Next Article in Journal
Structural Change and Dynamics of Pakistan Stock Market during Crisis: A Complex Network Perspective
Previous Article in Journal
Bayesian Compressive Sensing of Sparse Signals with Unknown Clustering Patterns
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation

by
Amjad Hussain Zahid
1,2,
Muhammad Junaid Arshad
2 and
Musheer Ahmad
3,*
1
Department of Computer Science, University of Management and Technology, Lahore 54000, Pakistan
2
Department of Computer Science, University of Engineering and Technology, Lahore 54000, Pakistan
3
Department of Computer Engineering, Jamia Millia Islamia, New Delhi 110025, India
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(3), 245; https://doi.org/10.3390/e21030245
Submission received: 27 January 2019 / Revised: 27 February 2019 / Accepted: 28 February 2019 / Published: 5 March 2019
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
A symmetric block cipher employing a substitution–permutation duo is an effective technique for the provision of information security. For substitution, modern block ciphers use one or more substitution boxes (S-Boxes). Certain criteria and design principles are fulfilled and followed for the construction of a good S-Box. In this paper, an innovative technique to construct substitution-boxes using our cubic fractional transformation (CFT) is presented. The cryptographic strength of the proposed S-box is critically evaluated against the state of the art performance criteria of strong S-boxes, including bijection, nonlinearity, bit independence criterion, strict avalanche effect, and linear and differential approximation probabilities. The performance results of the proposed S-Box are compared with recently investigated S-Boxes to prove its cryptographic strength. The simulation and comparison analyses validate that the proposed S-Box construction method has adequate efficacy to generate efficient candidate S-Boxes for usage in block ciphers.

