S-Box on Subgroup of Galois Field
In substitution−permutation network as a cryptosystem, substitution boxes play the role of the only nonlinear part. It would be easy for adversaries to compromise the security of the system without them. 8-bit S-boxes are the most used cryptographic components. So far, cryptographers were...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-05-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | https://www.mdpi.com/2410-387X/3/2/13 |
_version_ | 1828347608071929856 |
---|---|
author | Tariq Shah Ayesha Qureshi |
author_facet | Tariq Shah Ayesha Qureshi |
author_sort | Tariq Shah |
collection | DOAJ |
description | In substitution−permutation network as a cryptosystem, substitution boxes play the role of the only nonlinear part. It would be easy for adversaries to compromise the security of the system without them. 8-bit S-boxes are the most used cryptographic components. So far, cryptographers were constructing 8-bit S-boxes used in cryptographic primitives by exhaustive search of permutations of order 256. However, now for cryptographic techniques with 8-bit S-boxes as confusion layers, researchers are trying to reduce the size of S-box by working with a small unit of data. The aim is to make the techniques compact, fast and elegant. The novelty of this research is the construction of S-box on the elements of the multiplicative subgroup of the Galois field instead of the entire Galois field. The sturdiness of the proposed S-box against algebraic attacks was hashed out by employing the renowned analyses, including balance, nonlinearity, strict avalanche criterion, and approximation probabilities. Furthermore, the statistical strength of the S-box was tested by the majority logic criterion. The fallouts show that the S-box is appropriate for applications for secure data communications. The S-box was also used for watermarking of grayscale images with good outcomes. |
first_indexed | 2024-04-14T00:42:52Z |
format | Article |
id | doaj.art-e19d54527fa0404da1e21d5388ae809a |
institution | Directory Open Access Journal |
issn | 2410-387X |
language | English |
last_indexed | 2024-04-14T00:42:52Z |
publishDate | 2019-05-01 |
publisher | MDPI AG |
record_format | Article |
series | Cryptography |
spelling | doaj.art-e19d54527fa0404da1e21d5388ae809a2022-12-22T02:22:08ZengMDPI AGCryptography2410-387X2019-05-01321310.3390/cryptography3020013cryptography3020013S-Box on Subgroup of Galois FieldTariq Shah0Ayesha Qureshi1Department of Mathematics, Quaid-i-Azam University, Islamabad 44000, PakistanDepartment of Mathematics, Quaid-i-Azam University, Islamabad 44000, PakistanIn substitution−permutation network as a cryptosystem, substitution boxes play the role of the only nonlinear part. It would be easy for adversaries to compromise the security of the system without them. 8-bit S-boxes are the most used cryptographic components. So far, cryptographers were constructing 8-bit S-boxes used in cryptographic primitives by exhaustive search of permutations of order 256. However, now for cryptographic techniques with 8-bit S-boxes as confusion layers, researchers are trying to reduce the size of S-box by working with a small unit of data. The aim is to make the techniques compact, fast and elegant. The novelty of this research is the construction of S-box on the elements of the multiplicative subgroup of the Galois field instead of the entire Galois field. The sturdiness of the proposed S-box against algebraic attacks was hashed out by employing the renowned analyses, including balance, nonlinearity, strict avalanche criterion, and approximation probabilities. Furthermore, the statistical strength of the S-box was tested by the majority logic criterion. The fallouts show that the S-box is appropriate for applications for secure data communications. The S-box was also used for watermarking of grayscale images with good outcomes.https://www.mdpi.com/2410-387X/3/2/13data communicationS-boxencryptionimage processingwatermarking |
spellingShingle | Tariq Shah Ayesha Qureshi S-Box on Subgroup of Galois Field Cryptography data communication S-box encryption image processing watermarking |
title | S-Box on Subgroup of Galois Field |
title_full | S-Box on Subgroup of Galois Field |
title_fullStr | S-Box on Subgroup of Galois Field |
title_full_unstemmed | S-Box on Subgroup of Galois Field |
title_short | S-Box on Subgroup of Galois Field |
title_sort | s box on subgroup of galois field |
topic | data communication S-box encryption image processing watermarking |
url | https://www.mdpi.com/2410-387X/3/2/13 |
work_keys_str_mv | AT tariqshah sboxonsubgroupofgaloisfield AT ayeshaqureshi sboxonsubgroupofgaloisfield |