Skip to main content
Top

2018 | OriginalPaper | Chapter

Heuristic Approach for Nonlinear n × n (3 ≤ n ≤ 7) Substitution-Boxes

Authors : Musheer Ahmad, M. Alauddin, Hamed D. AlSharari

Published in: Data Engineering and Intelligent Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Substitution boxes are meant to enact nonlinear transformations of n-bit input streams to n-bit output streams. A highly nonlinear essence of them is imperative to induce obligatory confusion of data and to mitigate the potential linear cryptanalysis as well. It has been known that cryptographically potent S-boxes are creditworthy for the success of modern block encryption systems. This paper proposes to suggest an approach to frame a generic design that has the efficacy of synthesizing highly nonlinear balanced n × n S-boxes for 3 ≤ n ≤ 7. The proposed approach is based on the heuristic optimization that seeks for local and global best S-box candidates on each iteration. The resultant optimized S-boxes are provided and tested for nonlinearity soundness. The performance outcomes and assessment analysis justify that the generic approach is consistent for contriving highly nonlinear key-dependent S-boxes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Feistel, H.: Cryptography and computer privacy. Sci. Am. 228(5), 15–23 (1973)CrossRef Feistel, H.: Cryptography and computer privacy. Sci. Am. 228(5), 15–23 (1973)CrossRef
2.
go back to reference Stinson, D.R.: Cryptography: Theory and Practice. CRC Press (2005) Stinson, D.R.: Cryptography: Theory and Practice. CRC Press (2005)
3.
go back to reference Wood, C.A.: Large substitution boxes with efficient combinational implementations, M.S. thesis, Rochester Institute of Technology (2013) Wood, C.A.: Large substitution boxes with efficient combinational implementations, M.S. thesis, Rochester Institute of Technology (2013)
4.
go back to reference Burnett, L.: Heuristic optimization of Boolean functions and substitution boxes for cryptography. Ph.D. dissertation, Queensland University of Technology (2005) Burnett, L.: Heuristic optimization of Boolean functions and substitution boxes for cryptography. Ph.D. dissertation, Queensland University of Technology (2005)
5.
go back to reference Nedjah, N., Mourelle, L.D.M.: Designing substitution boxes for secure ciphers. Int. J. Innov. Comput. Appl. 1(1), 86–91 (2007)CrossRef Nedjah, N., Mourelle, L.D.M.: Designing substitution boxes for secure ciphers. Int. J. Innov. Comput. Appl. 1(1), 86–91 (2007)CrossRef
6.
go back to reference Daemen, J., Rijmen, V.: The Design of Rijndael: AES—The Advanced Encryption Standard. Springer (2002) Daemen, J., Rijmen, V.: The Design of Rijndael: AES—The Advanced Encryption Standard. Springer (2002)
7.
go back to reference Ahmad, M., Bhatia, D., Hassan, Y.: A novel ant colony optimization based scheme for substitution box design. Proc. Comput. Sci. 57, 572–580 (2015)CrossRef Ahmad, M., Bhatia, D., Hassan, Y.: A novel ant colony optimization based scheme for substitution box design. Proc. Comput. Sci. 57, 572–580 (2015)CrossRef
8.
go back to reference Lambić, D.: A novel method of S-box design based on chaotic map and composition method. Chaos, Solitons Fract. 58, 16–21 (2014)CrossRefMATH Lambić, D.: A novel method of S-box design based on chaotic map and composition method. Chaos, Solitons Fract. 58, 16–21 (2014)CrossRefMATH
9.