1. Introduction

Cryptography helps individuals and organizations to protect their data. For this purpose, different symmetric and asymmetric ciphers have been designed. Symmetric ciphers possess simplicity and efficiency, and consume fewer computational resources as compared to asymmetric ciphers. Symmetric ciphers have two major categories as stream and block ciphers [1]. A stream cipher encrypts the plaintext in bit-by-bit fashion. On the other hand, a block cipher encrypts a plaintext block of a fixed size consisting of many bits simultaneously. Mostly, block ciphers are used for internet communication whereas stream ciphers are used in situations where computational resources are limited or efficiency is not the main concern.
A block cipher is particularly useful to achieve data confidentiality, which is one of the cryptography goals. It is considered as one of the most widely used tools for the provision of data security [2]. The most modern and popular symmetric ciphers, like AES, DES, Blowfish, RC2, RC5, and IDEA, are all block ciphers. Block ciphers are easily implemented, more general, and cryptographically stronger as compared to the stream ciphers [3]. Most of the block ciphers use either the Feistel structure or the substitution and permutation operations. Block ciphers based on the Feistel structure divide the plaintext block into two or more parts and perform different operations on these parts. DES, Blowfish, Camellia, Kasumi, RC5, TEA, 3DES, RC6, etc. are some example block ciphers that use the Feistel structure. Another type of popular block cipher is termed the substitution-permutation network (SPN) [4]. These ciphers convert plaintext blocks using sub-keys and different numbers of rounds into respective ciphertext blocks. In each round, along with other operations, substitutions and permutations are performed on the input bits. A substitution operation substitutes a block of bits with another block of bits using a substitution box (S-Box). A permutation operation changes the positions of the bits or bytes in the given input block. AES, SHARK, PRESENT, SQUARE, etc. are among the most popular block ciphers that use substitution and permutation operations. Among these, AES cipher is most widely used in real life applications and many researchers have proposed improvements and enhancements of it.
An S-Box is a crucial part of modern-day block ciphers and is used to create a muddled ciphertext from the given plaintext. An S-Box is one of the fundamental techniques used to provide candid confusion. Confusion is the complex relationship that must be established between the plaintext and the ciphertext [5]. The strength of the cipher is directly proportional to the level of confusion produced in the ciphertext. As a result, the cryptographic strength of a block cipher using an S-Box is dependent on the cryptographic strength of that S-Box. Many scholars have investigated and explored ways to propose quality S-Boxes and analyzed their strength against some standard criteria and benchmarks, such as nonlinearity (NL), bijection, strict avalanche criterion (SAC), bit independence criterion (BIC), linear probability (LP), and differential probability (DP) etc.
In [6], the authors proposed a mechanism to create repositories or a database of S-Boxes, which possess robust and resilient cryptographic topographies. These repositories can be of a great help to provide the security of data and information during the customization of the block ciphers. Mohamed et al. [7] proposed 18 S-Box properties to be present to resist against different types of cryptanalytic attacks. The presence of a greater number of properties in an S-Box makes it more secure. SAC, nonlinearity, BIC, and resistance to linear cryptanalysis and differential cryptanalysis are a few of the most needed S-Box criteria [8,9].
Generally, a block cipher consists of many parts. An S-Box, being the lone non-linear part of a block cipher, is very useful for enhancing the security of the plaintext by creating confusion in the ciphertext. The non-linearity provided by an S-Box offers defense against linear cryptanalysis [10]. Block ciphers use two types of S-Boxes: Static and dynamic. Ciphers employing static S-Boxes use the same S-Box in each round. This type of S-Box permits the attackers to investigate S-Box properties, find its weaknesses, and ultimately obtain the opportunity for cryptanalysis of the ciphertext [7,11,12]. For example, DES uses static S-Boxes. To overcome the problems of static S-Boxes and provide more security against cryptanalysis, many researchers have investigated new and novel ways to design S-Boxes, which are random, dynamic, and key-dependent. Dynamic S-Box generation based on the key ensures improvements in the strength of the cipher. For example, Blowfish cipher uses dynamic S-Boxes.
AES is one of the popular block ciphers which use S-Boxes in the encryption and decryption processes. Sahmoud et al. [13] proposed an enhancement to the security offered by AES. It uses multiple sub-keys for the encryption of different plaintext blocks. However, the new cipher is more complex and slow as compared to AES. Moh’d et al. [14] introduced AES-512, which is an enhancement to the original AES-128. It uses a plaintext block and a key of the size of 512-bits each. It has an increase of more than 200% in the throughput compared to the original AES-128. In [15], the authors proposed key based dynamic S-Boxes and increased the number of steps performed in each round of AES. The authors in [16,17] rectified and improved the AES cipher by optimizing the S-boxes. These optimized S-Boxes are more efficient than the traditional AES S-Box. Niemiec et al. [18] introduced a symmetric block cipher that uses key-dependent generic S-boxes. The authors described the way to generate a huge number of S-Boxes, which all exhibit good security landscapes. Kazlauskas et al. [19] proposed four algorithms to generate key-dependent S-Boxes and evaluated the worth of these boxes using distance metrics. Results demonstrate that the generated S-Boxes are of a high quality.
The Feistel structure has been used as the main construct in many of the symmetric ciphers, like DES, GOST, RC5, etc. DES and GOST each uses eight S-Boxes with sizes 6 × 4 and 4 × 4, respectively. The authors in [10] used the Feistel structure to choose a dynamic S-Box depending upon the plaintext/ciphertext. One of the 16 S-Boxes of the 4 × 4 size was chosen using 8-bits plaintext/ciphertext. The right 4-bits choose the S-Box and the left 4-bits act as the input to the S-Box. The authors also suggested a variation by dividing the 8-bits of the plaintext/ciphertext in two non-equal size parts and accordingly the size of the S-box and number of S-Boxes could be determined. This design of dynamic S-Box achieves the non-linear confusion and hence the cryptanalysis of the ciphertext becomes very difficult. Similarly, LiCi is a lightweight block cipher that uses the Feistel structure and active S-Boxes and is suitable for both software and hardware platforms, especially when energy is the main constraint [20]. It shows good resistance against many cryptanalytic attacks.
