A Novel Modular Approach Based Substitution-Box Design for Image Encryption

In modern-day block ciphers, the role of substitution-boxes is to transform the plaintext data nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed that the robustness and security of such block ciphers heavily based on the cryptographic strength of the underlying substitution-boxes. Reason being, they are the only components that are held responsible to bring required nonlinearity and complexity into the security system which can frustrate the attackers. Accordingly, a number of different concepts have been explored to construct strong S-boxes. To move forward with the same aim, a novel simple modular approach, the very first time, is investigated to construct nonlinear S-box in this paper. The proposed new modular approach consists of three operations such as new transformation, modular inverses, and permutation. A number of highly nonlinear S-boxes can be easily constructed with slight changes in the novel transformation parameters. An example S-box is presented whose critical performance assessment against some benchmarking criterions such as high nonlinearity, absence of fixed points, fulfillment of SAC and BIC properties, low differential uniformity and linear approximation probability and comparison with recent S-boxes demonstrate its upright cryptographic potentiality. In addition, an image encryption algorithm is also proposed wherein the generated S-box is applied to perform the pixels shuffling and substitution for strong statistical and differential encryption performance.

[1]  Carlisle M. Adams,et al.  The structured design of cryptographically good s-boxes , 1990, Journal of Cryptology.

[2]  Bhoopal Rao Gangadari,et al.  Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications. , 2016, Healthcare technology letters.

[3]  Jie Cui,et al.  AN IMPROVED AES S-BOX AND ITS PERFORMANCE ANALYSIS , 2011 .

[4]  Luigi Lo Iacono Understanding Cryptography , 2018, CCNA® Security Study Guide.

[5]  Jagdish Patil,et al.  LiCi: A new ultra-lightweight block cipher , 2017, 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI).

[6]  Musheer Ahmad,et al.  A new chaotic substitution box design for block ciphers , 2014, 2014 International Conference on Signal Processing and Integrated Networks (SPIN).

[7]  Yang Li,et al.  A novel method to design S-box based on chaotic map and genetic algorithm , 2012 .

[8]  Suriyani Ariffin,et al.  Study of S-box properties in block cipher , 2014, 2014 International Conference on Computer, Communications, and Control Technology (I4CT).

[9]  Akif Akgul,et al.  S-Box Based Image Encryption Application Using a Chaotic System without Equilibrium , 2019, Applied Sciences.

[10]  Rasha Subhi Ali,et al.  Proposal new s-box depending on DNA computing and mathematical operations , 2016, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).

[11]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[12]  Amandeep Singh,et al.  Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant , 2018, Advances in Mechanical Engineering.

[13]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[14]  Tariq Shah,et al.  S-box on subgroup of Galois field based on linear fractional transformation , 2017 .

[15]  Qiang Lai,et al.  A New Chaotic System with Multiple Attractors: Dynamic Analysis, Circuit Realization and S-Box Design , 2017, Entropy.

[16]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[17]  Iqtadar Hussain,et al.  Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications , 2018, Chinese Journal of Physics.

[18]  Pantelimon Stanica,et al.  Cryptographic Boolean Functions and Applications , 2009 .

[19]  Tariq Shah,et al.  A scheme based on algebraic and chaotic structures for the construction of substitution box , 2019, Multimedia Tools and Applications.

[20]  Ahmed A. Abd El-Latif,et al.  Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications , 2020, Scientific Reports.

[21]  Tabasam Rashid,et al.  Image encryption algorithm using S-box and dynamic Hénon bit level permutation , 2019, Multimedia Tools and Applications.

[22]  Dragan Lambic,et al.  S-box design method based on improved one-dimensional discrete chaotic map , 2018, J. Inf. Telecommun..

[23]  Kazys Kazlauskas,et al.  A Novel Method to Design S-Boxes Based on Key-Dependent Permutation Schemes and its Quality Analysis , 2016 .

[24]  Ying-Qian Zhang,et al.  An Efficient Image Encryption Scheme Based on S-Boxes and Fractional-Order Differential Logistic Map , 2020, IEEE Access.

[25]  Musheer Ahmad,et al.  Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures , 2020, IEEE Access.

[26]  Alaa Kadhim,et al.  Visual cryptography for image depend on RSA & AlGamal algorithms , 2016, 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).

[27]  Ikram Ullah,et al.  An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization , 2018, Secur. Commun. Networks.

[28]  Marcin Niemiec,et al.  A new symmetric block cipher based on key-dependent S-boxes , 2012, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems.

[29]  Talaat A. Elgarf,et al.  Dynamic AES-128 with Key-Dependent S-box , 2013 .

[30]  Tariq Shah,et al.  Advance image encryption technique utilizing compression, dynamical system and S-boxes , 2020, Math. Comput. Simul..

[31]  Guojun Wang,et al.  A Novel S-Box Design Algorithm Based on a New Compound Chaotic System , 2019, Entropy.

[32]  Tariq Shah,et al.  A Novel Algebraic Technique for the Construction of Strong Substitution Box , 2018, Wirel. Pers. Commun..

[33]  Musheer Ahmad,et al.  A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes , 2018, Entropy.

[34]  Ahmed A. Abd El-Latif,et al.  A novel image steganography technique based on quantum substitution boxes , 2019, Optics & Laser Technology.

[35]  I. Pehlivan,et al.  Secure image encryption algorithm design using a novel chaos based S-Box , 2017 .

[36]  M. Samet,et al.  A new design of cryptosystem based on S-box and chaotic permutation , 2020, Multimedia Tools and Applications.

[37]  Ashwak Alabaichi,et al.  Enhance security of advance encryption standard algorithm based on key-dependent S-box , 2015, 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC).

[38]  Musheer Ahmad,et al.  Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications , 2020, IEEE Access.

