Skip to main content
Log in

A Novel Algebraic Technique for the Construction of Strong Substitution Box

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The ability of substitution box (S-box) to create confusion in the cipher attracted different authors to design strong cryptographic S-box. The S-box can further be used in different cryptosystems to create confusion. In this article, a novel scheme is introduced to develop S-box with strong arithmetic background. The construction depends on group action of projective general linear group on units of finite local ring and its features are equated with other promising S-boxes. This S-box is evaluated with the help of bit independent criterion, strict avalanche criterion, non-linearity test, linear approximation probability test and differential approximation probability test. The results of majority logic criterion suggest the strength and implementation of our S-box.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Daemen, J., & Rijmen, V. (2002). The design of Rijndael-AES: The advanced encryption standard. Berlin: Springer.

    Book  MATH  Google Scholar 

  2. Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal, 28, 656–715.

    Article  MathSciNet  MATH  Google Scholar 

  3. Feistel, H. (1973). Cryptography and computer privacy. Scientific American, 228, 15–23.

    Article  Google Scholar 

  4. Cui, L., & Cao, Y. (2007). A new S-box structure named affine-power affine. International Journal of Innovative Computing, Information and Control, 3(3), 45–53.

    Google Scholar 

  5. Daemen, J., & Rijmen, V. (2002). The design of Rijndael-AES: The advanced encryption standard. Berlin: Springer.

    Book  MATH  Google Scholar 

  6. Hussain, I., Shah, T., & Mahmood, H. (2010). A new algorithm to construct secure keys for AES. International Journal of Contemporary Mathematical Sciences, 5(26), 1263–1270.

    MathSciNet  MATH  Google Scholar 

  7. Kim, J., & Phan, R. C.-W. (2009). Advanced differential-style cryptanalysis of the NSA’s skipjack block cipher. Cryptologia, 33(3), 246–270.

    Article  MATH  Google Scholar 

  8. Shi, X. Y., Xiao, Hu, You, X. C., & Lam, K. Y. (2002). A method for obtaining cryptographically strong 8 × 8 S-boxes. International Conference on Information Network Application, 2(3), 14–20.

    Google Scholar 

  9. Hussain, I., Shah, T., Mahmood, H., Gondal, M. A., & Bhatti, U. Y. (2011). Some analysis of S-box based on residue of prime number. Proceeding of the Pakistan Academy of Sciences, 48(2), 111–115.

    MathSciNet  Google Scholar 

  10. Tran, M. T., Bui, D. K., & Doung, A. D. (2008). Gray S-box for advanced encryption standard. In International conference on computational intelligence and security (pp. 253–256).

  11. Feng, D., & Wu, W. (2000). Design and analysis of block ciphers. Beijing: Tsinghua University Press.

    Google Scholar 

  12. Biham, E., & Shamir, A. (1991). Differential Cryptanalysis of DES like Cryptosystems. Journal of Cryptology, 4(1), 3–72.

    Article  MathSciNet  MATH  Google Scholar 

  13. Shah, T., Hussain, I., Gondal, M. A., & Mahmood, H. (2011). Statistical analysis of S-box in image encryption applications based on majority logic criterion. International Journal Physical Sciences, 6(16), 4110–4127.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Attaullah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Attaullah, Jamal, S.S. & Shah, T. A Novel Algebraic Technique for the Construction of Strong Substitution Box. Wireless Pers Commun 99, 213–226 (2018). https://doi.org/10.1007/s11277-017-5054-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-5054-x

Keywords

Navigation