Skip to main content
Erschienen in: Neural Computing and Applications 1/2013

01.07.2013 | Original Article

A group theoretic approach to construct cryptographically strong substitution boxes

verfasst von: Iqtadar Hussain, Tariq Shah, Muhammad Asif Gondal, Waqar Ahmad Khan, Hasan Mahmood

Erschienen in: Neural Computing and Applications | Ausgabe 1/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we present a method to construct a substitution box used in encryption applications. The proposed algorithm for the construction of substitution box relies on the linear fractional transform method. The design methodology is simple, while the confusion-creating ability of the new substitution box is complex. The strength of the proposed substitution box is evaluated, and an insight is provided to quantify the confusion-creating ability. In addition, tests are performed to assess the vulnerability of the encrypted data to algebraic and statistical attacks. The substitution box is critically analyzed by strict avalanche criterion, bit independent criterion, differential approximation probability test, linear approximation probability test, non-linearity test, and majority logic criterion. The performance of the proposed substitution box is also compared with those of some of the well-known counterparts including AES, APA, Gray, S8, Skipjack, Xyi, and prime of residue substitution boxes. It is apparent that the performance, in terms of confusion-creating ability, of the new substitution box is better than those of some of the existing non-linear components used in encryption systems. The majority logic criterion is applied to these substitution boxes to further evaluate the strength and usefulness.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Daemen J, Rijmen V (2002) The design of Rijndael- AES: the advanced encryption standard. Springer, BerlinCrossRef Daemen J, Rijmen V (2002) The design of Rijndael- AES: the advanced encryption standard. Springer, BerlinCrossRef
2.
Zurück zum Zitat Cui L, Cao Y (2007) A new S-box structure named affine- power-affine. Int J Innov Comput I 3(3):45–53 Cui L, Cao Y (2007) A new S-box structure named affine- power-affine. Int J Innov Comput I 3(3):45–53
3.
Zurück zum Zitat Tran MT, Bui DK, Doung AD (2008) Gray S-box for advanced encryption standard. Int Conf Comp Intel Secur 1:253–256 Tran MT, Bui DK, Doung AD (2008) Gray S-box for advanced encryption standard. Int Conf Comp Intel Secur 1:253–256
4.
Zurück zum Zitat Hussain I, Shah T, Mahmood H (2010) A new algorithm to construct secure keys for AES. Int J Cont Math Sci 5(26):1263–1270MathSciNetMATH Hussain I, Shah T, Mahmood H (2010) A new algorithm to construct secure keys for AES. Int J Cont Math Sci 5(26):1263–1270MathSciNetMATH
5.
Zurück zum Zitat Kim J, Phan RC-W (2009) Advanced differential-style cryptanalysis of the NSA’s skipjack block cipher. Cryptologia 33(3):246–270MATHCrossRef Kim J, Phan RC-W (2009) Advanced differential-style cryptanalysis of the NSA’s skipjack block cipher. Cryptologia 33(3):246–270MATHCrossRef
6.
Zurück zum Zitat Shi XY, Xiao Hu, You XC, Lam KY (2002) A method for obtaining cryptographically strong 8 × 8 S-boxes. Int Conf Infor Network Appl 2(3):14–20 Shi XY, Xiao Hu, You XC, Lam KY (2002) A method for obtaining cryptographically strong 8 × 8 S-boxes. Int Conf Infor Network Appl 2(3):14–20
7.
Zurück zum Zitat Hussain I, Shah T, Mahmood H, Gondal MA, Bhatti UY (2011) Some analysis of S-box based on residue of prime number. Proc Pak Acad Sci 48(2):111–115MathSciNet Hussain I, Shah T, Mahmood H, Gondal MA, Bhatti UY (2011) Some analysis of S-box based on residue of prime number. Proc Pak Acad Sci 48(2):111–115MathSciNet
8.
Zurück zum Zitat Matsui M (1994) Linear cryptanalysis method of DES cipher. Advances in cryptology, proceeding of the Eurocrypt’93, Lecture Notes in Computer Science 765:386–397 Matsui M (1994) Linear cryptanalysis method of DES cipher. Advances in cryptology, proceeding of the Eurocrypt’93, Lecture Notes in Computer Science 765:386–397
9.
Zurück zum Zitat Feng D, Wu W (2000) Design and analysis of block ciphers. Tsinghua University Press, Beijing Feng D, Wu W (2000) Design and analysis of block ciphers. Tsinghua University Press, Beijing
11.
Zurück zum Zitat Shah T, Hussain I, Gondal MA, Mahmood H (2011) Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int J Phy Sci 6(16):4110–4127 Shah T, Hussain I, Gondal MA, Mahmood H (2011) Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int J Phy Sci 6(16):4110–4127
Metadaten
Titel
A group theoretic approach to construct cryptographically strong substitution boxes
verfasst von
Iqtadar Hussain
Tariq Shah
Muhammad Asif Gondal
Waqar Ahmad Khan
Hasan Mahmood
Publikationsdatum
01.07.2013
Verlag
Springer-Verlag
Erschienen in
Neural Computing and Applications / Ausgabe 1/2013
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-012-0914-5

Weitere Artikel der Ausgabe 1/2013

Neural Computing and Applications 1/2013 Zur Ausgabe