Abstract
The ability of substitution box (S-box) to create confusion in the cipher attracted different authors to design strong cryptographic S-box. The S-box can further be used in different cryptosystems to create confusion. In this article, a novel scheme is introduced to develop S-box with strong arithmetic background. The construction depends on group action of projective general linear group on units of finite local ring and its features are equated with other promising S-boxes. This S-box is evaluated with the help of bit independent criterion, strict avalanche criterion, non-linearity test, linear approximation probability test and differential approximation probability test. The results of majority logic criterion suggest the strength and implementation of our S-box.
Similar content being viewed by others
References
Daemen, J., & Rijmen, V. (2002). The design of Rijndael-AES: The advanced encryption standard. Berlin: Springer.
Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal, 28, 656–715.
Feistel, H. (1973). Cryptography and computer privacy. Scientific American, 228, 15–23.
Cui, L., & Cao, Y. (2007). A new S-box structure named affine-power affine. International Journal of Innovative Computing, Information and Control, 3(3), 45–53.
Daemen, J., & Rijmen, V. (2002). The design of Rijndael-AES: The advanced encryption standard. Berlin: Springer.
Hussain, I., Shah, T., & Mahmood, H. (2010). A new algorithm to construct secure keys for AES. International Journal of Contemporary Mathematical Sciences, 5(26), 1263–1270.
Kim, J., & Phan, R. C.-W. (2009). Advanced differential-style cryptanalysis of the NSA’s skipjack block cipher. Cryptologia, 33(3), 246–270.
Shi, X. Y., Xiao, Hu, You, X. C., & Lam, K. Y. (2002). A method for obtaining cryptographically strong 8 × 8 S-boxes. International Conference on Information Network Application, 2(3), 14–20.
Hussain, I., Shah, T., Mahmood, H., Gondal, M. A., & Bhatti, U. Y. (2011). Some analysis of S-box based on residue of prime number. Proceeding of the Pakistan Academy of Sciences, 48(2), 111–115.
Tran, M. T., Bui, D. K., & Doung, A. D. (2008). Gray S-box for advanced encryption standard. In International conference on computational intelligence and security (pp. 253–256).
Feng, D., & Wu, W. (2000). Design and analysis of block ciphers. Beijing: Tsinghua University Press.
Biham, E., & Shamir, A. (1991). Differential Cryptanalysis of DES like Cryptosystems. Journal of Cryptology, 4(1), 3–72.
Shah, T., Hussain, I., Gondal, M. A., & Mahmood, H. (2011). Statistical analysis of S-box in image encryption applications based on majority logic criterion. International Journal Physical Sciences, 6(16), 4110–4127.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Attaullah, Jamal, S.S. & Shah, T. A Novel Algebraic Technique for the Construction of Strong Substitution Box. Wireless Pers Commun 99, 213–226 (2018). https://doi.org/10.1007/s11277-017-5054-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-5054-x