One of the desirable properties of modern block ciphers is the avalanche effect [21]. This property requires that a 1-bit change in key or the plaintext should produce substantial changes in the ciphertext. If the value of the avalanche effect is very small (at least 50% of the ciphertext bits are not changed), the block cipher is weak and cryptanalysis of the ciphertext becomes easy. The proposed cipher in [22] using a dynamic S-Box shows a good avalanche effect compared to the standard AES when a single bit is changed in the plaintext or the key. Shi et al. [23] analyzed in detail the avalanche effect of the AES S-Box and concluded that both S-Boxes of AES have a good avalanche effect. The authors in [21] analyzed five symmetric ciphers and concluded that AES has the highest avalanche effect. Mahmoud et al. [24] proposed a modification to generate an S-Box to be used for AES having a 128-bits key. The authors compared the correlation factor, avalanche effect, and time efficiency of the standard AES and the proposed one. The value of the correlation factor was between −0.3 and 0.3, which shows that the standard AES and proposed cipher have no dependence. The avalanche effect of the S-Box proposed in [24] has values between 0.41 and 0.61, which makes it resistant against linear and differential cryptanalysis. However, the standard AES is more efficient. Mar et al. [25] proposed three methods to evaluate and analyze the SAC of a given S-Box. These methods are very simple and check whether the given S-Box has an avalanche effect, possesses completeness, and is strong enough against cryptanalysis. Adams et al. [26] described an efficient process to generate S-Boxes, which possess the cryptographic properties of bijection, SAC, BIC, NL, etc. The authors also proved that a small change in the input guarantees nonlinearity and the inverse S-Boxes also fulfill the evaluation criteria. The generated S-Boxes are prospective contenders for SPN block ciphers.
Chaotic cryptography is among the most interesting areas in the field of information security in the recent era as the chaotic systems possess the property of randomness [27]. Many researchers have used chaos to design ciphers with good cryptographic strength. Garg et al. [28] analyzed different techniques to design an S-Box and concluded that S-Boxes designed using a chaotic approach demonstrate good cryptographic strength. The authors in [29] proposed some chaotic map-based block ciphers using a different approach and then showed that the proposed ciphers were resilient to different attacks. Ahmad et al. [30] designed an efficient S-Box using the chaos and travelling salesman problem and analyzed its performance against cryptographic standards. The results indicate that the proposed S-Box is more effective when compared to its counterparts. The authors in [31,32,33,34,35] proposed strong S-Boxes based on the combination of chaotic maps and other different algorithms. The evaluation of the cryptographic performance of these S-Boxes against NL, SAC, BIC, etc. revealed that hyperchaotic systems are stronger than chaotic ones. Peng et al. [36] and Solami et al. [37] devised methods to generate an S-Box using a hyperchaotic system. The resultant S-Boxes demonstrate a good response to cryptographic properties, like BIC, SAC, DP, etc. The suggested methods have the capability to generate a huge number of S-Boxes.
Another popular area in cryptography is DNA computing, which is being considered as a possible solution to the design of resilient ciphers. Kadhim et al. [38] and Al-Wattar et al. [39] proposed efficient S-Boxes using DNA computing, analyzed the security of the proposed ciphers using different criteria, and showed that the ciphers passed the test criteria. Many other researchers have used DNA computing to design and propose block ciphers, such as [40,41,42,43].
Ciphers using S-Boxes highly depend on the security of the S-Boxes. Thus, the identification of a tool to evaluate and find an S-Box with high security that can also assist in the design of efficient S-Boxes is considered critical. Wang et al. [44] developed a software tool to analyze and test the performance of S-boxes. The software tool supports the design of good block ciphers. Albermany et al. [45] suggested random block cipher (RBC). It uses a master key of a length of 128 bits and 64 bits plaintext. Eight sub-keys are generated from the master key. The size of each sub-key is 16 bits. A bijective function, a new S-box, and binary operations are employed in this cipher. Thirty-two S-boxes are used and the length of the ciphertext is 128 bits. It is able to encrypt a large amount of plaintext data very efficiently. Many other authors have contributed to the design of various S-Boxes using different techniques. Tran et al. [46] proposed an S-Box using graph isomorphism and showed that their S-Box exhibits the desired cryptographic properties. Coset diagrams are a special type of graph that has real life applications. Razzaq et al. [47] used the coset diagram to propose a new S-Box, evaluated its strength against cryptanalysis, and showed that the results were promising. Novel techniques of cryptanalysis reveal that there are still some scarcities in the existing ciphers [48]. To provide better security, the complexity of a cipher is increased and as a result the efficiency of the respective cipher decreases. The authors proposed an efficient and more secure block cipher, which uses operations, like linear and non-linear mixing, by employing S-Box, capsulation, etc. for confusion and diffusion effects.
Linear fractional transformation (LFT) is another area which helps in the generation of better S-Boxes. Farwa et al. [49] proposed a modest and proficient algorithm to generate an S-Box based on LFT. The authors analyzed the strength of their S-Box against cryptographic properties, like SAC, BIC, NL, LP, DP, etc. The authors in [50,51,52] proposed efficient algorithms to design good S-Boxes based on LFT and the projective general linear group on Galois field, respectively. The proposed S-Boxes showed good performances when compared with other existing S-Boxes. Many researchers have exposed the cellular automata field to propose S-Boxes [53,54]. Authors have shown that their S-Boxes have good strength when critically analyzed.
The techniques and methods for the generation of S-Boxes presented in the literature are either suitable for the creation of static S-boxes or are very complicated and time-consuming. Static S-Boxes have their own limitations and weaknesses. These S-Boxes may help attackers in the cryptanalysis of the captured ciphertext and hence they may reach the original plaintext. On the other hand, the methods presented in the literature that generate dynamic and key-dependent S-boxes are very complex and less efficient. Thus, the need for a simple and efficient method to generate dynamic S-Boxes exists.
In this paper, a novel design method for the construction of efficient S-Boxes for block ciphers is proposed. The following considerations were kept in mind while designing the proposed S-Box:
  • An S-box that helps in the security enhancement of the block cipher and resists cryptanalysis;
  • An S-Box that is simple to construct;
  • An S-Box that is generated dynamically using sub-keys;
  • An S-Box that fulfills the most needed S-Box criteria, like NL, SAC, BIC, LP, DP, etc.
The method proposed in this paper for the construction of an S-Box is an innovative one and is quite different from the approaches presented in the literature. A cubic fractional transformation is proposed for the construction of strong S-Boxes. After the S-Box was designed, a performance analysis was performed to show its strength. The proposed S-Box demonstrated a very good cryptographic strength when compared with other recently designed S-Boxes. The results indicated that the proposed S-Box is a good choice for block ciphers.
The structure of the rest of the paper is as follows. Section 2 of this paper presents the design architecture of the proposed S-Box. The performance evaluation of the proposed S-Box against its cryptographic properties is discussed in Section 3 and a comparison is made with some S-boxes. Section 4 concludes the research paper.

