2018
DOI: 10.1155/2018/4987021
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Technique for the Construction of Safe Substitution Boxes Based on Cyclic and Symmetric Groups

Abstract: In the literature, different algebraic techniques have been applied on Galois field (2 8 ) to construct substitution boxes. In this paper, instead of Galois field (2 8 ), we use a cyclic group 255 in the formation of proposed substitution box. The construction proposed S-box involves three simple steps. In the first step, we introduce a special type of transformation of order 255 to generate 255 . Next, we adjoin 0 to 255 and write the elements of 255 ∪ {0} in 16 × 16 matrix to destroy the initial sequence 0, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…On the other hand, contrast analysis estimates the loss of brightness in the host image. All data are evaluated using MLC, for the purpose of producing the best S-box for encryption [18], [19], [37], [38].…”
Section: Evaluation Analysis Of S-boxmentioning
confidence: 99%
“…On the other hand, contrast analysis estimates the loss of brightness in the host image. All data are evaluated using MLC, for the purpose of producing the best S-box for encryption [18], [19], [37], [38].…”
Section: Evaluation Analysis Of S-boxmentioning
confidence: 99%
“…The algebraic based construction of S-boxes has been rigorously investigated in literature [49][50][51][52]. The second half of the proposed hybrid method involves the algebraic group based cryptographic features improvisation of Sboxes generated in previous section III.A.…”
Section: B Proposed Group Structures and Actionsmentioning
confidence: 99%
“…To evaluate the strength of S-boxes, majority logic criterion, linear approximation probability, nonlinearity test, strict avalanche criterion analysis, bit independent criterion and differential uniformity test are used. In literature, different mathematical algorithms have been developed to generate strong S-boxes for better security which are based on Cubic Polynomial Mapping [10], Square polynomial transformation [11], Cubic fractional transformation [12], Cyclic and Symmetric group [13], chaotic permutation [14], graph theory [15], optimization technique [16], elliptic curve [17], [18], Hilbert curve [19], the action of matrices on Galois field [20] and [21] proposed a technique for constructing a high non-linear component of a block cypher using polynomial mapping and a finite field, etc.…”
Section: Introductionmentioning
confidence: 99%