Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity

The significance of data security has become more critical due to the ever-changing goals and capabilities of attackers. As a result, many cryptosystems employing diverse approaches are being developed to safeguard sensitive data. A Substitution box (S-box) plays a vigorous role in modern cryptosyst...

Full description

Bibliographic Details
Main Authors: Amjad Hussain Zahid, Hafiz Ali Mansoor Elahi, Musheer Ahmad, Louai A. Maghrabi, Ramy Said Agieb Said
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10341247/
_version_ 1797376352790249472
author Amjad Hussain Zahid
Hafiz Ali Mansoor Elahi
Musheer Ahmad
Louai A. Maghrabi
Ramy Said Agieb Said
author_facet Amjad Hussain Zahid
Hafiz Ali Mansoor Elahi
Musheer Ahmad
Louai A. Maghrabi
Ramy Said Agieb Said
author_sort Amjad Hussain Zahid
collection DOAJ
description The significance of data security has become more critical due to the ever-changing goals and capabilities of attackers. As a result, many cryptosystems employing diverse approaches are being developed to safeguard sensitive data. A Substitution box (S-box) plays a vigorous role in modern cryptosystems because of its credence for inducing confusion during the encryption process and ultimately protecting the data. Currently, chaotic maps are being developed and widely employed to yield S-Boxes as the use of chaotic maps aids in the randomness and resistance to mitigate many cryptanalytic attacks. In this paper, a novel chaotic map and an inventive systematic search method are proposed for the generation of key-dependent dynamic and highly nonlinear S-boxes. A variety of standard cryptographic tests such as fixed-point analysis, nonlinearity (NL), strict avalanche criterion (SAC), bit independence criterion (BIC), linear probability (LP), differential probability (DP), etc.) are applied to assess and analyze the cryptographic strengths of S-boxes generated using the proposed method. The findings from experimental and comparative analyses show that the proposed S-box provides stronger and better cryptographic features (no fixed point, no opposite fixed point, average NL = 111.75, SAC offset = 0.0000, BIC-NL = 103.9, LP = 0.125, and DP = 0.039) than many of the existing S-boxes studies presented in recent years. Hence, the proposed S-box construction technique has a lot of potential and genuine prospects for its utilization in cryptographic applications to protect sensitive data from attackers.
first_indexed 2024-03-08T19:37:19Z
format Article
id doaj.art-6721b3e3b11041af878090b95623dcb4
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-08T19:37:19Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-6721b3e3b11041af878090b95623dcb42023-12-26T00:03:30ZengIEEEIEEE Access2169-35362023-01-011113974513975810.1109/ACCESS.2023.333938910341247Secure Key-Based Substitution-Boxes Design Using Systematic Search for High NonlinearityAmjad Hussain Zahid0https://orcid.org/0000-0002-6123-6610Hafiz Ali Mansoor Elahi1https://orcid.org/0009-0006-4378-6391Musheer Ahmad2https://orcid.org/0000-0002-4915-9325Louai A. Maghrabi3https://orcid.org/0000-0001-8513-0645Ramy Said Agieb Said4https://orcid.org/0000-0002-3113-017XSchool of Systems and Technology, University of Management and Technology, Lahore, PakistanIndustrad Engineering Services, Lahore, PakistanDepartment of Computer Engineering, Jamia Millia Islamia, New Delhi, IndiaDepartment of Software Engineering, College of Engineering, University of Business and Technology, Jeddah, Saudi ArabiaDepartment of Electrical Engineering, Faculty of Engineering, Modern University for Technology and Information (MTI), Cairo, EgyptThe significance of data security has become more critical due to the ever-changing goals and capabilities of attackers. As a result, many cryptosystems employing diverse approaches are being developed to safeguard sensitive data. A Substitution box (S-box) plays a vigorous role in modern cryptosystems because of its credence for inducing confusion during the encryption process and ultimately protecting the data. Currently, chaotic maps are being developed and widely employed to yield S-Boxes as the use of chaotic maps aids in the randomness and resistance to mitigate many cryptanalytic attacks. In this paper, a novel chaotic map and an inventive systematic search method are proposed for the generation of key-dependent dynamic and highly nonlinear S-boxes. A variety of standard cryptographic tests such as fixed-point analysis, nonlinearity (NL), strict avalanche criterion (SAC), bit independence criterion (BIC), linear probability (LP), differential probability (DP), etc.) are applied to assess and analyze the cryptographic strengths of S-boxes generated using the proposed method. The findings from experimental and comparative analyses show that the proposed S-box provides stronger and better cryptographic features (no fixed point, no opposite fixed point, average NL = 111.75, SAC offset = 0.0000, BIC-NL = 103.9, LP = 0.125, and DP = 0.039) than many of the existing S-boxes studies presented in recent years. Hence, the proposed S-box construction technique has a lot of potential and genuine prospects for its utilization in cryptographic applications to protect sensitive data from attackers.https://ieeexplore.ieee.org/document/10341247/Key-based substitution-boxchaotic mapcryptosystem
spellingShingle Amjad Hussain Zahid
Hafiz Ali Mansoor Elahi
Musheer Ahmad
Louai A. Maghrabi
Ramy Said Agieb Said
Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity
IEEE Access
Key-based substitution-box
chaotic map
cryptosystem
title Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity
title_full Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity
title_fullStr Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity
title_full_unstemmed Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity
title_short Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity
title_sort secure key based substitution boxes design using systematic search for high nonlinearity
topic Key-based substitution-box
chaotic map
cryptosystem
url https://ieeexplore.ieee.org/document/10341247/
work_keys_str_mv AT amjadhussainzahid securekeybasedsubstitutionboxesdesignusingsystematicsearchforhighnonlinearity
AT hafizalimansoorelahi securekeybasedsubstitutionboxesdesignusingsystematicsearchforhighnonlinearity
AT musheerahmad securekeybasedsubstitutionboxesdesignusingsystematicsearchforhighnonlinearity
AT louaiamaghrabi securekeybasedsubstitutionboxesdesignusingsystematicsearchforhighnonlinearity
AT ramysaidagiebsaid securekeybasedsubstitutionboxesdesignusingsystematicsearchforhighnonlinearity