Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher

被引:3
作者
Rehman, Hafeez Ur [1 ]
Shah, Tariq [1 ]
Hazzazi, Mohammad Mazyad [2 ]
Alshehri, Ali [3 ]
Zaid, Bassfar [4 ]
机构
[1] Quaid I Azam Univ, Dept Math, Islamabad, Pakistan
[2] King Khalid Univ, Dept Math, Coll Sci, Abha, Saudi Arabia
[3] Univ Tabuk, Dept Comp Sci, Tabuk 71491, Saudi Arabia
[4] Univ Tabuk, Dept Informat Technol, Tabuk 71491, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 02期
关键词
Galois field; Mordell elliptic curve; nonlinearity; substitution box; S-BOXES; CONSTRUCTION; SCHEME; ALGORITHM; CHAOS;
D O I
10.32604/cmc.2022.028765
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Elliptic curves (ECs) are deemed one of the most solid structures against modern computational attacks because of their small key size and high security. In many well-known cryptosystems, the substitution box (Sbox) is used as the only nonlinear portion of a security system. Recently, it has been shown that using dynamic S-boxes rather than static S-boxes increases the security of a cryptosystem. The conferred study also extends the practical application of ECs in designing the nonlinear components of block ciphers in symmetric key cryptography. In this study, instead of the Mordell elliptic curve (MEC) over the prime field, the Galois field has been engaged in constructing the S-boxes, the main nonlinear component of the block ciphers. Also, the proposed scheme uses the coordinates of MEC and the operation of the Galois field to generate a higher number of S-boxes with optimal nonlinearity, which increases the security of cryptosystems. The proposed S-boxes resilience against prominent algebraic and statistical attacks is evaluated to determine its potential to induce confusion and produce acceptable results compared to other schemes. Also, the majority logic criteria (MLC) are used to assess the new S-boxes usage in the image encryption application, and the outcomes indicate that they have significant cryptographic strength.
引用
收藏
页码:2913 / 2930
页数:18
相关论文
共 47 条
[1]  
Adams C., 1990, Journal of Cryptology, V3, P27, DOI 10.1007/BF00203967
[2]   Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field [J].
Azam, Naveed Ahmed ;
Hayat, Umar ;
Ullah, Ikram .
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 20 (10) :1378-1389
[3]   An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization [J].
Azam, Naveed Ahmed ;
Hayat, Umar ;
Ullah, Ikram .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[4]   A simple yet efficient S-box method based on chaotic sine map [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. .
OPTIK, 2017, 130 :1438-1444
[5]   Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms [J].
Belazi, Akram ;
El-Latif, Ahmed A. Abd ;
Diaconu, Adrian-Viorel ;
Rhouma, Rhouma ;
Belghith, Safya .
OPTICS AND LASERS IN ENGINEERING, 2017, 88 :37-50
[6]  
Benvenuto C.J., 2012, Galois field in cryptography, V1, P1
[7]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2
[8]   A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system [J].
Cavusoglu, Unal ;
Zengin, Ahmet ;
Pehlivan, Ihsan ;
Kacar, Sezgin .
NONLINEAR DYNAMICS, 2017, 87 (02) :1081-1094
[9]  
Cheon JH, 1999, LECT NOTES COMPUT SC, V1592, P286
[10]  
Cui LG, 2007, INT J INNOV COMPUT I, V3, P751