2. Proposed Substitution Box

Modern block ciphers employ byte substitution to replace a complete byte (one element) of a matrix with another complete byte using the substitution box (S-Box). Generally, the design of an S-Box involves nonlinear mapping, which results in bijection. Many researchers have designed S-Boxes that are cryptographically strong using such mappings. One such mapping is linear fractional transformation (LFT), which was exhaustively explored for the construction of the S-boxes [49,50,51,52]. However, the process of generating these S-Boxes using LFT is very complicated and time consuming.
In this paper, we extend the idea of LFT and construct our new transformation to generate an S-Box using another nonlinear mapping method in a simple and efficient way. We call this extended transformation cubic fractional transformation (CFT). A cubic fractional transformation is a function of the form:
C ( z ) = 1 α ( z ) 3 + β   ( MOD ( 2 n + 1 ) ) α , β , z   Z
where, Z = {0, 1, ……, 2n − 1}, both α and β are not 0 at the same time, and α(z)3 + β ≠ 0 is used to construct the n × n S-box. The nonlinear nature of CFT stimulates its usage in byte substitution. The procedure to generate the proposed S-Box for n = 8 is illustrated in Figure 1.
To elaborate the construction of the proposed S-Box using Equation (1), let us have a specific type of cubic fractional transformation as given in Equation (2). Let Z = {0, 1, …, 2n − 1} = {0, 1, …, 28 − 1} = {0, 1, 2, …, 254, 255} for n = 8. Any values can be chosen for α and β (α, βZ) that gratify the condition of α(z)3 + β ≠ 0. For the sake of the calculations here, we have chosen α = 95 and β = 15. The CFT function, C(z), given in Equation (2) generates values of Z – {0, 106} when zZ – {176, 184}. When z = 176, C(z) evaluates to 256 ∉ Z. When z = 184, the denominator of Equation (2) evaluates to 0. To keep the function, C(z), bijective, we explicitly define C(z) for z ∈ {176, 184} as conditioned in Equation (2). An example S-Box of a size of 8 × 8 is generated using a CFT function, c: Z Z , given as:
C ( z ) = { ( 1 95 ( z ) 3 + 15 ) ( MOD   257 ) if   z Z { 176 , 184 } 0 if   z = 176 106 if   z = 184
This particular cubic fractional transformation of Equation (2) generates the elements of our proposed S-Box, which are organized in a 16 × 16 matrix as shown in Table 1.
As mentioned above, any values for α and β (α, βZ) can be used in Equation (1) to generate an S-Box. One can choose sub-keys as the values for α and β to generate dynamic and key-dependent S-boxes.