go back to reference Ahmad, M., Chugh, H., Goel, A., Singla, P.: A chaos based method for efficient cryptographic S-box design. In: Thampi, S.M., Atrey, P.K., Fan, C.-I., Pérez, G.M. (eds.) SSCC 2013, CCIS 377, pp. 130–137 (2013) Ahmad, M., Chugh, H., Goel, A., Singla, P.: A chaos based method for efficient cryptographic S-box design. In: Thampi, S.M., Atrey, P.K., Fan, C.-I., Pérez, G.M. (eds.) SSCC 2013, CCIS 377, pp. 130–137 (2013)
10.
go back to reference Cui, L., Cao, Y.: A new S-box structure named affine-power-affine. Int. J. Innov. Comput. Inf. Control 3(3), 751–759 (2007) Cui, L., Cao, Y.: A new S-box structure named affine-power-affine. Int. J. Innov. Comput. Inf. Control 3(3), 751–759 (2007)
11.
go back to reference Tran, M.T., Bui, D.K. Duong, A.D.: Gray S-box for advanced encryption standard. In: International Conference on Computational Intelligence and Security, pp. 253–258 (2008) Tran, M.T., Bui, D.K. Duong, A.D.: Gray S-box for advanced encryption standard. In: International Conference on Computational Intelligence and Security, pp. 253–258 (2008)
12.
go back to reference Wang, Y., Wong, K.W., Li, C., Li, Y.: A novel method to design S-box based on chaotic map and genetic algorithm. Phys. Lett. A 376(6), 827–833 (2012)CrossRefMATH Wang, Y., Wong, K.W., Li, C., Li, Y.: A novel method to design S-box based on chaotic map and genetic algorithm. Phys. Lett. A 376(6), 827–833 (2012)CrossRefMATH
13.
go back to reference Millan, W.: How to improve the nonlinearity of bijective S-Boxes. In: Australasian Conference on Information Security and Privacy. Lecture Notes in Computer Science, vol. 1438, pp. 181–192 (1998) Millan, W.: How to improve the nonlinearity of bijective S-Boxes. In: Australasian Conference on Information Security and Privacy. Lecture Notes in Computer Science, vol. 1438, pp. 181–192 (1998)
14.
go back to reference Fuller, J., Millan, W., Dawson, E.: Multi-objective optimisation of bijective S-boxes. New Gener. Comput. 23(3), 201–218 (2005)CrossRefMATH Fuller, J., Millan, W., Dawson, E.: Multi-objective optimisation of bijective S-boxes. New Gener. Comput. 23(3), 201–218 (2005)CrossRefMATH
15.
go back to reference Laskari, E.C., Meletiou, G.C., Vrahatis, M.N.: Utilizing evolutionary computation methods for the design of S-boxes, In: International Conference on Computational Intelligence and Security, pp. 1299–1302 (2006) Laskari, E.C., Meletiou, G.C., Vrahatis, M.N.: Utilizing evolutionary computation methods for the design of S-boxes, In: International Conference on Computational Intelligence and Security, pp. 1299–1302 (2006)
16.
go back to reference Alkhaldi, A.H., Hussain, I., Gondal, M.A.: A novel design for the construction of safe S-boxes based on TDERC sequence. Alexandria Eng. J. 54(1), 65–69 (2015)CrossRef Alkhaldi, A.H., Hussain, I., Gondal, M.A.: A novel design for the construction of safe S-boxes based on TDERC sequence. Alexandria Eng. J. 54(1), 65–69 (2015)CrossRef
17.
go back to reference Ahmad, M., Rizvi, D.R., Ahmad, Z.: PWLCM-based random search for strong substitution-box design. In: International Conference on Computer and Communication Technologies, pp. 471–478 (2015) Ahmad, M., Rizvi, D.R., Ahmad, Z.: PWLCM-based random search for strong substitution-box design. In: International Conference on Computer and Communication Technologies, pp. 471–478 (2015)
18.
go back to reference Ahmad, M., Ahmad, F., Nasim, Z., Bano, Z., Zafar, S.: Designing chaos based strong substitution box. In: International Conference on Contemporary Computing, pp. 97–100 (2015) Ahmad, M., Ahmad, F., Nasim, Z., Bano, Z., Zafar, S.: Designing chaos based strong substitution box. In: International Conference on Contemporary Computing, pp. 97–100 (2015)
