Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity
The significance of data security has become more critical due to the ever-changing goals and capabilities of attackers. As a result, many cryptosystems employing diverse approaches are being developed to safeguard sensitive data. A Substitution box (S-box) plays a vigorous role in modern cryptosyst...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10341247/ |
_version_ | 1797376352790249472 |
---|---|
author | Amjad Hussain Zahid Hafiz Ali Mansoor Elahi Musheer Ahmad Louai A. Maghrabi Ramy Said Agieb Said |
author_facet | Amjad Hussain Zahid Hafiz Ali Mansoor Elahi Musheer Ahmad Louai A. Maghrabi Ramy Said Agieb Said |
author_sort | Amjad Hussain Zahid |
collection | DOAJ |
description | The significance of data security has become more critical due to the ever-changing goals and capabilities of attackers. As a result, many cryptosystems employing diverse approaches are being developed to safeguard sensitive data. A Substitution box (S-box) plays a vigorous role in modern cryptosystems because of its credence for inducing confusion during the encryption process and ultimately protecting the data. Currently, chaotic maps are being developed and widely employed to yield S-Boxes as the use of chaotic maps aids in the randomness and resistance to mitigate many cryptanalytic attacks. In this paper, a novel chaotic map and an inventive systematic search method are proposed for the generation of key-dependent dynamic and highly nonlinear S-boxes. A variety of standard cryptographic tests such as fixed-point analysis, nonlinearity (NL), strict avalanche criterion (SAC), bit independence criterion (BIC), linear probability (LP), differential probability (DP), etc.) are applied to assess and analyze the cryptographic strengths of S-boxes generated using the proposed method. The findings from experimental and comparative analyses show that the proposed S-box provides stronger and better cryptographic features (no fixed point, no opposite fixed point, average NL = 111.75, SAC offset = 0.0000, BIC-NL = 103.9, LP = 0.125, and DP = 0.039) than many of the existing S-boxes studies presented in recent years. Hence, the proposed S-box construction technique has a lot of potential and genuine prospects for its utilization in cryptographic applications to protect sensitive data from attackers. |
first_indexed | 2024-03-08T19:37:19Z |
format | Article |
id | doaj.art-6721b3e3b11041af878090b95623dcb4 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-03-08T19:37:19Z |
publishDate | 2023-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-6721b3e3b11041af878090b95623dcb42023-12-26T00:03:30ZengIEEEIEEE Access2169-35362023-01-011113974513975810.1109/ACCESS.2023.333938910341247Secure Key-Based Substitution-Boxes Design Using Systematic Search for High NonlinearityAmjad Hussain Zahid0https://orcid.org/0000-0002-6123-6610Hafiz Ali Mansoor Elahi1https://orcid.org/0009-0006-4378-6391Musheer Ahmad2https://orcid.org/0000-0002-4915-9325Louai A. Maghrabi3https://orcid.org/0000-0001-8513-0645Ramy Said Agieb Said4https://orcid.org/0000-0002-3113-017XSchool of Systems and Technology, University of Management and Technology, Lahore, PakistanIndustrad Engineering Services, Lahore, PakistanDepartment of Computer Engineering, Jamia Millia Islamia, New Delhi, IndiaDepartment of Software Engineering, College of Engineering, University of Business and Technology, Jeddah, Saudi ArabiaDepartment of Electrical Engineering, Faculty of Engineering, Modern University for Technology and Information (MTI), Cairo, EgyptThe significance of data security has become more critical due to the ever-changing goals and capabilities of attackers. As a result, many cryptosystems employing diverse approaches are being developed to safeguard sensitive data. A Substitution box (S-box) plays a vigorous role in modern cryptosystems because of its credence for inducing confusion during the encryption process and ultimately protecting the data. Currently, chaotic maps are being developed and widely employed to yield S-Boxes as the use of chaotic maps aids in the randomness and resistance to mitigate many cryptanalytic attacks. In this paper, a novel chaotic map and an inventive systematic search method are proposed for the generation of key-dependent dynamic and highly nonlinear S-boxes. A variety of standard cryptographic tests such as fixed-point analysis, nonlinearity (NL), strict avalanche criterion (SAC), bit independence criterion (BIC), linear probability (LP), differential probability (DP), etc.) are applied to assess and analyze the cryptographic strengths of S-boxes generated using the proposed method. The findings from experimental and comparative analyses show that the proposed S-box provides stronger and better cryptographic features (no fixed point, no opposite fixed point, average NL = 111.75, SAC offset = 0.0000, BIC-NL = 103.9, LP = 0.125, and DP = 0.039) than many of the existing S-boxes studies presented in recent years. Hence, the proposed S-box construction technique has a lot of potential and genuine prospects for its utilization in cryptographic applications to protect sensitive data from attackers.https://ieeexplore.ieee.org/document/10341247/Key-based substitution-boxchaotic mapcryptosystem |
spellingShingle | Amjad Hussain Zahid Hafiz Ali Mansoor Elahi Musheer Ahmad Louai A. Maghrabi Ramy Said Agieb Said Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity IEEE Access Key-based substitution-box chaotic map cryptosystem |
title | Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity |
title_full | Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity |
title_fullStr | Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity |
title_full_unstemmed | Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity |
title_short | Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity |
title_sort | secure key based substitution boxes design using systematic search for high nonlinearity |
topic | Key-based substitution-box chaotic map cryptosystem |
url | https://ieeexplore.ieee.org/document/10341247/ |
work_keys_str_mv | AT amjadhussainzahid securekeybasedsubstitutionboxesdesignusingsystematicsearchforhighnonlinearity AT hafizalimansoorelahi securekeybasedsubstitutionboxesdesignusingsystematicsearchforhighnonlinearity AT musheerahmad securekeybasedsubstitutionboxesdesignusingsystematicsearchforhighnonlinearity AT louaiamaghrabi securekeybasedsubstitutionboxesdesignusingsystematicsearchforhighnonlinearity AT ramysaidagiebsaid securekeybasedsubstitutionboxesdesignusingsystematicsearchforhighnonlinearity |