3. Cryptographic Properties of the Proposed S-Box

In this section, we analyze our method and S-Box given in Table 1 against widely accepted standard S-Box performance criteria to gauge its cryptographic strength.

3.1. Bijection

A function, f: X Y , is bijective if and only if ∀yY, ∃ a unique xX, such that f(x) = y. For n-bit inputs, this property maps all possible 2n input values to distinct output values. In other words, when x1x2, then f(x1) ≠ f(x2). All component Boolean functions (f1 to f8) of the proposed S-box are balanced (number of 1’s = number of 0’s). Further, all 28 output values of the S-box are distinctive where each output value ∈ Z = {0, 1, …., 255}.

3.2. Nonlinearity

An S-Box operation should not be a linear mapping of an input to an output as it weakens the strength of any cipher. A high value of non-linearity provides resistance against linear cryptanalysis. The nonlinearity of an n-bit Boolean function, f, is calculated as [55,56]:
N L ( f ) = 2 n 1 1 2 (   max z { 0 , 1 } n | W f ( z ) | )
where, Wf(z) = Walsh spectrum of the coordinate Boolean function, f, which is measured as:
W f ( z ) = t { 0 , 1 } n ( 1 ) f ( t ) t . z
Here, t.z is the dot product of t and z in bit-by-bit fashion and z ∈ {0, 1}n. The nonlinearity values, NL(f), of the Boolean functions of our S-Box are given in Table 2.
Table 3 and Figure 2 give a comparison between the nonlinearity values of the proposed S-box and various other S-Boxes. It is obvious from Table 3 and Figure 2 that our S-Box has a greater capability for diluting the linearity, making the linear cryptanalysis very challenging.

3.3. Strict Avalanche Criterion (SAC)

Webster et al. [65] introduced strict avalanche criteria as the important property for strong S-boxes. This property states that a single bit change in the input should change half of the output bits. An SAC value nearer to 0.5 is considered adequate. An S-Box should exhibit a strict avalanche effect to have good randomness. Table 4 provides the SAC values of our S-Box and it is obvious that the average SAC value of the proposed S-Box is equal to 0.5. This result indicates that our S-Box satisfies the SAC property very well.

3.4. Bit Independence Criterion (BIC)

The authors in [65] introduced this criterion. According to this criterion, if an input bit, x, is inverted; this changes the output bits, y and z, independently. For greater security, efforts are made to decrease the dependence between output bits. If a given S-Box satisfies the BIC, all the component Boolean functions possess high nonlinearity and meet the SAC [65]. Table 5 and Table 6 demonstrate the possible values of nonlinearity and the SAC for the component Boolean functions of the proposed S-Box.
Considering the nonlinearities and SAC, the average BIC values are 103.5 and 0.5, respectively. If a given S-Box is non-linear and demonstrates the SAC, it fulfills BIC [26]. These values are an indication of a very week linear relationship between the output bits and hence fully justify the BIC of the proposed S-box.

3.5. Linear Probability

Modern block ciphers are designed to create as much diffusion and confusion of the bits as possible for the security of data and provide a shield against different approaches that cryptanalysts adopt to obtain the plaintext. Mostly, this is achieved by S-Boxes, which provide nonlinear transformations. If an S-Box is designed with a low linear probability (LP), it is a very good cryptographic tool against linear cryptanalysis.
The linear probability of an S-Box is calculated using the following equation [56]:
L P = max A x ,   B x 0   | # { x Z | x · A x = S ( x ) · B x } 2 n 1 2 |
where, Ax and Bx represent the input and output masks, respectively and Z = {0, 1, …., 255}.
The maximum value of LP of our S-box is only 0.156, and thus our S-Box provides good resistance against linear cryptanalysis.

3.6. Differential Uniformity

Differential cryptanalysis is one of the most commonly used methods to reach the plaintext. Here, the differences in the original message (plaintext) and the differences in the ciphertext are obtained. The pairing of these differences may help reach some of the key values. To defy differential cryptanalysis, a small value of differential uniformity (DU) for a given S-Box is required. Differential uniformity is calculated as [56]:
D U = max   A x 0 ,   B x [ # { x Z | S ( x ) S ( x     x )   =   y ] }  
where, Δx and Δy are the input and output differentials, respectively. An S-box with smaller differentials is better at repelling differential cryptanalysis. Table 7 shows the differential uniformity values of the proposed S-box. The proposed S-box has a maximum value of DU as 10 and its count is only 7. So, the differential probability (DP) is 0.039. These smaller values of DU and DP provide evidence that the proposed S-Box has good resistance against differential cryptanalysis.
Figure 3 shows a graphical comparison of the DP values of the proposed and other S-Boxes.

3.7. Performance Comparison

Table 8 shows the performance comparison of our S-Box with other S-Boxes based on the cryptographic properties. Our findings are:
  • A high value of non-linearity provides resistance against linear cryptanalysis [55]. The average nonlinearity of the proposed S-Box is superior to the rest of the S-Boxes in Table 8. This results in decent confusion and makes the proposed S-box resilient against linear cryptanalysis.
  • An SAC value near 0.5 (the perfect value for SAC) is the ultimate goal of every S-Box designer. Table 8 demonstrates that our SAC value (0.497) is very close to this perfect value. We can say that our S-Box satisfies the SAC.
  • Similarly, the BIC value of our S-box is better than the BIC values of more than half of the other S-boxes. Table 5 and Table 6 demonstrate that the BIC values of our S-Box with respect to nonlinearity and SAC are adequate, thus satisfying the BIC test.
  • Any S-Box with a lesser value of differential probability is more resilient against differential cryptanalysis. The DP value of our S-Box is 0.039, which is better than the DP values of nine other S-Boxes and equal to the DP values of two other S-Boxes as shown in Table 8. This value of DP reflects the strength of our S-Box.
  • To defy linear cryptanalysis, a smaller value of LP for a given S-Box is desired by S-Box designers. The LP value of our S-Box is 0.156. Due to this small value, we can say that our S-box is resistant to linear cryptanalysis.
From the above comparison it is evident that our S-Box fulfills the most needed S-Box criteria and benchmarks, like SAC, BIC, NL, LP, DP, etc., and hence possesses better cryptographic strength.

