Skip to main content
Top
Published in: Neural Computing and Applications 5/2023

19-10-2022 | Original Article

Utilizing the roulette wheel based social network search algorithm for substitution box construction and optimization

Authors: Kamal Z. Zamli, Hussam S. Alhadawi, Fakhrud Din

Published in: Neural Computing and Applications | Issue 5/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper introduces a new variant of a recent metaheuristic algorithm based on the Social Network Search algorithm (SNS), which is called the Roulette Wheel Social Network Search algorithm (SNS). As the name indicates, the main feature of RWSNS is the fact that the algorithm allows proportionate selection of its search operators (i.e., from imitation, conversation, disputation and innovation) through exploiting the roulette wheel. Additionally, RWSNS also incorporates the Piecewise map as replacement for the pseudo random generator during the population initialisation to ensure high nonlinearity and allow further solution diversification. Finally, unlike its predecessor, RWSNS also permits the systematic manipulation of candidate solutions around the global best agent through the swap operator to boost its search intensification process, as the global best candidate solution is often clustered and always lurking around the current local best. Results based on the construction of 8 × 8 substitution-box demonstrate that the proposed RWSNS exceeds other competing metaheuristic algorithms in two main S-box criteria, namely, the average nonlinearity score and strict avalanche criteria (i.e., SAC offset), whilst maintaining a commendable performance on bits independence criteria, differential approximation probability and linear approximation probability.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
7.
go back to reference Daemen J, Rijmen V (2020) The design of rijndael. In: Information security and cryptography, 2 edn. Springer-Verlag Berlin Heidelberg. Daemen J, Rijmen V (2020) The design of rijndael. In: Information security and cryptography, 2 edn. Springer-Verlag Berlin Heidelberg.
8.
go back to reference Nyberg K (1993) Differentially uniform mappings for cryptography. In: Proceedings of the Theory and Application of Cryptographic Techniques. pp 55–64 Nyberg K (1993) Differentially uniform mappings for cryptography. In: Proceedings of the Theory and Application of Cryptographic Techniques. pp 55–64
12.
go back to reference Abd El-Latif AA, Li L, Wang N, Li Q, Niu X (2012) A new image encryption based on chaotic systems and singular value decomposition. In: Proceedings of the Fourth International Conference on Digital Image Processing (ICDIP 2012). pp 83343F Abd El-Latif AA, Li L, Wang N, Li Q, Niu X (2012) A new image encryption based on chaotic systems and singular value decomposition. In: Proceedings of the Fourth International Conference on Digital Image Processing (ICDIP 2012). pp 83343F
14.
go back to reference Belazi A, Abd El-Latif AA, Rhouma R, BelghithS (2015) Selective image encryption scheme based on DWT, AES s-box and chaotic permutation. In: Proceedings of the 2015 International wireless communications and mobile computing conference (IWCMC). pp 606–610 Belazi A, Abd El-Latif AA, Rhouma R, BelghithS (2015) Selective image encryption scheme based on DWT, AES s-box and chaotic permutation. In: Proceedings of the 2015 International wireless communications and mobile computing conference (IWCMC). pp 606–610
15.
go back to reference Mohamed NA, El-Azeim MA, Zaghloul A, Abd El-Latif AA (2015) Image encryption scheme for secure digital images based on 3d cat map and turing machine. In: Proceedings of the 2015 7th international conference of soft computing and pattern recognition (SoCPaR). pp 230–234 Mohamed NA, El-Azeim MA, Zaghloul A, Abd El-Latif AA (2015) Image encryption scheme for secure digital images based on 3d cat map and turing machine. In: Proceedings of the 2015 7th international conference of soft computing and pattern recognition (SoCPaR). pp 230–234
35.
go back to reference Alhadawi HS, Salih SQ, SalmanYD (2021) Chaotic particle swarm optimization based on meeting room approach for designing bijective s-boxes. In: Proceedings of International Conference on Emerging Technologies and Intelligent Systems. pp 331–341 Alhadawi HS, Salih SQ, SalmanYD (2021) Chaotic particle swarm optimization based on meeting room approach for designing bijective s-boxes. In: Proceedings of International Conference on Emerging Technologies and Intelligent Systems. pp 331–341
41.
go back to reference Holland JH (1992) Adaptation in natural and artificial systems. 1975, University of Michigan Press, Ann Arbor, Michigan; re-issued by MIT Press. Holland JH (1992) Adaptation in natural and artificial systems. 1975, University of Michigan Press, Ann Arbor, Michigan; re-issued by MIT Press.
45.
go back to reference Webster AF, Tavares SE (1986) On the design of s-boxes. In: Proceedings of the advances in cryptology. Berlin, Heidelberg, pp 523–534 Webster AF, Tavares SE (1986) On the design of s-boxes. In: Proceedings of the advances in cryptology. Berlin, Heidelberg, pp 523–534
46.
go back to reference Matsui M (1994) Linear cryptanalysis method for des cipher. In: Proceedings of the Advances in Cryptology. Berlin, Heidelberg, pp 386–397 Matsui M (1994) Linear cryptanalysis method for des cipher. In: Proceedings of the Advances in Cryptology. Berlin, Heidelberg, pp 386–397
Metadata
Title
Utilizing the roulette wheel based social network search algorithm for substitution box construction and optimization
Authors
Kamal Z. Zamli
Hussam S. Alhadawi
Fakhrud Din
Publication date
19-10-2022
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 5/2023
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-022-07899-7

Other articles of this Issue 5/2023

Neural Computing and Applications 5/2023 Go to the issue

S.I. : Deep Geospatial Data Understanding

Unsupervised active learning with loss prediction

Premium Partner