共 1 条
A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field
被引:38
|作者:
Siddiqui, Nasir
[1
]
Yousaf, Fahim
[1
]
Murtaza, Fiza
[2
]
Ehatisham-ul-Haq, Muhammad
[3
]
Ashraf, M. Usman
[4
]
Alghamdi, Ahmed M.
[5
]
Alfakeeh, Ahmed S.
[6
]
机构:
[1] Univ Engn & Technol UET, Dept Basic Sci, Taxila, Punjab, India
[2] Inst Appl Sci & Technol, PakAustria Fachhochschule, Sinopak Ctr Artificial Intelligence, Haripur, Khyber Pakthunk, Pakistan
[3] Univ Engn & Technol UET, Dept Comp Engn, Taxila, Punjab, Pakistan
[4] Univ Management & Technol, Dept Comp Sci, Lahore, Punjab, Pakistan
[5] Univ Jeddah, Coll Comp Sci & Engn, Dept Software Engn, Jeddah, Saudi Arabia
[6] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Syst, Jeddah, Saudi Arabia
来源:
PLOS ONE
|
2020年
/
15卷
/
11期
关键词:
IMAGE ENCRYPTION;
GENERATION;
D O I:
10.1371/journal.pone.0241890
中图分类号:
O [数理科学和化学];
P [天文学、地球科学];
Q [生物科学];
N [自然科学总论];
学科分类号:
07 ;
0710 ;
09 ;
摘要:
Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic algorithms offering security facilities for maintaining more cover-ups. A substitution-box (S-box) is the lone component in a cryptosystem that gives rise to a nonlinear mapping between inputs and outputs, thus providing confusion in data. An S-box that possesses high nonlinearity and low linear and differential probability is considered cryptographically secure. In this study, a new technique is presented to construct cryptographically strong 8x8 S-boxes by applying an adjacency matrix on the Galois field GF(2(8)). The adjacency matrix is obtained corresponding to the coset diagram for the action of modular group PSL(2,Z) on a projective line PL(F-7) over a finite field F-7. The strength of the proposed S-boxes is examined by common S-box tests, which validate their cryptographic strength. Moreover, we use the majority logic criterion to establish an image encryption application for the proposed S-boxes. The encryption results reveal the robustness and effectiveness of the proposed S-box design in image encryption applications.
引用
收藏
页数:16
相关论文