4. Conclusions

In this paper, we proposed a new transformation and suggested a novel method to construct efficient S-Boxes using cubic fractional transformation. The security strength of the proposed S-Box was studied using different standard criteria. The simulation results were in accordance with other relevant S-Boxes, rationalizing the performance of our S-Box method. The performance of our S-Box was good in most of the cases when compared with other recent S-Boxes. In particular, the scores of the SAC, BIC, nonlinearity, LP, and DP of the proposed S-Box provide evidence for it as a new alternative in the S-Box design domain. The promising results of the proposed S-Box analysis make it a potential candidate for usage in modern-day block ciphers. It is worth mentioning that our method is the first to explore the cubic fractional transformation for S-Box construction. Stronger S-boxes using cubic fractional transformation, like the proposed S-Box, are expected to emerge for usage in practical systems for secure communication.

Author Contributions

Formal analysis, M.J.A.; Investigation, M.A.; Methodology, A.H.Z.; Project administration, M.J.A.; Resources, M.A.; Software, A.H.Z.; Supervision, M.J.A.; Validation, M.A.; Writing—original draft, A.H.Z.; Writing—review & editing, M.A.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bhanot, R.; Hans, R. A Review and Comparative Analysis of Various Encryption Algorithms. Int. J. Secur. Its Appl. 2015, 9, 289–306. [Google Scholar] [CrossRef]
  2. Paar, C.; Pelzl, J.; Preneel, B. Understanding Cryptography, 1st ed.; Springer: Berlin, Germany, 2010. [Google Scholar]
  3. Shamir, A. Stream Ciphers: Dead or Alive? In Proceedings of the 10th International Conference on Theory and Application of Cryptology and Information Security, Jeju Island, Korea, 5–9 December 2004.
  4. Lambić, D.; Živković, M. Comparison of Random S-Box Generation Methods. De L’institut Mathématique 2013, 93, 109–115. [Google Scholar]
  5. Lauridsen, M.M.; Rechberger, C.; Knudsen, L.R. Design and Analysis of Symmetric Primitive; DTU Orbit: Lyngby, Denmark, 2016. [Google Scholar]
  6. Dragomir, I.R.; Lazăr, M. Generating and Testing the Components of a Block Cipher. In Proceedings of the 18th International Conference on Electronics, Computers and Artificial Intelligence, Ploiesti, Romania, 30 June–2 July 2016. [Google Scholar]
  7. Mohamed, K.; Nazran, M.; Pauzi, M.; Hani, F.; Ali, H.M.; Ariffin, S.; Huda, N.; Zulkipli, N. Study of S-box Properties in Block Cipher. In Proceedings of the International Conference on Computer Communication and Control Technology, Langkawi Island, Malaysia, 2–4 September 2014. [Google Scholar]
  8. Manjula, G.; Mohan, H.S. Constructing Key Dependent Dynamic S-Box for AES Block Cipher System. In Proceedings of the International Conference on Applied and Theoretical Computing and Communication Technology, Bengaluru, India, 21–23 July 2016. [Google Scholar]
  9. Radhakrishnan, S.V.; Subramanian, S. An Analytical Approach to S-box Generation. In Proceedings of the International Conference on Communication and Signal Processing, Chennai, India, 4–5 April 2012. [Google Scholar]
  10. Du, Z.; Xu, Q.; Zhang, J.; Li, M. Design and Analysis of Dynamic S-Box based on Feistel. In Proceedings of the International Conference on Advanced Information Technology, Electronic and Automation Control, Chongqing, China, 19–20 December 2015. [Google Scholar]
  11. Katiyar, S.; Jeyanthi, N. Pure Dynamic S-box Construction. Int. J. Comput. 2016, 1, 42–46. [Google Scholar]
  12. Alabaichi, A.; Salih, A.I. Enhance Security of Advance Encryption Standard Algorithm Based on Key-dependent S-Box. In Proceedings of the International Conference on Digital Information Processing and Communications, Sierre, Switzerland, 7–9 October 2015. [Google Scholar]
  13. Sahmoud, S.; Elmasry, W.; Abudalfa, S. Enhancement the Security of AES against Modern Attacks by Using Variable Key Block Cipher. Int. Arab J. e-Technol. 2013, 3, 17–26. [Google Scholar]
  14. Moh’d, A.; Jararweh, Y.; Tawalbeh, L. AES-512: 512-Bit Advanced Encryption Standard Algorithm Design and Evaluation. In Proceedings of the International Conference on Information Assurance and Security, Melacca, Malaysia, 5–8 December 2011. [Google Scholar]
  15. Juremi, J.; Mahmod, R.; Sulaiman, S. A Proposal for Improving AES S-box with Rotation and Key-Dependent. In Proceedings of the International Conference on Digital Cyber Security, Cyber Warfare and Digital Forensic, Kuala Lumpur, Malaysia, 26–28 June 2012. [Google Scholar]
  16. Sahoo, O.B.; Kole, D.K.; Rahaman, H. An optimized S-box for Advanced Encryption Standard (AES) design. In Proceedings of the International Conference on Advanced Computer Communication, Chennai, India, 3–5 August 2012. [Google Scholar]
  17. Wang, H.; Zheng, H.; Hu, B.; Tang, H. Improved lightweight encryption algorithm based on optimized S-box. In Proceedings of the International Conference on Computational and Information Sciences, Shiyan, China, 21–23 June 2013. [Google Scholar]
  18. Niemiec, M.; Machowski, Ł. A new symmetric block cipher based on key-dependent S-boxes. In Proceedings of the International Conference on ultra-Modern Telecommunications and Control Systems, St. Petersburg, Russia, 3–5 October 2012. [Google Scholar]
  19. Kazlauskas, K.; Smaliukas, R.; Vaicekauskas, G. A Novel Method to Design S-Boxes Based on Key-Dependent Permutation Schemes and its Quality Analysis. Int. J. Adv. Comput. Sci. Appl. 2016, 7, 93–99. [Google Scholar] [CrossRef]
  20. Patil, J.; Bansod, G.; Kant, K.S. LiCi: A new ultra-lightweight block cipher. In Proceedings of the International Conference on Emerging Trends and Innovation in ICT, Pune, India, 3–5 February 2017. [Google Scholar]
  21. Agrawal, H.; Sharma, M. Implementation and analysis of various symmetric cryptosystems. Indian J. Sci. Technol. 2010, 3, 1173–1176. [Google Scholar]
  22. Nejad, F.H.; Sabah, S.; Jam, A.J. Analysis of Avalanche Effect on Advance Encryption Standard by using Dynamic S-Box Depends on Rounds Keys. In Proceedings of the International Conference on Computational Science and Technology, Sabah, Malaysia, 27–28 August 2014. [Google Scholar]
  23. Shi, H.; Deng, Y.; Guan, Y. Analysis of the Avalanche Effect of the AES S Box. In Proceedings of the International Conference on Artificial Intelligence, Management Science and Electronic Commerce, Deng Feng, China, 8–10 August 2011. [Google Scholar]
