Heuristic Approach for Nonlinear n × n (3 ≤ n ≤ 7) Substitution-Boxes

Substitution boxes are meant to enact nonlinear transformations of n-bit input streams to n-bit output streams. A highly nonlinear essence of them is imperative to induce obligatory confusion of data and to mitigate the potential linear cryptanalysis as well. It has been known that cryptographically potent S-boxes are creditworthy for the success of modern block encryption systems. This paper proposes to suggest an approach to frame a generic design that has the efficacy of synthesizing highly nonlinear balanced n × n S-boxes for 3 ≤ n ≤ 7. The proposed approach is based on the heuristic optimization that seeks for local and global best S-box candidates on each iteration. The resultant optimized S-boxes are provided and tested for nonlinearity soundness. The performance outcomes and assessment analysis justify that the generic approach is consistent for contriving highly nonlinear key-dependent S-boxes.

[1]  Iqtadar Hussain,et al.  A novel design for the construction of safe S-boxes based on TDERC sequence , 2015 .

[2]  Musheer Ahmad,et al.  A Chaos Based Method for Efficient Cryptographic S-box Design , 2013, SSCC.

[3]  Shujun Li,et al.  Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding , 2001, IMACC.

[4]  Dragan Lambić,et al.  A novel method of S-box design based on chaotic map and composition method , 2014 .

[5]  William Millan,et al.  How to Improve the Nonlinearity of Bijective S-Boxes , 1998, ACISP.

[6]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[7]  Tor Helleseth,et al.  On the covering radius of binary codes (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[8]  Nadia Nedjah,et al.  Designing substitution boxes for secure ciphers , 2007 .

[9]  Minh-Triet Tran,et al.  Gray S-Box for Advanced Encryption Standard , 2008, 2008 International Conference on Computational Intelligence and Security.

[10]  Tariq Shah,et al.  Literature survey on nonlinear components and chaotic nonlinear components of block ciphers , 2013, Nonlinear Dynamics.

[11]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[12]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[13]  Musheer Ahmad,et al.  A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique , 2014, SNDS.

[14]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[15]  Nicholas J. Patterson,et al.  The covering radius of the (215, 16) Reed-Muller code is at least 16276 , 1983, IEEE Trans. Inf. Theory.

[16]  Christopher A. Wood Large substitution boxes with efficient combinational implementations , 2013 .

[17]  M. N. Vrahatis,et al.  Utilizing Evolutionary Computation Methods for the Design of S-Boxes , 2006, 2006 International Conference on Computational Intelligence and Security.

[18]  Musheer Ahmad,et al.  PWLCM-Based Random Search for Strong Substitution-Box Design , 2016 .

[19]  Musheer Ahmad,et al.  Design of chaotic neural network based method for cryptographic substitution box , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[20]  Yang Li,et al.  A novel method to design S-box based on chaotic map and genetic algorithm , 2012 .

[21]  Musheer Ahmad,et al.  Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos , 2017, ArXiv.

[22]  H. Feistel Cryptography and Computer Privacy , 1973 .

[23]  Musheer Ahmad,et al.  Designing chaos based strong substitution box , 2015, 2015 Eighth International Conference on Contemporary Computing (IC3).

[24]  Musheer Ahmad,et al.  A Novel Ant Colony Optimization Based Scheme for Substitution Box Design , 2015 .

[25]  William Millan,et al.  Multi-objective optimisation of bijective s-boxes , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[26]  Chung-Huang Yang,et al.  On the Linear Consistency Test (LCT) in Cryptanalysis with Applications , 1989, CRYPTO.