[39]  Shaaban Sahmoud,et al.  Enhancement the Security of AES Against Modern Attacks by Using Variable Key Block Cipher , 2013, Int. Arab. J. e Technol..

[40]  Congxu Zhu,et al.  An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box , 2020, IEEE Access.

[41]  Musheer Ahmad,et al.  A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups , 2020, IEEE Access.

[42]  Tariq Shah,et al.  A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher , 2020, IEEE Access.

[43]  Ali Kashif Bashir,et al.  Providing End-to-End Security Using Quantum Walks in IoT Networks , 2020, IEEE Access.

[44]  Musheer Ahmad,et al.  A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes , 2018, IEEE Access.

[45]  Musheer Ahmad,et al.  Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos , 2018, Symmetry.

[46]  Tariq Shah,et al.  Construction of new substitution boxes using linear fractional transformation and enhanced chaos , 2019, Chinese Journal of Physics.

[47]  Mobashar Rehman,et al.  Generation of Highly Nonlinear and Dynamic AES Substitution-Boxes (S-Boxes) Using Chaos-Based Rotational Matrices , 2020, IEEE Access.

[48]  Xingyuan Wang,et al.  A Novel Method for Constructing the S-Box Based on Spatiotemporal Chaotic Dynamics , 2018, Applied Sciences.

[49]  Seong Oun Hwang,et al.  Chaos-based diffusion for highly autocorrelated data in encryption algorithms , 2015, Nonlinear Dynamics.

[50]  Qun Ding,et al.  Construction Method and Performance Analysis of Chaotic S-Box Based on Fireworks Algorithm , 2019, Int. J. Bifurc. Chaos.

[51]  Erkan Tanyildizi,et al.  A New Chaotic S-Box Generation Method Using Parameter Optimization of One Dimensional Chaotic Maps , 2019, IEEE Access.

[52]  Tabasam Rashid,et al.  Construction of Nonlinear Component of Block Cipher by Action of Modular Group PSL(2, Z) on Projective Line PL(GF(28)) , 2020, IEEE Access.

[53]  Musheer Ahmad,et al.  A Chaos Based Method for Efficient Cryptographic S-box Design , 2013, SSCC.

[54]  Eddie Shahril Ismail,et al.  S-box Construction Based on Linear Fractional Transformation and Permutation Function , 2020, Symmetry.

[55]  Tariq Shah,et al.  A novel scheme for image encryption using substitution box and chaotic system , 2017 .

[56]  Zhu Wang,et al.  A Novel Block Encryption Algorithm Based on Chaotic S-Box for Wireless Sensor Network , 2019, IEEE Access.

[57]  Safya Belghith,et al.  Selective image encryption scheme based on DWT, AES S-box and chaotic permutation , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[58]  Muhammad Asif,et al.  A Method of Generating 8 × 8 Substitution Boxes Based on Elliptic Curves , 2018, Wireless Personal Communications.

[59]  Zuriati Ahmad Zukarnain,et al.  Generating a new S-Box inspired by biological DNA , 2015 .

[60]  Alaa Kadhim Farhan,et al.  A New S-Box Generation Algorithm Based on Multistability Behavior of a Plasma Perturbation Model , 2019, IEEE Access.

[61]  Safya Belghith,et al.  A novel method for designing S-box based on chaotic map and Teaching–Learning-Based Optimization , 2016, Nonlinear Dynamics.

[62]  Musheer Ahmad,et al.  Comparison of Pre and Post-Action of a Finite Abelian Group Over Certain Nonlinear Schemes , 2020, IEEE Access.

[63]  Dragan Lambić,et al.  A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design , 2020 .

[64]  Mu Li,et al.  Design and analysis of dynamic S-box based on Feistel , 2015, 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).

[65]  Fatih Özkaynak,et al.  On the effect of chaotic system in performance characteristics of chaos based s-box designs , 2020 .

[66]  Musheer Ahmad,et al.  ABC Optimization Based Construction of Strong Substitution-Boxes , 2018, Wirel. Pers. Commun..

[67]  Zhongmeng Zhao,et al.  Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes , 2018, Chinese Physics B.

[68]  Thuc Dinh Nguyen,et al.  A New S-Box Structure Based on Graph Isomorphism , 2009, 2009 International Conference on Computational Intelligence and Security.

[69]  Ahmed A. Abd El-Latif,et al.  Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption , 2020, Inf. Sci..

[70]  Mohammad Saleem Mian,et al.  Methods of finding multiplicative inverses in GF(28) , 2008, Comput. Commun..

[71]  Musheer Ahmad,et al.  A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map , 2018, Neural Computing and Applications.

[72]  Musheer Ahmad,et al.  Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme , 2020, Entropy.

[73]  Musheer Ahmad,et al.  Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map , 2018, Complex..

[74]  Tariq Shah,et al.  Steps Towards Redesigning Cryptosystems by a Non-associative Algebra of IP-Loops , 2019, Wirel. Pers. Commun..

[75]  Kazuyoshi Takagi,et al.  An Algorithm for Inversion in GF(2^m) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2) , 2007, 18th IEEE Symposium on Computer Arithmetic (ARITH '07).

[76]  Ahmed A. Abd El-Latif,et al.  A simple yet efficient S-box method based on chaotic sine map , 2017 .

[77]  Kazys Kazlauskas,et al.  An Algorithm for Key-Dependent S-Box Generation in Block Cipher System , 2015, Informatica.

[78]  Ahmed A. Abd El-Latif,et al.  Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario , 2020, IEEE Transactions on Network and Service Management.

[79]  Jun Peng,et al.  A Novel Method for Designing Dynamical Key-Dependent S-Boxes based on Hyperchaotic System , 2012 .