A method for generation of substitution box based on random selection

Abstract Two basic requirements must be met to encrypt data. These requirements are confusion and diffusion properties. In particular, block cipher algorithms are based on a cryptographic component known as substitution-box to provide the need for confusion. Therefore, attack scenarios generally focus on this cryptographic component. There are alternative design approaches for substitution-box design. It is known that each design approach has several advantages and disadvantages. In this study, an alternative method is proposed to address the problems of the substitution-box design approach based on random selection. The success of the proposed method has been tested in three different scenarios. Analysis results for these three scenarios showed that generated substitution-box provides performance increase for nonlinearity criterion from s-box design criteria. Successful results achieved; It points out that improvement cryptographic components can be used in a variety of practical applications such as block ciphers, masks to prevent side-channel attacks, random number generators, and image encryption algorithms.

[1]  Kaisa Nyberg,et al.  Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.

[2]  Musheer Ahmad,et al.  Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures , 2020, IEEE Access.

[3]  Kwok-Wo Wong,et al.  On the Security of a Class of Diffusion Mechanisms for Image Encryption , 2015, IEEE Transactions on Cybernetics.

[4]  Ingrid Verbauwhede,et al.  Side-Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms , 2007 .

[5]  Chengqing Li,et al.  When an attacker meets a cipher-image in 2018: A Year in Review , 2019, J. Inf. Secur. Appl..

[6]  Nidaa A. Abbas,et al.  Image encryption based on Independent Component Analysis and Arnold’s Cat Map , 2016 .

[7]  Fatih Özkaynak,et al.  Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique , 2019, IEEE Access.

[8]  Fatih Özkaynak,et al.  A Novel Method for Performance Improvement of Chaos-Based Substitution Boxes , 2020, Symmetry.

[9]  Mobashar Rehman,et al.  Generation of Highly Nonlinear and Dynamic AES Substitution-Boxes (S-Boxes) Using Chaos-Based Rotational Matrices , 2020, IEEE Access.

[10]  Wei Feng,et al.  Cryptanalysis and Improvement of the Hyper-Chaotic Image Encryption Scheme Based on DNA Encoding and Scrambling , 2018, IEEE Photonics Journal.

[11]  Nasir Siddiqui,et al.  A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field , 2020, PloS one.

[12]  Fatih Özkaynak,et al.  Side-Channel Analysis of Chaos-Based Substitution Box Structures , 2019, IEEE Access.

[13]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[14]  Fatih Özkaynak,et al.  Role of NPCR and UACI tests in security problems of chaos based image encryption algorithms and possible solution proposals , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).

[15]  Fatih Özkaynak,et al.  Construction of robust substitution boxes based on chaotic systems , 2019, Neural Computing and Applications.

[16]  Jinhu Lu,et al.  On Cryptanalysis of Fridrich's chaotic image encryption scheme , 2016, ArXiv.

[17]  Wadii Boulila,et al.  DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption , 2020, IEEE Access.

[18]  Meng Ge,et al.  A novel image encryption scheme based on 3D bit matrix and chaotic map with Markov properties , 2019, Egyptian Informatics Journal.

[19]  Fatih Özkaynak An Analysis and Generation Toolbox for Chaotic Substitution Boxes: A Case Study Based on Chaotic Labyrinth Rene Thomas System , 2020 .

[20]  Joan Daemen,et al.  The Design of Rijndael: The Advanced Encryption Standard (AES) , 2020, Information Security and Cryptography.

[21]  Erkan Tanyildizi,et al.  A New Chaotic S-Box Generation Method Using Parameter Optimization of One Dimensional Chaotic Maps , 2019, IEEE Access.

[22]  Nasir Siddiqui,et al.  A Novel Algebraic Technique for Design of Computational Substitution-Boxes Using Action of Matrices on Galois Field , 2020, IEEE Access.

[23]  Tabasam Rashid,et al.  Construction of Nonlinear Component of Block Cipher by Action of Modular Group PSL(2, Z) on Projective Line PL(GF(28)) , 2020, IEEE Access.

[24]  Walaa M. Sheta,et al.  Security-aware dynamic VM consolidation , 2020, Egyptian Informatics Journal.

[25]  Ammar Odeh,et al.  Security and privacy of electronic health records: Concerns and challenges , 2020, Egyptian Informatics Journal.

[26]  Musheer Ahmad,et al.  Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme , 2020, Entropy.

[27]  Fatih Özkaynak,et al.  An Image Encryption Algorithm Based on Chaotic Selection of Robust Cryptographic Primitives , 2020, IEEE Access.

[28]  Musheer Ahmad,et al.  Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications , 2020, IEEE Access.

[29]  Benfano Soewito,et al.  IoT security system with modified Zero Knowledge Proof algorithm for authentication , 2020 .

[30]  Farah R. Shareef A novel crypto technique based ciphertext shifting , 2020 .

[31]  Atta Ullah,et al.  A Novel Group Theoretic and Graphical Approach for Designing Cryptographically Strong Nonlinear Components of Block Ciphers , 2020, Wireless Personal Communications.

[32]  Fatih Özkaynak,et al.  A Method to Determine the Most Suitable Initial Conditions of Chaotic Map in Statistical Randomness Applications , 2021, IEEE Access.

[33]  Sodeif Ahadpour,et al.  Execution examination of chaotic S-box dependent on improved PSO algorithm , 2020, Neural Computing and Applications.

[34]  Matthew J. B. Robshaw,et al.  The Block Cipher Companion , 2011, Information Security and Cryptography.