Skip to main content
Top
Published in: Wireless Personal Communications 2/2020

11-07-2020

A Novel Application of Elliptic Curves in the Dynamical Components of Block Ciphers

Authors: Shabieh Farwa, Ayesha Sohail, Nazeer Muhammad

Published in: Wireless Personal Communications | Issue 2/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The proposed work deals with a distinguished application of complex algebraic-geometric structure in nonlinear dynamical components of block ciphers. Due to the complex algebraic structure of the elliptic curves, their application in public-key cryptography has gained immense importance in recent years. The presented study introduces an effective application of elliptic curves in the nonlinear components, used in a symmetric-key cryptosystem. We propose that the group law defined on the rational points of an elliptic curve, over the binary field, offers extra-ordinary technical advantages, when used in the byte substitution process in block ciphers. For this purpose a specific elliptic curve over the Galois field \({\mathbb {F}}_{2^{4}}\) is selected that is special as its elliptic group is of the same order as that of \({\mathbb {F}}_{2^{4}}\). This feature helps us defining a bijective map between the two structures that renders highly increased level of perplexity and confusion in data. The cryptographic forte of the proposed method is tested through most significant analyses and when compared with one of the most recent schemes, it shows outstanding results.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.MathSciNetMATH Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.MathSciNetMATH
2.
3.
go back to reference Miller, V. S. (1986). Use of elliptic curves in cryptography. In Advances in cryptology-CRYPTO’85 (pp. 417–426). Berlin: Springer Miller, V. S. (1986). Use of elliptic curves in cryptography. In Advances in cryptology-CRYPTO’85 (pp. 417–426). Berlin: Springer
4.
go back to reference Jarvinen, K., & Skytta, J. (2008). On parallelization of high-speed processors for elliptic curve cryptography. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 16(9), 1162–1171. Jarvinen, K., & Skytta, J. (2008). On parallelization of high-speed processors for elliptic curve cryptography. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 16(9), 1162–1171.
5.
go back to reference Teeriaho, J. (2011). Cyclic group cryptography with elliptic curves, Brasov. Teeriaho, J. (2011). Cyclic group cryptography with elliptic curves, Brasov.
6.
go back to reference Tawalbeh, L., Mowafi, M., & Aljoby, W. (2012). Use of elliptic curve cryptography for multimedia encryption. IET Information Security, 7(2), 67–74. Tawalbeh, L., Mowafi, M., & Aljoby, W. (2012). Use of elliptic curve cryptography for multimedia encryption. IET Information Security, 7(2), 67–74.
8.
go back to reference Hayat, U., Azam, N. A., & Asif, M. (2018). A method of generating \(8 \times 8\) substitution boxes based on elliptic curves. Wireless Personal Communications, 101, 439–451. Hayat, U., Azam, N. A., & Asif, M. (2018). A method of generating \(8 \times 8\) substitution boxes based on elliptic curves. Wireless Personal Communications, 101, 439–451.
9.
go back to reference Silverman, J. H. (1994). The arithmetic of elliptic curves. Graduate texts in mathematics (Vol. 106). New York: Springer. Silverman, J. H. (1994). The arithmetic of elliptic curves. Graduate texts in mathematics (Vol. 106). New York: Springer.
10.
go back to reference Hankerson, G., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. New York: Springer.MATH Hankerson, G., Menezes, A., & Vanstone, S. (2004). Guide to elliptic curve cryptography. New York: Springer.MATH
11.
go back to reference Ansari, B., & Hasan, M. (2008). High-performance architecture of elliptic curve scalar multiplication. IEEE Transactions on Computers, 57(11), 1443–1453.MathSciNetMATH Ansari, B., & Hasan, M. (2008). High-performance architecture of elliptic curve scalar multiplication. IEEE Transactions on Computers, 57(11), 1443–1453.MathSciNetMATH
13.
go back to reference Blondeau, C., & Nyberg, K. (2015). Perfect nonlinear functions and cryptography. Finite Fields and Their Applications, 32, 120–147.MathSciNetMATH Blondeau, C., & Nyberg, K. (2015). Perfect nonlinear functions and cryptography. Finite Fields and Their Applications, 32, 120–147.MathSciNetMATH
Metadata
Title
A Novel Application of Elliptic Curves in the Dynamical Components of Block Ciphers
Authors
Shabieh Farwa
Ayesha Sohail
Nazeer Muhammad
Publication date
11-07-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2020
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07628-0

Other articles of this Issue 2/2020

Wireless Personal Communications 2/2020 Go to the issue