  24. Mahmoud, E.M.; Hafez, A.A.; Elgarf, T.A.; Zekry, A.H. Dynamic AES-128 with Key-Dependent S-box. Int. J. Eng. Res. Appl. 2013, 3, 1662–1670. [Google Scholar]
  25. Mar, P.P.; Latt, K.M. New Analysis Methods on Strict Avalanche Criterion of S-Boxes. Int. J. Math. Comput. Sci. 2008, 2, 899–903. [Google Scholar]
  26. Adams, C.; Tavares, S. The Structured Design of Cryptographically Good S-Boxes. J. Cryptol. 1990, 3, 27–31. [Google Scholar] [CrossRef]
  27. Ou, C.M. Design of Block Ciphers by Simple Chaotic Functions. Comput. Intell. Mag. 2008, 3, 54–59. [Google Scholar] [CrossRef]
  28. Garg, S.; Upadhyay, D. S-Box Design Approaches: Critical Analysis and Future Directions. Int. J. Adv. Res. Comput. Sci. Electron. Eng. 2013, 2, 426–430. [Google Scholar]
  29. Jakimoski, G.; Kocarev, L. Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 2001, 48, 163–169. [Google Scholar] [CrossRef]
  30. Ahmad, M.; Mittal, N.; Garg, P.; Khan, M.M. Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos. Perspect. Sci. 2016, 8, 465–468. [Google Scholar] [CrossRef]
  31. Ahmad, M.; Haleem, H.; Khan, P.M. A New Chaotic Substitution Box Design for Block Ciphers. In Proceedings of the International Conference on Signal Processing and Integrated Networks, Delhi, India, 20–21 February 2014. [Google Scholar]
  32. Ahmed, H.A.; Zolkipli, M.F.; Ahmad, M. A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput. Appl. 2018. [Google Scholar] [CrossRef]
  33. Ahmad, M.; Doja, M.N.; Beg, M.M.S. ABC Optimization Based Construction of Strong Substitution-Boxes. Wirel. Pers. Commun. 2018, 101, 1715–1729. [Google Scholar] [CrossRef]
  34. Alzaidi, A.A.; Ahmad, M.; Doja, M.N.; Solami, E.A.; Beg, M.M.S. A New 1D Chaotic Map and beta-Hill Climbing for Generating Substitution-Boxes. IEEE Access 2018, 6, 55405–55418. [Google Scholar] [CrossRef]
  35. Alzaidi, A.A.; Ahmad, M.; Ahmed, H.S.; Solami, E.A. Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map. Complexity 2018, 2018, 9389065. [Google Scholar] [CrossRef]
  36. Peng, J.; Jin, S.; Lei, L.; Jia, R. A Novel Method for Designing Dynamical Key-Dependent S-Boxes based on Hyperchaotic System. Int. J. Adv. Comput. Technol. 2016, 4, 282–289. [Google Scholar]
  37. Solami, E.A.; Ahmad, M.; Volos, C.; Doja, M.; Beg, M. A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes. Entropy 2018, 20, 525. [Google Scholar] [CrossRef]
  38. Kadhim, A.; Majeed, G.H.A. Proposal New S-Box Depending on DNA computing and Mathematical Operations. In Proceedings of the International Conference on Multidisciplinary in IT and Communication Science and Applications, Baghdad, Iraq, 9–10 May 2016. [Google Scholar]
  39. Al-Wattar, A.H.; Mahmod, R.; Zukarnain, Z.A.; Udzir, N.I. A New DNA-Based S-Box. Int. J. Eng. Technol. 2015, 15, 1–9. [Google Scholar]
  40. Leier, A.; Richter, C.; Banzhaf, W.; Rauhe, H. Cryptography with DNA Binary Strands. BioSystems 2000, 57, 13–22. [Google Scholar] [CrossRef]
  41. Rahman, N.H.U.; Balamurugan, C.; Mariappan, R. A Novel DNA Computing based Encryption and Decryption Algorithm. Procedia Comput. Sci. 2016, 46, 463–475. [Google Scholar]
  42. Raj, B.B.; Vijay, J.F.; Mahalakshmi, T. Secure Data Transfer through DNA Cryptography using Symmetric Algorithm. Int. J. Comput. Appl. 2016, 133, 19–23. [Google Scholar]
  43. Shaw, H. A Cryptographic System Based upon the Principles of Gene Expression. Cryptography 2017, 1, 21. [Google Scholar] [CrossRef]
  44. Wang, Y.; Xie, Q.; Wu, Y.; Du, B. A Software for S-box Performance Analysis and Test. In Proceedings of the International Conference on Electronic Commerce and Business Intelligence, Beijing, China, 6–7 June 2009. [Google Scholar]
  45. Albermany, S.A.K.; Hamade, F.R.; Safdar, G.A. New Random Block Cipher Algorithm. In Proceedings of the International Conference on Current Research in Computer Science and Information Technology, Sulaimani, Iraq, 26–27 April 2017. [Google Scholar]
  46. Tran, B.N.; Nguyen, T.D.; Tran, T.D. A New S-Box Structure Based on Graph Isomorphism. In Proceedings of the International Conference on Computational Intelligence and Security, Beijing, China, 11–14 December 2009. [Google Scholar]
  47. Razaq, A.; Yousaf, A.; Shuaib, U.; Siddiqui, N.; Ullah, A.; Waheed, A. A Novel Construction of Substitution Box involving Coset Diagram and a Bijective Map. Secur. Comm. Netw. 2017, 2017, 5101934. [Google Scholar] [CrossRef]
  48. Al-Hazaimeh, O.M.A. Design of a New Block Cipher Algorithm. Netw. Complex Syst. 2013, 3, 1–6. [Google Scholar]
  49. Farwa, S.; Shah, T.; Idrees, L. A Highly Nonlinear S-Box based on a Fractional Linear Transformation. SpringerPlus 2016, 5, 1658. [Google Scholar] [CrossRef] [PubMed]
  50. Hussain, I.; Shah, T.; Gondal, M.A.; Khan, M.; Khan, W.A. Construction of New S-box using a Linear Fractional Transformation. World Appl. Sci. J. 2011, 14, 1779–1785. [Google Scholar]
  51. Altaleb, A.; Saeed, M.S.; Hussain, I.; Aslam, M. An Algorithm for the Construction of Substitution Box for Block Ciphers based on Projective General Linear Group. AIP Adv. 2017, 7, 035116. [Google Scholar] [CrossRef]
  52. Sarfraz, M.; Hussain, I.; Ali, F. Construction of S-Box Based on Mobius Transformation and Increasing its Confusion Creating Ability through Invertible Function. Int. J. Comput. Sci. Inf. Secur. 2016, 14, 187–199. [Google Scholar]
  53. Gangadari, B.R.; Ahamed, S.R. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications. Healthc. Technol. Lett. 2016, 3, 177–183. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  54. Picek, S.; Mariot, L.; Yang, B.; Jakobovic, D.; Mentens, N. Design of S-boxes defined with Cellular Automata Rules. In Proceedings of the ACM International Conference on Computing Frontiers, Siena, Italy, 15–17 May 2017. [Google Scholar]
  55. Cusick, T.W.; Stanica, P. Cryptographic Boolean Functions and Applications; Academic Press: Amsterdam, The Netherlands, 2009. [Google Scholar]
  56. Biham, E.; Shamir, A. Differential Cryptanalysis of DES-like Cryptosystems. In Advances in Cryptology-CRYPT0’ 90; Menezes, A.J., Vanstone, S.A., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany; Volume 537, pp. 2–21.
  57. Alkhaldi, A.H.; Hussain, I.; Gondal, M.A. A novel design for the construction of safe S-boxes based on TDERC sequence. Alex. Eng. J. 2015, 54, 65–69. [Google Scholar] [CrossRef] [Green Version]
