Skip to main content
Top
Published in: Wireless Personal Communications 4/2021

21-05-2021

Parent–Daughter Confusion Component: A New Approach for the Construction of Nonlinear Confusion Component

Authors: Faiza Firdousi, Majid Khan, Sajjad Shaukat Jamal, Naeem Faraz

Published in: Wireless Personal Communications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The nonlinear confusion component is one of an integral part of any modern block cipher. This nonlinear confusion component is used to hides the relationship between the ciphertext and the key. The primary objective of this article is to formulate a new mechanism for the construction this confusion component. Usually substitution box (S-box) is used to achieve this kind of characteristics in block ciphers. We have utilized deoxyribonucleic acid (DNA) sequences for the construction of new S-boxes with optimized cryptographic characteristics. The projected technique fundamentally optimized the DNA sequences along with traditional confusion component to generate a completely new S-box. The obtained S-boxes have the same cryptographic strength as a parent S-box have.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Cui, J., Huang, L., Zhong, H., Chang, C., & Yang, W. (2011). An improved AES S-box and its performance analysis. International Journal of Innovative Computing, Information and Control, 7(5), 2291–2302. Cui, J., Huang, L., Zhong, H., Chang, C., & Yang, W. (2011). An improved AES S-box and its performance analysis. International Journal of Innovative Computing, Information and Control, 7(5), 2291–2302.
2.
go back to reference Liu, J., Wei, B., Cheng, X., & Wang, X. (2005). An AES S-box to increase complexity and cryptographic analysis. In 19th international conference on advanced information networking and applications (AINA'05) Volume 1 (AINA papers) (Vol. 1, pp. 724–728). IEEE. Liu, J., Wei, B., Cheng, X., & Wang, X. (2005). An AES S-box to increase complexity and cryptographic analysis. In 19th international conference on advanced information networking and applications (AINA'05) Volume 1 (AINA papers) (Vol. 1, pp. 724–728). IEEE.
3.
go back to reference Cui, L., & Cao, Y. (2007). A new S-box structure named affine-power-affine. International Journal of Innovative Computing, Information and Control, 3(3), 751–759. Cui, L., & Cao, Y. (2007). A new S-box structure named affine-power-affine. International Journal of Innovative Computing, Information and Control, 3(3), 751–759.
4.
go back to reference Hussain, I., Shah, T., & Mahmood, H. (2010). A new algorithm to construct secure keys for AES. International Journal of Contemporary Mathematical Sciences, 5(26), 1263–1270.MathSciNetMATH Hussain, I., Shah, T., & Mahmood, H. (2010). A new algorithm to construct secure keys for AES. International Journal of Contemporary Mathematical Sciences, 5(26), 1263–1270.MathSciNetMATH
5.
go back to reference Tran, M. T., Bui, D. K., & Duong, A. D. (2008). Gray S-box for advanced encryption standard. In 2008 international conference on computational intelligence and security (Vol. 1, pp. 253–258). IEEE. Tran, M. T., Bui, D. K., & Duong, A. D. (2008). Gray S-box for advanced encryption standard. In 2008 international conference on computational intelligence and security (Vol. 1, pp. 253–258). IEEE.
6.
go back to reference Ahmad, M., & AlSharari, H. D. (2016). Rotation-k affine-power-affine-like multiple substitution-boxes for secure communication. arXiv preprint arXiv:1607.05024. Ahmad, M., & AlSharari, H. D. (2016). Rotation-k affine-power-affine-like multiple substitution-boxes for secure communication. arXiv preprint arXiv:1607.​05024.
