This paper presents a hybrid method for the construction of cryptographically strong bijective substitution-boxes by utilizing the merits of chaotic map and algebraic groups. The hybrid method first generates the key-dependent dynamic S-boxes using chaotic heuristic search strategy and then the S-boxes are evolved with the help of potent proposed algebraic group structures. This paper proposes a new improved combination chaotic map to operate initial search strategy. To augment the strength of generated S-boxes, the algebraic group structures are discovered which have the power to improve their cryptographic strength. The performance assessments using standard criterions are rendered to quantify the strengths of proposed bijective S-boxes. The experimental results and comparisons with recent S-box research findings justify the effectiveness and competence of the proposed bijective S-boxes and anticipated hybrid generation method.
The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches. It is because they are solely responsible to decide the robustness of cryptosystem against linear and differential cryptanalyses. With an aim to fulfill the mentioned requirement of robustness, a novel group theoretic and graphical method is proposed to construct S-box with optimal features. Firstly, a strong S-box is generated with the help of orbits of coset graphs and the action of proposed powerful permutation of symmetric group S 256 . In addition, a specific group is designed the action of whose pairs of permutations has the ability to generate as many as 462422016 strong S-boxes. Few of such proposed S-boxes are reported and assessed against standard performance parameters to validate the effectiveness of proposed findings. The features of proposed S-boxes are compared with most of the recent S-boxes to validate the superior performance. Moreover, they are also applied for image encryption to demonstrate their suitability for multimedia security applications.
The substitution box is a basic tool to convert the plaintext into an enciphered format. In this paper, we use coset diagram for the action of (2, Z) on projective line over the finite field (2 9 ) to construct proposed S-box. The vertices of the cost diagram are elements of (2 9 ) which can be represented by powers of , where is the root of irreducible polynomial ( ) = 9 + 4 + 1 over Z 2 . Let * (2 9 ) denote the elements of (2 9 ) which are of the form of even powers of . In the first step, we construct a 16 × 16 matrix with the elements of * (2 9 ) in a specific order, determined by the coset diagram. Next, we consider ℎ :2 ) = to destroy the structure of (2 8 ). In the last step, we apply a bijective map on each element of the matrix to evolve proposed S-box. The ability of the proposed S-box is examined by different available algebraic and statistical analyses. The results are then compared with the familiar S-boxes. We get encouraging statistics of the proposed box after comparison.
This paper proposes to present a novel group theoretic approach of improvising the cryptographic features of substitution-boxes. The approach employs a proposed finite Abelian group of order 3720 with three generators and six relations. The pre and post-action of the new Abelian group on some nonlinear schemes is analyzed and investigated. It has been found that post-action is competent to construct substitution-boxes whose cryptographic strengths are quite better compared to them before the group action. The S-box strength improvisation has been perceived on multiple performance parameters including nonlinearity, differential uniformity, bits independent criteria, linear approximation probability, and autocorrelation functions along with the satisfaction of strict avalanche criteria. The suitability of proposed improved S-box is tested for image encryption applications under the majority logic criterions and differential analyses. The conducted statistical investigations demonstrated the proficiency of anticipated group action approach and its suitability for cryptographic usages.INDEX TERMS Substitution-box, group action, Abelian group, image encryption.
The representation of the action of PGL 2 , Z on F t ∪ ∞ in a graphical format is labeled as coset diagram. These finite graphs are acquired by the contraction of the circuits in infinite coset diagrams. A circuit in a coset diagram is a closed path of edges and triangles. If one vertex of the circuit is fixed by p q Δ 1 p q − 1 Δ 2 p q Δ 3 … p q − 1 Δ m ∈ PSL 2 , Z , then this circuit is titled to be a length- m circuit, denoted by Δ 1 , Δ 2 , Δ 3 , … , Δ m . In this manuscript, we consider a circuit Δ of length 6 as Δ 1 , Δ 2 , Δ 3 , Δ 4 , Δ 5 , Δ 6 with vertical axis of symmetry, that is, Δ 2 = Δ 6 , Δ 3 = Δ 5 . Let Γ 1 and Γ 2 be the homomorphic images of Δ acquired by contracting the vertices a , u and b , v , respectively, then it is not necessary that Γ 1 and Γ 2 are different. In this study, we will find the total number of distinct homomorphic images of Δ by contracting its all pairs of vertices with the condition Δ 1 > Δ 2 > Δ 3 > Δ 4 . The homomorphic images are obtained in this way having versatile applications in coding theory and cryptography. One can attain maximum nonlinearity factor using this in the encryption process.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.