  58. Chen, G. A novel heuristic method for obtaining S-boxes. Chaos Solitons Fractals 2008, 36, 1028–1036. [Google Scholar] [CrossRef]
  59. Belazi, A.; Rhouma, R.; Belghith, S. A novel approach to construct S-box based on Rossler system. In Proceedings of the International Wireless Communications and Mobile Computing Conference, Dubrovnik, Croatia, 24–28 August 2015. [Google Scholar]
  60. Mahmood, S.; Farwa, S.; Rafiq, M.; Riaz, S.M.J.; Shah, T.; Jamal, S.S. To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers. Secur. Commun. Netw. 2018, 2018, 5823230. [Google Scholar] [CrossRef]
  61. Siddiqui, N.; Afsar, U.; Shah, T.; Qureshi, A. A Novel Construction of S16 AES S-boxes. Int. J. Comput. Sci. Inf. Secur. 2016, 14, 811–818. [Google Scholar]
  62. Hussain, I.; Shah, T.; Gondal, M.A.; Wang, Y. Analyses of SKIPJACK S-Box. World Appl. Sci. J. 2011, 13, 2385–2388. [Google Scholar]
  63. Hussain, I.; Shah, T.; Gondal, M.A.; Khan, W.A.; Mahmood, H. A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 2013, 23, 97–104. [Google Scholar] [CrossRef]
  64. Hussain, I.; Shah, T.; Gondal, M.A.; Mahmood, H. Some analysis of S-box based on residue of prime number. Proc. Pak. Acad. Sci. 2011, 48, 111–115. [Google Scholar]
  65. Webster, A.F.; Tavares, S.E. On the Design of S-Boxes. In Proceedings of the Conference on Theory and Application of Cryptographic Techniques, Santa Barbara, CA, USA, 18–22 August 1986. [Google Scholar]
Figure 1. Flowchart for the construction of the proposed S-Box.
Figure 1. Flowchart for the construction of the proposed S-Box.
Entropy 21 00245 g001
Figure 2. Average nonlinearity values of the proposed S-Box and other S-Boxes.
Figure 2. Average nonlinearity values of the proposed S-Box and other S-Boxes.
Entropy 21 00245 g002
Figure 3. Differential probability values of the proposed and other S-Boxes.
Figure 3. Differential probability values of the proposed and other S-Boxes.
Entropy 21 00245 g003
Table 1. Proposed S-Box.
Table 1. Proposed S-Box.
12025019318088223185112210242233241919553174
13211512522074135190807210443823938194186
183153311601161571141654813522212446324119
461711691589177421231401221112162459870197
20323516818712261371381016022510011328195146
291991898621410220039178191227442715246141
1441342551922204181398235156572091817993
188231206977712814315516759208175253373218
626147159786813612658361522522494567229
54569969419814522617324734118587248118
192213133212237219220215121219491095023864
01766617625415022210612920540196127230179
1546930163331045521057117716581251
148170182217232236151124224171314116616196184
10783162371301722287525103240147108207211234
32110512316201202164148414924314259089
Table 2. Coordinate Boolean functions of the proposed S-box and their nonlinearity values.
Table 2. Coordinate Boolean functions of the proposed S-box and their nonlinearity values.
ff1f2f3f4f5f6f7f8
NL(f)106106106108108108108106
Table 3. Comparison of the nonlinearity values of different S-boxes.
Table 3. Comparison of the nonlinearity values of different S-boxes.
S-Box methodMinimumMaximumAverage
[19]98108102.5
[24]96110104.3
[50]98108104
[57]98108104
[58]102106104
[59]102108105.3
[60]100110105.5
[61]104106105.3
[62]100108105.7
[63]100108104.8
[64]9410499.5
Proposed106108107
Table 4. SAC (strict avalanche criterion) values of the proposed S-box.
Table 4. SAC (strict avalanche criterion) values of the proposed S-box.
0.4840.4680.4530.5150.5460.4680.4680.484
0.4840.5150.5780.4680.4530.4680.4680.515
0.4370.5310.5310.5150.5000.5780.4680.453
0.5310.5310.5780.5310.5310.5150.4680.453
0.5460.5780.4840.5310.4680.5310.4680.484
0.4840.4840.4680.4210.4530.5150.4370.531
0.5310.4210.4370.4680.4530.5620.5310.531
0.4530.5150.5310.5150.4530.4680.5150.515
Table 5. BIC (bit independence criterion) and nonlinearity.
Table 5. BIC (bit independence criterion) and nonlinearity.
f1f2f3f4f5f6f7f8
f1-102108108102100108104
f2102-104102108108104100
f3108104-104106102100102
f4108102104-9810498102
f510210810698-102106104
f6100108102104102-104106
f710810410098106104-102
f8104100102102104106102-
Table 6. BIC and SAC.
Table 6. BIC and SAC.
f1f2f3f4f5f6f7f8
f1-0.5210.5210.5190.5070.5010.4840.523
f20.521-0.4900.5000.5010.5030.5050.472
f30.5210.490-0.5090.5050.5170.4720.500
f40.5190.5000.509-0.5000.5110.4800.500
f50.5070.5010.5050.500-0.5170.5070.509
f60.5010.5030.5170.5110.517-0.5130.496
f70.4840.5050.4720.4800.5070.513-0.513
f80.5230.4720.5000.5000.5090.4960.513-
Table 7. Differential uniformity values of the proposed S-Box.
Table 7. Differential uniformity values of the proposed S-Box.
8686666688686666
8666668886866686
86106666866866686
8866666686666666
6668466668886866
6886668686866668
8868646886688868
8688688666668886
6668686688668886
6886666666686688
66686668866610666
6848666666868668
66686688106666666
6686666686686666
868868101066668666
66866106108888688-
Table 8. Recital comparison of different S-Boxes. NL: nonlinearity; LP: linear probability; DP: differential probability.
Table 8. Recital comparison of different S-Boxes. NL: nonlinearity; LP: linear probability; DP: differential probability.
S-Box MethodAverage NonlinearitySACBIC-NLLPDP
[19]102.50.492103.30.1410.062
[24]104.30.497103.40.1330.047
[50]1040.505103.40.1330.250
[57]1040.507102.90.0860.047
[58]1040.498102.90.1480.039
[59]105.30.502103.70.1250.047
[60]105.50.4991060.1330.125
[61]105.30.504104.60.1330.039
[62]105.70.498104.30.1090.047
[63]104.80.501105.10.1250.125
[64]99.50.516101.70.1320.281
Proposed1070.497103.50.1560.039

Share and Cite

MDPI and ACS Style

Zahid, A.H.; Arshad, M.J.; Ahmad, M. A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation. Entropy 2019, 21, 245. https://doi.org/10.3390/e21030245

AMA Style

Zahid AH, Arshad MJ, Ahmad M. A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation. Entropy. 2019; 21(3):245. https://doi.org/10.3390/e21030245

Chicago/Turabian Style

Zahid, Amjad Hussain, Muhammad Junaid Arshad, and Musheer Ahmad. 2019. "A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation" Entropy 21, no. 3: 245. https://doi.org/10.3390/e21030245

APA Style

Zahid, A. H., Arshad, M. J., & Ahmad, M. (2019). A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation. Entropy, 21(3), 245. https://doi.org/10.3390/e21030245

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop