An algorithm for the construction of substitution box for block ciphers based on projective general linear group

The aim of this work is to synthesize 8*8 substitution boxes (S-boxes) for block ciphers. The confusion creating potential of an S-box depends on its construction technique. In the first step, we have applied the algebraic action of the projective general linear group PGL(2,GF(28)) on Galois field GF(28). In step 2 we have used the permutations of the symmetric group S256 to construct new kind of S-boxes. To explain the proposed extension scheme, we have given an example and constructed one new S-box. The strength of the extended S-box is computed, and an insight is given to calculate the confusion-creating potency. To analyze the security of the S-box some popular algebraic and statistical attacks are performed as well. The proposed S-box has been analyzed by bit independent criterion, linear approximation probability test, non-linearity test, strict avalanche criterion, differential approximation probability test, and majority logic criterion. A comparison of the proposed S-box with existing S-boxes sho...

[1]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[2]  Rengarajan Amirtharajan,et al.  Medical data sheet in safe havens - A tri-layer cryptic solution , 2015, Comput. Biol. Medicine.

[3]  K. Thenmozhi,et al.  Pixel scattering matrix formalism for image encryption—A key scheduled substitution and diffusion approach , 2015 .

[4]  Rengarajan Amirtharajan,et al.  Stego on FPGA: An IWT Approach , 2014, TheScientificWorldJournal.

[5]  Shahram Etemadi Borujeni,et al.  Chaotic Image Encryption Design Using Tompkins-Paige Algorithm , 2009 .

[6]  Tariq Shah,et al.  A projective general linear group based algorithm for the construction of substitution box for block ciphers , 2012, Neural Computing and Applications.

[7]  A. Diaconu,et al.  An Improved Secure Image Encryption Algorithm Based on Rubik's Cube Principle and Digital Chaotic Cipher , 2013 .

[8]  Narendra K. Pareek,et al.  Design and Analysis of a Novel Digital Image Encryption Scheme , 2012, ArXiv.

[9]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[10]  I. Shatheesh Sam,et al.  Chaos Based Image Encryption Scheme Based on Enhanced Logistic Map , 2011, ICDCIT.

[11]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[12]  Jun-jie Chen,et al.  A chaos-based digital image encryption scheme with an improved diffusion strategy. , 2012, Optics express.

[13]  Aradhana Soni,et al.  A Novel Image Encryption Approach using an Index based Chaos and DNA Encoding and its Performance Analysis , 2012 .

[14]  Kwok-Wo Wong,et al.  Chaotic Image Encryption Algorithm Based on Circulant Operation , 2013 .

[15]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[16]  Li Dayong,et al.  A Novel Image Encryption Using Arnold Cat , 2013 .

[17]  Jean-Yves Chouinard,et al.  A Secure Image Encryption Algorithm Based on Rubik's Cube Principle , 2012, J. Electr. Comput. Eng..

[18]  Musheer Ahmad,et al.  Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption , 2013, J. Inf. Process. Syst..