19.
go back to reference Ahmad, M., Khan, P.M., Ansari, M.Z.: A simple and efficient key-dependent S-box design using fisher-yates shuffle technique. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 540–550 (2014) Ahmad, M., Khan, P.M., Ansari, M.Z.: A simple and efficient key-dependent S-box design using fisher-yates shuffle technique. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 540–550 (2014)
20.
go back to reference Ahmad, M., Malik, M.: Design of chaotic neural network based method for cryptographic substitution box. In: International Conference on Electrical, Electronics, and Optimization Techniques, pp. 864–868 (2016) Ahmad, M., Malik, M.: Design of chaotic neural network based method for cryptographic substitution box. In: International Conference on Electrical, Electronics, and Optimization Techniques, pp. 864–868 (2016)
21.
22.
go back to reference Matsui, M.: Linear cryptanalysis method of DES cipher. In: Advances in Cryptology: EuroCrypt’1993 Proceedings. Lecture Notes in Computer Science, vol. 765, pp. 386–397 (1994) Matsui, M.: Linear cryptanalysis method of DES cipher. In: Advances in Cryptology: EuroCrypt’1993 Proceedings. Lecture Notes in Computer Science, vol. 765, pp. 386–397 (1994)
23.
go back to reference Zeng, K., Yang, C.H., Rao, T.R.N.: On the linear consistency test in cryptanalysis with applications. In: Crypto 1989 Proceedings. Lecture Notes in Computer Science, vol. 435, pp. 167–174 (1990) Zeng, K., Yang, C.H., Rao, T.R.N.: On the linear consistency test in cryptanalysis with applications. In: Crypto 1989 Proceedings. Lecture Notes in Computer Science, vol. 435, pp. 167–174 (1990)
24.
go back to reference Li, S., Li, Q., Li, W., Mou, X. and Cai, Y., Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding. In: IMA International Conference on Cryptography and Coding, 205–221 (2001) Li, S., Li, Q., Li, W., Mou, X. and Cai, Y., Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding. In: IMA International Conference on Cryptography and Coding, 205–221 (2001)
25.
go back to reference Cusick, T.W., Stanica, P.: Cryptographic Boolean Functions and Applications. Elsevier, Amsterdam (2009)MATH Cusick, T.W., Stanica, P.: Cryptographic Boolean Functions and Applications. Elsevier, Amsterdam (2009)MATH
26.
go back to reference Hussain, I., Shah, T.: Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dyn. 74(4), 869–904 (2013)MathSciNetCrossRefMATH Hussain, I., Shah, T.: Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dyn. 74(4), 869–904 (2013)MathSciNetCrossRefMATH
27.
go back to reference Helleseth, T., Klve, T., Mykkelveit, J.: On the covering radius of binary codes. IEEE Trans. Inf. Theor. 24(5), 627–628 (1978)MathSciNetCrossRef Helleseth, T., Klve, T., Mykkelveit, J.: On the covering radius of binary codes. IEEE Trans. Inf. Theor. 24(5), 627–628 (1978)MathSciNetCrossRef
28.
go back to reference Patterson, N.J., Wiedemann, D.H.: The covering radius of the [215, 16] Reed-Muller code is at least 16276. IEEE Trans. Inf. Theor. 29(3), 354–356 (1983)CrossRefMATH Patterson, N.J., Wiedemann, D.H.: The covering radius of the [215, 16] Reed-Muller code is at least 16276. IEEE Trans. Inf. Theor. 29(3), 354–356 (1983)CrossRefMATH
Metadata
Title
Heuristic Approach for Nonlinear n × n (3 ≤ n ≤ 7) Substitution-Boxes
Authors
Musheer Ahmad
M. Alauddin
Hamed D. AlSharari
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3223-3_33

Premium Partner