc
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 253 - +