7.
go back to reference Hussain, I., Shah, T., Gondal, M. A., & Mahmood, H. (2012). S 8 affine-power-affine S-boxes and their applications. Neural Computing and Applications, 21(1), 377–383.CrossRef Hussain, I., Shah, T., Gondal, M. A., & Mahmood, H. (2012). S 8 affine-power-affine S-boxes and their applications. Neural Computing and Applications, 21(1), 377–383.CrossRef
8.
go back to reference Jain, A., Agarwal, P., Jain, R., & Singh, V. (2014). Chaotic image encryption technique using S-box based on DNA approach. International Journal of Computer Applications, 92(13), 30–34.CrossRef Jain, A., Agarwal, P., Jain, R., & Singh, V. (2014). Chaotic image encryption technique using S-box based on DNA approach. International Journal of Computer Applications, 92(13), 30–34.CrossRef
9.
go back to reference Al-Wattar, A. S., Mahmod, R., Zukarnain, Z. A., & Udzir, N. I. (2015). Generating a new S-Box inspired by biological DNA. International Journal of Computer Science and Application, 4(1), 32–42.CrossRef Al-Wattar, A. S., Mahmod, R., Zukarnain, Z. A., & Udzir, N. I. (2015). Generating a new S-Box inspired by biological DNA. International Journal of Computer Science and Application, 4(1), 32–42.CrossRef
10.
go back to reference Alabaichi, A. (2018). True color image encryption based on DNA sequence, 3D chaotic map, and key-dependent DNA S-box of AES. Journal of Theoretical & Applied Information Technology, 96(2), 304–321. Alabaichi, A. (2018). True color image encryption based on DNA sequence, 3D chaotic map, and key-dependent DNA S-box of AES. Journal of Theoretical & Applied Information Technology, 96(2), 304–321.
11.
go back to reference Kadhim, F. A., Majeed, G. H. A., & Ali, R. S. (2016). Proposal new s-box depending on DNA computing and mathematical operations. In 2016 Al-Sadeq international conference on multidisciplinary in IT and communication science and applications (AIC-MITCSA) (pp. 1–6). IEEE. Kadhim, F. A., Majeed, G. H. A., & Ali, R. S. (2016). Proposal new s-box depending on DNA computing and mathematical operations. In 2016 Al-Sadeq international conference on multidisciplinary in IT and communication science and applications (AIC-MITCSA) (pp. 1–6). IEEE.
12.
go back to reference Ahmad, M., Mittal, N., Garg, P., & Khan, M. M. (2016). Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspectives in Science, 8, 465–468.CrossRef Ahmad, M., Mittal, N., Garg, P., & Khan, M. M. (2016). Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspectives in Science, 8, 465–468.CrossRef
13.
go back to reference Yi, X., Cheng, S. X., You, X. H., & Lam, K. Y. (1997). A method for obtaining cryptographically strong 8×8 S-boxes. In GLOBECOM 97. IEEE global telecommunications conference. conference record (Vol. 2, pp. 689–693). IEEE. Yi, X., Cheng, S. X., You, X. H., & Lam, K. Y. (1997). A method for obtaining cryptographically strong 8×8 S-boxes. In GLOBECOM 97. IEEE global telecommunications conference. conference record (Vol. 2, pp. 689–693). IEEE.
14.
go back to reference Alghafis, A., Munir, N., & Khan, M. (2021). An encryption scheme based on chaotic Rabinovich–Fabrikant system and S8 confusion component. Multimedia Tools and Applications, 80(5), 7967–7985.CrossRef Alghafis, A., Munir, N., & Khan, M. (2021). An encryption scheme based on chaotic Rabinovich–Fabrikant system and S8 confusion component. Multimedia Tools and Applications, 80(5), 7967–7985.CrossRef
15.
go back to reference Waseem, H. M., Khan, M., & Shah, T. (2018). Image privacy scheme using quantum spinning and rotation. Journal of Electronic Imaging, 63022(1). Waseem, H. M., Khan, M., & Shah, T. (2018). Image privacy scheme using quantum spinning and rotation. Journal of Electronic Imaging, 63022(1).
