Design a Compact Non-linear S-Box with Multiple-Affine Transformations | SpringerLink
Skip to main content

Design a Compact Non-linear S-Box with Multiple-Affine Transformations

  • Conference paper
  • First Online:
Applied Computing to Support Industry: Innovation and Technology (ACRIT 2019)

Abstract

The present paper introduces a new method of S-Box construction which work as a byte-oriented substitution scheme. The S-Box design considers the core part for the building most block cipher algorithms and play a major role in generating confusion property. Modern ciphers build with different types of S-Box of half-byte (nibble of 4-bit) or full-byte 8-bit as lookup tables with distinct mathematical Boolean functions (BFs). The proposed method generates the S-box based on multiplications of multiple different affine transforms with multiple distinct overlapped vectors of 8-bit to achieve high nonlinearity. The construction of S-box focused on use an irreducible polynomial of order eight over Galois Field GF (28). The proposed S-box quit similar to the S-box of Advance Encryption Standard (AES) but with more algebraic complexity and high non-linearity factor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Dragomir, I.R., Lazǎr, M.: Generating and testing the components of a block cipher. In: Proceedings of the 8th International Conference on Electronics, Computers and Artificial Intelligence, IEEE, ECAI 2016, pp. 1–4 (2017). https://doi.org/10.1109/ecai.2016.7861190

  2. Lin, Z.: Diffusion and confusion of chaotic iteration based hash functions. In: International Conference on Embedded and Ubiquitous Computing (EUC) and 15th International Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, pp. 444–447 (2016)

    Google Scholar 

  3. Du, Z.Q., Xu, Q.J., Zhang, J., Li, M.: Design and analysis of dynamic S-box based on Feistel. In: Proceedings of 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2015, pp. 590–594. IEEE (2016). https://doi.org/10.1109/iaeac.2015.7428622

  4. Agrawal, D.P., Wang, H., Dey, S., Ghosh, R.: A review of cryptographic properties of 4-bit S-boxes with generation and analysis of crypto secure S-boxes. In: Computer Cyber Security, pp. 527–555 (2019). https://doi.org/10.1201/9780429424878-20

    Chapter  Google Scholar 

  5. Dawood, O.A., Rahma, A.M.S., Abdul Hossen, A.M.J.: The new block cipher design (Tigris Cipher). Int. J. Comput. Netw. Inf. Secur. 7(12), 10–18 (2015)

    Google Scholar 

  6. Dawood, O.A., Rahma, A.M.S., Abdul Hossen, A.M.J.: New symmetric cipher fast algorithm of revertible operations’ queen (FAROQ) cipher. Int. J. Comput. Netw. Inf. Secur. 9, 29–36 (2017)

    Google Scholar 

  7. Dawood, O.A., Rahma, A.M.S., Mohssen, A., Hossen, J.A.: The euphrates cipher. IJCSI Int. J. Comput. Sci. 12(2), 154–160 (2015)

    Google Scholar 

  8. Rodinko, M., Oliynykov, R., Gorbenko, Y.: Optimization of the high nonlinear S-boxes generation method. In: Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), vol. 70, pp. 93–105. in Tatra Mountains Mathematical Publications (2017)

    Google Scholar 

  9. Alamsyah Bejo, A., Adji, T.B.: AES S-box construction using different irreducible polynomial and constant 8-bit vector. In: 2017 IEEE Conference on Dependable and Secure Computing, pp. 366–369 (2017). https://doi.org/10.1109/desec.2017.8073857

  10. Gomes, O.D.S.M., Moreno, R.L.: A compact S-box module for 128/192/256-bit symmetric cryptography hardware. In: Proceedings - 2016 9th International Conference on Developments in eSystems Engineering, DeSE 2016, pp. 94–97 (2017). https://doi.org/10.1109/dese.2016.17

  11. Zahid, A.H., Arshad, M.J., Ahmad, M.: A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21, 245 (2019)

    Article  MathSciNet  Google Scholar 

  12. Dawood, O.A., Hammadi, O.I., Asman, T.K.: Developing a new secret symmetric algorithm for securing wireless applications. In: Proceedings - 2018 1st Annual International Conference on Information and Sciences, AiCIS 2018, pp. 152–157 (2019). https://doi.org/10.1109/aicis.2018.00038

  13. Shreenivas Pai, N., Raghuram, S., Chennakrishna, M., Karthik, A.S.V.: Logic optimization of AES S-Box. In: International Conference on Automatic Control and Dynamic Optimization Techniques, ICACDOT 2016, pp. 1042–1046 (2017). https://doi.org/10.1109/icacdot.2016.7877745

  14. Dawood, O.A., Sagheer, A.M., Al-Rawi, S.S.: Design large symmetric algorithm for securing big data. In: Proceedings - International Conference on Developments in eSystems Engineering, DeSE 2018-September, pp. 123–128 (2019)

    Google Scholar 

  15. Cui, L., Cao, Y.A.: New S-box structure named affine-power-affine. Int. J. Innov. Comput. Inf. Control 3, 751–759 (2007)

    Google Scholar 

  16. Lee, J., et al.: Avalanche and bit independence properties of photon-counting double random phase encoding in gyrator domain. Curr. Opt. Photon. 2(4), 368–377 (2018)

    Google Scholar 

  17. Lambi, D., Živkovi, M.: Comparison of random S-Box generation methods. Publications DE L’Institute Mathematique Nouvelle série 93(107), 109–115 (2013)

    Article  MathSciNet  Google Scholar 

  18. Mroczkowski, P.: Generating pseudorandom S-boxes – a method of improving the security of cryptosystems based on block ciphers. J. Telecommun. Inf. Technol. 2, 74–79 (2009)

    Google Scholar 

  19. Ivanov, G., Nikolov, N., Nikova, S.: Cryptographically strong s-boxes generated by modified immune algorithm. In: Pasalic, E., Knudsen, L.R. (eds.) BalkanCryptSec 2015. LNCS, vol. 9540, pp. 31–42. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29172-7_3

    Chapter  Google Scholar 

  20. Sagheer, A.M., Al-Rawi, S.S., Dawood, O.A.: Proposing of developed advance encryption standard. In: Proceedings - 4th International Conference on Developments in eSystems Engineering, DeSE 2011, pp. 197–202 (2011). https://doi.org/10.1109/dese.2011.74

  21. Baylis, J., Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1988). Math. Gaz. 72, 335

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omar A. Dawood .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dawood, O.A., Khalaf, M., Mohammed, F.M., Almulla, H.K. (2020). Design a Compact Non-linear S-Box with Multiple-Affine Transformations. In: Khalaf, M., Al-Jumeily, D., Lisitsa, A. (eds) Applied Computing to Support Industry: Innovation and Technology. ACRIT 2019. Communications in Computer and Information Science, vol 1174. Springer, Cham. https://doi.org/10.1007/978-3-030-38752-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-38752-5_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-38751-8

  • Online ISBN: 978-3-030-38752-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics