Abstract
The present paper introduces a new method of S-Box construction which work as a byte-oriented substitution scheme. The S-Box design considers the core part for the building most block cipher algorithms and play a major role in generating confusion property. Modern ciphers build with different types of S-Box of half-byte (nibble of 4-bit) or full-byte 8-bit as lookup tables with distinct mathematical Boolean functions (BFs). The proposed method generates the S-box based on multiplications of multiple different affine transforms with multiple distinct overlapped vectors of 8-bit to achieve high nonlinearity. The construction of S-box focused on use an irreducible polynomial of order eight over Galois Field GF (28). The proposed S-box quit similar to the S-box of Advance Encryption Standard (AES) but with more algebraic complexity and high non-linearity factor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dragomir, I.R., Lazǎr, M.: Generating and testing the components of a block cipher. In: Proceedings of the 8th International Conference on Electronics, Computers and Artificial Intelligence, IEEE, ECAI 2016, pp. 1–4 (2017). https://doi.org/10.1109/ecai.2016.7861190
Lin, Z.: Diffusion and confusion of chaotic iteration based hash functions. In: International Conference on Embedded and Ubiquitous Computing (EUC) and 15th International Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, pp. 444–447 (2016)
Du, Z.Q., Xu, Q.J., Zhang, J., Li, M.: Design and analysis of dynamic S-box based on Feistel. In: Proceedings of 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2015, pp. 590–594. IEEE (2016). https://doi.org/10.1109/iaeac.2015.7428622
Agrawal, D.P., Wang, H., Dey, S., Ghosh, R.: A review of cryptographic properties of 4-bit S-boxes with generation and analysis of crypto secure S-boxes. In: Computer Cyber Security, pp. 527–555 (2019). https://doi.org/10.1201/9780429424878-20
Dawood, O.A., Rahma, A.M.S., Abdul Hossen, A.M.J.: The new block cipher design (Tigris Cipher). Int. J. Comput. Netw. Inf. Secur. 7(12), 10–18 (2015)
Dawood, O.A., Rahma, A.M.S., Abdul Hossen, A.M.J.: New symmetric cipher fast algorithm of revertible operations’ queen (FAROQ) cipher. Int. J. Comput. Netw. Inf. Secur. 9, 29–36 (2017)
Dawood, O.A., Rahma, A.M.S., Mohssen, A., Hossen, J.A.: The euphrates cipher. IJCSI Int. J. Comput. Sci. 12(2), 154–160 (2015)
Rodinko, M., Oliynykov, R., Gorbenko, Y.: Optimization of the high nonlinear S-boxes generation method. In: Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), vol. 70, pp. 93–105. in Tatra Mountains Mathematical Publications (2017)
Alamsyah Bejo, A., Adji, T.B.: AES S-box construction using different irreducible polynomial and constant 8-bit vector. In: 2017 IEEE Conference on Dependable and Secure Computing, pp. 366–369 (2017). https://doi.org/10.1109/desec.2017.8073857
Gomes, O.D.S.M., Moreno, R.L.: A compact S-box module for 128/192/256-bit symmetric cryptography hardware. In: Proceedings - 2016 9th International Conference on Developments in eSystems Engineering, DeSE 2016, pp. 94–97 (2017). https://doi.org/10.1109/dese.2016.17
Zahid, A.H., Arshad, M.J., Ahmad, M.: A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21, 245 (2019)
Dawood, O.A., Hammadi, O.I., Asman, T.K.: Developing a new secret symmetric algorithm for securing wireless applications. In: Proceedings - 2018 1st Annual International Conference on Information and Sciences, AiCIS 2018, pp. 152–157 (2019). https://doi.org/10.1109/aicis.2018.00038
Shreenivas Pai, N., Raghuram, S., Chennakrishna, M., Karthik, A.S.V.: Logic optimization of AES S-Box. In: International Conference on Automatic Control and Dynamic Optimization Techniques, ICACDOT 2016, pp. 1042–1046 (2017). https://doi.org/10.1109/icacdot.2016.7877745
Dawood, O.A., Sagheer, A.M., Al-Rawi, S.S.: Design large symmetric algorithm for securing big data. In: Proceedings - International Conference on Developments in eSystems Engineering, DeSE 2018-September, pp. 123–128 (2019)
Cui, L., Cao, Y.A.: New S-box structure named affine-power-affine. Int. J. Innov. Comput. Inf. Control 3, 751–759 (2007)
Lee, J., et al.: Avalanche and bit independence properties of photon-counting double random phase encoding in gyrator domain. Curr. Opt. Photon. 2(4), 368–377 (2018)
Lambi, D., Živkovi, M.: Comparison of random S-Box generation methods. Publications DE L’Institute Mathematique Nouvelle série 93(107), 109–115 (2013)
Mroczkowski, P.: Generating pseudorandom S-boxes – a method of improving the security of cryptosystems based on block ciphers. J. Telecommun. Inf. Technol. 2, 74–79 (2009)
Ivanov, G., Nikolov, N., Nikova, S.: Cryptographically strong s-boxes generated by modified immune algorithm. In: Pasalic, E., Knudsen, L.R. (eds.) BalkanCryptSec 2015. LNCS, vol. 9540, pp. 31–42. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29172-7_3
Sagheer, A.M., Al-Rawi, S.S., Dawood, O.A.: Proposing of developed advance encryption standard. In: Proceedings - 4th International Conference on Developments in eSystems Engineering, DeSE 2011, pp. 197–202 (2011). https://doi.org/10.1109/dese.2011.74
Baylis, J., Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1988). Math. Gaz. 72, 335
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Dawood, O.A., Khalaf, M., Mohammed, F.M., Almulla, H.K. (2020). Design a Compact Non-linear S-Box with Multiple-Affine Transformations. In: Khalaf, M., Al-Jumeily, D., Lisitsa, A. (eds) Applied Computing to Support Industry: Innovation and Technology. ACRIT 2019. Communications in Computer and Information Science, vol 1174. Springer, Cham. https://doi.org/10.1007/978-3-030-38752-5_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-38752-5_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38751-8
Online ISBN: 978-3-030-38752-5
eBook Packages: Computer ScienceComputer Science (R0)