16.
go back to reference Khan, M., & Waseem, H. M. (2019). A novel digital contents privacy scheme based on Kramer’s arbitrary spin. International Journal of Theoretical Physics, 58(8), 2720–2743.MathSciNetCrossRef Khan, M., & Waseem, H. M. (2019). A novel digital contents privacy scheme based on Kramer’s arbitrary spin. International Journal of Theoretical Physics, 58(8), 2720–2743.MathSciNetCrossRef
17.
go back to reference Ali, K. M., & Khan, M. (2019). A new construction of confusion component of block ciphers. Multimedia Tools and Applications, 78(22), 32585–32604.CrossRef Ali, K. M., & Khan, M. (2019). A new construction of confusion component of block ciphers. Multimedia Tools and Applications, 78(22), 32585–32604.CrossRef
19.
go back to reference Munir, N., Khan, M., Shah, T., Alanazi, A. S., & Hussain, I. (2021). Cryptanalysis of nonlinear confusion component based encryption algorithm. Integration, 79, 41–47.CrossRef Munir, N., Khan, M., Shah, T., Alanazi, A. S., & Hussain, I. (2021). Cryptanalysis of nonlinear confusion component based encryption algorithm. Integration79, 41–47.CrossRef
20.
go back to reference Tariq, S., Elmoasry, A., Batool, S. I., & Khan, M. (2020). Quantum harmonic oscillator and schrodinger paradox based nonlinear confusion component. International Journal of Theoretical Physics, 59(11), 3558–3573.MathSciNetCrossRef Tariq, S., Elmoasry, A., Batool, S. I., & Khan, M. (2020). Quantum harmonic oscillator and schrodinger paradox based nonlinear confusion component. International Journal of Theoretical Physics, 59(11), 3558–3573.MathSciNetCrossRef
21.
go back to reference Hall-Beyer, M. (2000). GLCM texture: a tutorial. National Council on Geographic Information and Analysis Remote Sensing Core Curriculum, 3, 1–75. Hall-Beyer, M. (2000). GLCM texture: a tutorial. National Council on Geographic Information and Analysis Remote Sensing Core Curriculum3, 1–75.
22.
go back to reference Dhanashree, G. (2004). Image quality analysis using GLCM. Electronic Theses and Dissertations, 2004–2019 1–121. Dhanashree, G. (2004). Image quality analysis using GLCM. Electronic Theses and Dissertations, 2004–2019 1–121.
23.
go back to reference Webster, A. F., & Tavares, S. E. (1985). On the design of S-boxes. In Conference on the theory and application of cryptographic techniques (pp. 523–534). Springer, Berlin, Heidelberg. Webster, A. F., & Tavares, S. E. (1985). On the design of S-boxes. In Conference on the theory and application of cryptographic techniques (pp. 523–534). Springer, Berlin, Heidelberg.
24.
go back to reference Carlet, C., Heuser, A., & Picek, S. (2017). Trade-offs for S-boxes: cryptographic properties and side-channel resilience. In International conference on applied cryptography and network security (pp. 393–414). Springer, Cham. Carlet, C., Heuser, A., & Picek, S. (2017). Trade-offs for S-boxes: cryptographic properties and side-channel resilience. In International conference on applied cryptography and network security (pp. 393–414). Springer, Cham.
25.
go back to reference Bakoev, V. (2017). Fast bitwise implementation of the algebraic normal form transform. Serdica Journal of Computing, 11(1), 045p–057p.MathSciNetMATH Bakoev, V. (2017). Fast bitwise implementation of the algebraic normal form transform. Serdica Journal of Computing, 11(1), 045p–057p.MathSciNetMATH
26.
go back to reference Wu, C. K., & Feng, D. (2016). Boolean function representation of S-boxes and boolean permutations. In Boolean functions and their applications in cryptography (pp. 217–241). Springer, Berlin, Heidelberg. Wu, C. K., & Feng, D. (2016). Boolean function representation of S-boxes and boolean permutations. In Boolean functions and their applications in cryptography (pp. 217–241). Springer, Berlin, Heidelberg.
