A novel framework for the construction of cryptographically secure S-boxes

被引:0
|
作者
Arshad, Razi [1 ]
Jalil, Mudassir [2 ]
Hussain, Muzamal [3 ]
Tounsi, Abdelouahed [4 ,5 ]
机构
[1] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Dept Comp, Islamabad 44000, Pakistan
[2] Comsats Univ Islamabad, Dept Math, Islamabad 44000, Pakistan
[3] Islamia Univ Bahawalpur, Dept Math, Sahiwal 57000, Punjab, Pakistan
[4] Yonsei Univ, Yonsei Frontier Lab YFL, Seoul, South Korea
[5] King Fahd Univ Petr & Minerals, Dept Civil & Environm Engn, Dhahran 31261, Eastern Provinc, Saudi Arabia
来源
COMPUTERS AND CONCRETE | 2024年 / 34卷 / 01期
关键词
block cipher; image encryption; linear fractional transformation; permutation function; substitution-box; SCHEME;
D O I
10.12989/cac.2024.34.1.833
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In symmetric cryptography, a cryptographically secure Substitution -Box (S -Box) is a key component of a block cipher. S -Box adds a confusion layer in block ciphers that provide resistance against well-known attacks. The generation of a cryptographically secure S -Box depends upon its generation mechanism. In this paper, we propose a novel framework for the construction of cryptographically secure S -Boxes. This framework uses a combination of linear fractional transformation and permutation functions. S -Boxes security is analyzed against well-known security criteria that include nonlinearity, bijectiveness, strict avalanche and bits independence criteria, linear and differential approximation probability. The S -Boxes can be used in the encryption of any grayscale digital images. The encrypted images are analyzed against well-known image analysis criteria that include pixel changing rates, correlation, entropy, and average change of intensity. The analysis of the encrypted image shows that our image encryption scheme is secure.
引用
收藏
页码:833 / 845
页数:13
相关论文
共 50 条
  • [31] DEGENERATE S-BOXES
    Lisickiy, K. E.
    [J]. RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2018, (01) : 129 - 138
  • [32] Nonlinearities of S-boxes
    Carlet, Claude
    Ding, Cunsheng
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2007, 13 (01) : 121 - 135
  • [33] Construction of dynamical S-boxes based on image encryption approach
    Reza Hoseini
    Sohrab Behnia
    Siamak Sarmady
    Samira Fathizadeh
    [J]. Soft Computing, 2022, 26 : 13985 - 13997
  • [34] On the ability of AES S-Boxes to secure against correlation power analysis
    Liu, Zheng-lin
    Guo, Xu
    Chen, Yi-cheng
    Han, Yu
    Zou, Xue-cheng
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 43 - +
  • [35] Construction of S8 Liu J S-boxes and their applications
    Hussain, Iqtadar
    Shah, Tariq
    Mahmood, Hasan
    Gondal, Muhammad Asif
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 64 (08) : 2450 - 2458
  • [36] On the Construction of Side-Channel Attack Resilient S-boxes
    Lerman, Liran
    Veshchikov, Nikita
    Picek, Stjepan
    Markowitch, Olivier
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 102 - 119
  • [37] Construction of high degree resilient S-boxes with improved nonlinearity
    Gupta, KC
    Sarkar, P
    [J]. INFORMATION PROCESSING LETTERS, 2005, 95 (03) : 413 - 417
  • [38] Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog
    Perrin, Leo
    Udovenko, Aleksei
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) : 99 - 124
  • [39] An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes
    Piccione, Enrico
    Andreoli, Samuele
    Budaghyan, Lilya
    Carlet, Claude
    Dhooghe, Siemen
    Nikova, Svetla
    Petrides, George
    Rijmen, Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (10) : 6700 - 6710
  • [40] Construction and Optimization of Dynamic S-Boxes Based on Gaussian Distribution
    Alharbi, Adel R.
    Jamal, Sajjad Shaukat
    Khan, Muhammad Fahad
    Gondal, Mohammad Asif
    Abbasi, Aaqif Afzaal
    [J]. IEEE ACCESS, 2023, 11 : 35818 - 35829