A novel method to generate key-dependent s-boxes with identical algebraic properties

被引:15
作者
Al-Dweik, Ahmad Y. [1 ]
Hussain, Iqtadar [1 ]
Saleh, Moutaz [2 ]
Mustafa, M. T. [1 ]
机构
[1] Qatar Univ, Coll Arts & Sci, Dept Math Stat & Phys, Doha 2713, Qatar
[2] Qatar Univ, Dept Comp Sci & Engn, Coll Engn, Doha 2713, Qatar
关键词
Cryptography; Key-dependent s-boxes; Permutation; Bijection; Nonlinearity; Strict avalanche criterion; Bits independence criterion; Invariant; BLOCK CIPHER; AES;
D O I
10.1016/j.jisa.2021.103065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The s-box plays the vital role of creating confusion between the ciphertext and secret key in any cryptosystem, and is the only nonlinear component in many block ciphers. Dynamic s-boxes, as compared to static, improve entropy of the system, hence leading to better resistance against linear and differential attacks. It was shown in Easttom (2018) that while incorporating dynamic s-boxes in cryptosystems is sufficiently secure, they do not keep non-linearity invariant. This work provides an algorithmic scheme to generate key-dependent dynamic n x n clone s-boxes having the same algebraic properties namely bijection, nonlinearity, the strict avalanche criterion (SAC), the output bits independence criterion (BIC) as of the initial seed s-box. The method is based on group action of symmetric group S-n and a subgroup S-2n respectively on columns and rows of Boolean functions (GF(2(n)) -> GF(2)) of s-box. Invariance of the bijection, nonlinearity, SAC, and BIC for the generated clone copies is proved. As illustration, examples are provided for n = 8 and n = 4 along with comparison of the algebraic properties of the clone and initial seed s-box. The proposed method is an extension of Hussain et al. (2012); Hussain et al. (2012); Hussain et al. (2018); Anees and Chen (2020) which involved group action of S-8 only on columns of Boolean functions (GF(2(8)) -> GF(2) ) of s-box. For n = 4, we have used an initial 4 x 4 s-box constructed by Carlisle Adams and Stafford Tavares (Adams and Tavares, 1990) to generated (4!)(2) clone copies. For n = 8, it can be seen (Hussain et al. (2012); Hussain et al. (2012); Hussain et al. (2018); Anees and Chen (2020)) that the number of clone copies that can be constructed by permuting the columns is 8!. For each column permutation, the proposed method enables to generate 8! clone copies by permuting the rows.
引用
收藏
页数:7
相关论文
共 38 条
[1]  
Adams C., 1990, Journal of Cryptology, V3, P27, DOI 10.1007/BF00203967
[2]  
Adi Narayana Reddy K., 2014, INT J SECUR
[3]  
Agarwal P., 2018, ADV MECH ENG
[4]  
Ahmad M., 2014, INT C SEC COMP NETW, P540
[5]  
Ahmed F., 2013, INT J COMPUT COMMUN
[6]   Designing secure substitution boxes based on permutation of symmetric group [J].
Anees, Amir ;
Chen, Yi-Ping Phoebe .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (11) :7045-7056
[7]  
Anna G., 2011, Annales UMCS Informatica AI XI, V2, P37
[8]  
Arrag S., 2013, J THEOR APPL INF TEC
[9]   Secure image encryption algorithm design using a novel chaos based S-Box [J].
Cavusoglu, Unal ;
Kacar, Sezgin ;
Pehlivan, Ihsan ;
Zengin, Ahmet .
CHAOS SOLITONS & FRACTALS, 2017, 95 :92-101
[10]  
Cui JE, 2011, INT J INNOV COMPUT I, V7, P2291