Construction of Optimized Dynamic S-Boxes Based on a Cubic Modular Transform and the Sine Function

The protection of sensitive data from illegitimate users is one of the main challenges in today’s technological era. To handle prevailing security-related problems and challenges amicably, cryptographic techniques are applied for the fortification of data. State-of-the-art cryptographic c...

Full description

Bibliographic Details
Main Authors: Amjad Hussain Zahid, Musheer Ahmad, Ahmed Alkhayyat, Muhammad Junaid Arshad, Mian Muhammad Umar Shaban, Naglaa F. Soliman, Abeer D. Algarni
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9540656/
Description
Summary:The protection of sensitive data from illegitimate users is one of the main challenges in today’s technological era. To handle prevailing security-related problems and challenges amicably, cryptographic techniques are applied for the fortification of data. State-of-the-art cryptographic ciphers generally use substitution-boxes (S-boxes) that help in accomplishing robust sanctuary of data. Provision of data security by a cipher is proportionate directly to the cryptographic strength of an S-box employed in the respective cipher. This research paper proposes to project a simple and innovative scheme for the generation of dynamic S-boxes by employing a novel cubic modular transformation along with the trigonometric sine function. A pioneering optimization phase, dynamic in nature, is also suggested that improvises the nonlinearity of the initial configuration of S-box. The overall proposed scheme possesses the potential to spawn a large count of strong S-boxes by smearing a minute variation in input parameters used in initial and optimization phases. Cipher key is used to employ values to the input parameters for the creation of dynamic S-boxes. A specimen S-box is presented, and its performance has been achieved through standard criteria of S-box evaluation along with the comparative analysis with some existing S-boxes. Recital and comparative investigations validate that the anticipated S-box possesses the real capability for its usage in cryptosystems for much needed data security.
ISSN:2169-3536