Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

S-box Construction Based on Linear Fractional Transformation and Permutation Function

View through CrossRef
Substitution boxes (S-box) with strong and secure cryptographic properties are widely used for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to a standard attack including linear and differential cryptanalysis. The ability to create a cryptographically strong S-box depends on its construction technique. This work aims to design and develop a cryptographically strong 8 × 8 S-box for block ciphers. In this work, the construction of the S-box is based on the linear fractional transformation and permutation function. Three steps involved in producing the S-box. In step one, an irreducible polynomial of degree eight is chosen, and all roots of the primitive irreducible polynomial are calculated. In step two, algebraic properties of linear fractional transformation are applied in Galois Field GF (28). Finally, the produced matrix is permuted to add randomness to the S-box. The strength of the S-box is measured by calculating its potency to create confusion. To analyze the security properties of the S-box, some well-known and commonly used algebraic attacks are used. The proposed S-box is analyzed by nonlinearity test, algebraic degree, differential uniformity, and strict avalanche criterion which are the avalanche effect test, completeness test, and strong S-box test. S-box analysis is done before and after the application of the permutation function and the analysis result shows that the S-box with permutation function has reached the optimal properties as a secure S-box.
Title: S-box Construction Based on Linear Fractional Transformation and Permutation Function
Description:
Substitution boxes (S-box) with strong and secure cryptographic properties are widely used for providing the key property of nonlinearity in block ciphers.
This is critical to be resistant to a standard attack including linear and differential cryptanalysis.
The ability to create a cryptographically strong S-box depends on its construction technique.
This work aims to design and develop a cryptographically strong 8 × 8 S-box for block ciphers.
In this work, the construction of the S-box is based on the linear fractional transformation and permutation function.
Three steps involved in producing the S-box.
In step one, an irreducible polynomial of degree eight is chosen, and all roots of the primitive irreducible polynomial are calculated.
In step two, algebraic properties of linear fractional transformation are applied in Galois Field GF (28).
Finally, the produced matrix is permuted to add randomness to the S-box.
The strength of the S-box is measured by calculating its potency to create confusion.
To analyze the security properties of the S-box, some well-known and commonly used algebraic attacks are used.
The proposed S-box is analyzed by nonlinearity test, algebraic degree, differential uniformity, and strict avalanche criterion which are the avalanche effect test, completeness test, and strong S-box test.
S-box analysis is done before and after the application of the permutation function and the analysis result shows that the S-box with permutation function has reached the optimal properties as a secure S-box.

Related Results

Solving Undamped and Damped Fractional Oscillators via Integral Rohit Transform
Solving Undamped and Damped Fractional Oscillators via Integral Rohit Transform
Background: The dynamics of fractional oscillators are generally described by fractional differential equations, which include the fractional derivative of the Caputo or Riemann-Li...
On the Limitations of Black-Box Constructions in Cryptography
On the Limitations of Black-Box Constructions in Cryptography
Cryptography is the science of secure communication. Originating as an esoteric discipline based on heuristics, it underwent a mayor paradigm shift in the past century. Modern cryp...
On α-Fractional Bregman Divergence to study α-Fractional Minty’s Lemma
On α-Fractional Bregman Divergence to study α-Fractional Minty’s Lemma
In this paper fractional variational inequality problems (FVIP) and dual fractional variational inequality problems (DFVIP), Fractional minimization problems are defined with the h...
Identification and bioinformatics analysis of MADS-box family genes containing K-box domain in maize
Identification and bioinformatics analysis of MADS-box family genes containing K-box domain in maize
The MADS-box family genes are involved in the development of plant roots, leaves, flowers, and fruits, and play a crucial role in plant growth and development. Studying MADS-box ge...
On Λ-Fractional fluid mechanics
On Λ-Fractional fluid mechanics
Λ-fractional analysis has already been presented as the only fractional analysis conforming with the Differential Topology prerequisites. That is, the Leibniz rule and chain rule d...
Dynamical analysis of linear SDOF oscillator with fractional-order derivative (Ⅱ)
Dynamical analysis of linear SDOF oscillator with fractional-order derivative (Ⅱ)
A linear single degree-of-freedom (SDOF) oscillator with two kinds of fractional-order derivatives is investigated by the averaging method, and the approximately analytical solutio...
A Novel Image Encryption Algorithm Based on Double Permutation and Random Diffusion
A Novel Image Encryption Algorithm Based on Double Permutation and Random Diffusion
Abstract To improve the image transmission security, an image encryption algorithm based on double permutation with random diffusion is proposed in this paper. This algorit...
An efficient permutation approach for SbPN-based symmetric block ciphers
An efficient permutation approach for SbPN-based symmetric block ciphers
AbstractIt is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet o...

Back to Top