Innovative Transformation of S-Box Through Chaotic Map Using a Pragmatic Approach

In present-day data communication, the imperative to safeguard information and shield it from a multitude of potential threats and attacks has gained significant prominence. One of the pivotal tools employed in the pursuit of data protection is the design of robust substitution boxes (S-Boxes). Thes...

Full description

Bibliographic Details
Main Authors: Awais Salman Qazi, Amjad Hussain Zahid, Abdullah Baz, Farrukh Arslan, Mubashir Ali, Jehad Ali
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10474354/
Description
Summary:In present-day data communication, the imperative to safeguard information and shield it from a multitude of potential threats and attacks has gained significant prominence. One of the pivotal tools employed in the pursuit of data protection is the design of robust substitution boxes (S-Boxes). These S-Boxes often find their roots in the realm of chaotic maps, leveraging the inherent unpredictability and complexity of these mathematical constructs. An S-Box is an integral and critical component in the design of modern ciphers offering a means to enhance the security of data by introducing non-linearity and confusion into the encryption process. In this research endeavor, we propose the development of a novel chaotic map to create an S-Box that exhibits a notably high nonlinear score making it more formidable for potential adversaries to decrypt the ciphertext. To substantiate the efficacy of the proposed S-Box, a comprehensive analysis is done by comparing its performance using standard criteria including nonlinearity (NL), strict avalanche criterion (SAC), bit independence criterion (BIC), presence of fixed points (FP), linear probability (LP), differential probability (DP), etc. to other state-of-the-art S-Boxes. The comparative analysis reinforces the security fortitude of the proposed S-Box in meeting the rigorous demands of modern data security and presents a vital contribution to the ever-evolving field of cryptographic techniques and data protection in the digital age.
ISSN:2169-3536