A group theoretic approach to construct cryptographically strong substitution boxes

被引:0
作者
Iqtadar Hussain
Tariq Shah
Muhammad Asif Gondal
Waqar Ahmad Khan
Hasan Mahmood
机构
[1] Quaid-i-Azam University,Department of Mathematics
[2] National University of Computer and Emerging Sciences,Department of Sciences and Humanities
[3] Quaid-i-Azam University,Department of Electronics
来源
Neural Computing and Applications | 2013年 / 23卷
关键词
Substitution box (S-box); Möbius transformation; Majority logic criteria (MLC);
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we present a method to construct a substitution box used in encryption applications. The proposed algorithm for the construction of substitution box relies on the linear fractional transform method. The design methodology is simple, while the confusion-creating ability of the new substitution box is complex. The strength of the proposed substitution box is evaluated, and an insight is provided to quantify the confusion-creating ability. In addition, tests are performed to assess the vulnerability of the encrypted data to algebraic and statistical attacks. The substitution box is critically analyzed by strict avalanche criterion, bit independent criterion, differential approximation probability test, linear approximation probability test, non-linearity test, and majority logic criterion. The performance of the proposed substitution box is also compared with those of some of the well-known counterparts including AES, APA, Gray, S8, Skipjack, Xyi, and prime of residue substitution boxes. It is apparent that the performance, in terms of confusion-creating ability, of the new substitution box is better than those of some of the existing non-linear components used in encryption systems. The majority logic criterion is applied to these substitution boxes to further evaluate the strength and usefulness.
引用
收藏
页码:97 / 104
页数:7
相关论文
共 25 条
[1]  
Cui L(2007)A new S-box structure named affine- power-affine Int J Innov Comput I 3 45-53
[2]  
Cao Y(2008)Gray S-box for advanced encryption standard Int Conf Comp Intel Secur 1 253-256
[3]  
Tran MT(2010)A new algorithm to construct secure keys for AES Int J Cont Math Sci 5 1263-1270
[4]  
Bui DK(2009)Advanced differential-style cryptanalysis of the NSA’s skipjack block cipher Cryptologia 33 246-270
[5]  
Doung AD(2002)A method for obtaining cryptographically strong 8 × 8 S-boxes Int Conf Infor Network Appl 2 14-20
[6]  
Hussain I(2011)Some analysis of S-box based on residue of prime number Proc Pak Acad Sci 48 111-115
[7]  
Shah T(1991)Differential Cryptanalysis of DES-like Cryptosystems Journal of Cryptology 4 3-72
[8]  
Mahmood H(2011)Statistical analysis of S-box in image encryption applications based on majority logic criterion Int J Phy Sci 6 4110-4127
[9]  
Kim J(undefined)undefined undefined undefined undefined-undefined
[10]  
Phan RC-W(undefined)undefined undefined undefined undefined-undefined