27.
go back to reference Cheung, J. M. (2010). The design of S-boxes (Doctoral dissertation, Sciences). Cheung, J. M. (2010). The design of S-boxes (Doctoral dissertation, Sciences).
28.
go back to reference Braeken, A. (2006). Cryptographic properties of Boolean functions and S-boxes (Doctoral dissertation, phd thesis-2006). Braeken, A. (2006). Cryptographic properties of Boolean functions and S-boxes (Doctoral dissertation, phd thesis-2006).
29.
go back to reference Meier, W., Pasalic, E., & Carlet, C. (2004). Algebraic attacks and decomposition of Boolean functions. In International conference on the theory and applications of cryptographic techniques (pp. 474–491). Springer, Berlin, Heidelberg. Meier, W., Pasalic, E., & Carlet, C. (2004). Algebraic attacks and decomposition of Boolean functions. In International conference on the theory and applications of cryptographic techniques (pp. 474–491). Springer, Berlin, Heidelberg.
30.
go back to reference Courtois, N. T., & Pieprzyk, J. (2002). Cryptanalysis of block ciphers with overdefined systems of equations. In International conference on the theory and application of cryptology and information security (pp. 267–287). Springer, Berlin, Heidelberg. Courtois, N. T., & Pieprzyk, J. (2002). Cryptanalysis of block ciphers with overdefined systems of equations. In International conference on the theory and application of cryptology and information security (pp. 267–287). Springer, Berlin, Heidelberg.
31.
go back to reference Dalai, D. K., & Maitra, S. (2009). Algebraic immunity of boolean functions-analysis and construction. Computación y Sistemas, 12(3), 297–321. Dalai, D. K., & Maitra, S. (2009). Algebraic immunity of boolean functions-analysis and construction. Computación y Sistemas, 12(3), 297–321.
32.
go back to reference Crama, Y., & Hammer, P. L. (Eds.). (2010). Boolean models and methods in mathematics, computer science, and engineering. (Vol. 2)Cambridge: Cambridge University Press.MATH Crama, Y., & Hammer, P. L. (Eds.). (2010). Boolean models and methods in mathematics, computer science, and engineering. (Vol. 2)Cambridge: Cambridge University Press.MATH
33.
go back to reference Burnett, L. D. (2005). Heuristic optimization of Boolean functions and substitution boxes for cryptography (Doctoral dissertation, Queensland University of Technology). Burnett, L. D. (2005). Heuristic optimization of Boolean functions and substitution boxes for cryptography (Doctoral dissertation, Queensland University of Technology).
34.
go back to reference Preneel, B., Van Leekwijck, W., Van Linden, L., Govaerts, R., & Vandewalle, J. (1990). Propagation characteristics of Boolean functions. In Workshop on the theory and application of of cryptographic techniques (pp. 161–173). Springer, Berlin, Heidelberg. Preneel, B., Van Leekwijck, W., Van Linden, L., Govaerts, R., & Vandewalle, J. (1990). Propagation characteristics of Boolean functions. In Workshop on the theory and application of of cryptographic techniques (pp. 161–173). Springer, Berlin, Heidelberg.
35.
go back to reference Kazymyrov, O., & Kazymyrova, V. (2013). Extended criterion for absence of fixed points. In Pre-proceedings of 2nd workshop on current trends in cryptology (CTCrypt 2013) (pp. 177–191). Kazymyrov, O., & Kazymyrova, V. (2013). Extended criterion for absence of fixed points. In Pre-proceedings of 2nd workshop on current trends in cryptology (CTCrypt 2013) (pp. 177–191).
Metadata
Title
Parent–Daughter Confusion Component: A New Approach for the Construction of Nonlinear Confusion Component
Authors
Faiza Firdousi
Majid Khan
Sajjad Shaukat Jamal
Naeem Faraz
Publication date
21-05-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08601-1

Other articles of this Issue 4/2021

Wireless Personal Communications 4/2021 Go to the issue