Abstract
In block ciphers, the substitution boxes (S-boxes) are used with the purpose to induce confusion in cryptosystems. For the last three decades most of algebraic and chaotic S-boxes are based on the associative algebras of Galois fields. However, recently a little but remarkable work on the designing of S-boxes over some local associative algebras have been published, which is in fact a mock of the associative algebras of Galois fields. The main purpose of these establishments is to hide data and improve the security levels of crypto algorithms. In this study we redesign S-boxes over the elements of inverse property loop. The fascinating features of this structure are; it’s non-associativity and the existence of the inverse of zero element. These properties not only increase the availability of the number of structures but also provide easy approach in constructing S-boxes. The newly designed S-boxes are assessed by various analyses, which include nonlinearity, strict avalanche criterion, bit independence criterion, linear approximation probabilities, and differential approximation probabilities. Majority logic criterion is also performed to evaluate its application in various encryption systems.
Similar content being viewed by others
References
Hussain, I., & Shah, T. (2013). Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dynamics, 74(4), 869–904.
Sumathi, M., Nirmala, D., & Rajkumar, R. I. (2015). Study of data security algorithms using verilog HDL. International Journal of Electrical and Computer Engineering, 5(5), 1092–1101.
Daemen, J., & Rijmen, V. (2002). The design of Rijndael-AES: The advanced encryption standard. Berlin: Springer.
Shah, T., Qamar, A., & Hussain, I. (2013). Substitution box on a maximal cyclic subgroup of units of a Galois ring. Zeitschrift für Naturforschung A, 68, 567–572.
Attaullah, A., Jamal, S. S., & Shah, T. (2017). A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dynamics, 88(4), 2757–2769.
Adams, C. M., & Tavares, S. E. (1990). The structured design of cryptographically good S-boxes. Journal of Cryptology, 3(1), 27–41.
Shankar, P. (1979). On BCH codes over arbitrary integer rings. IEEE Transactions on Information Theory, 25(4), 480–483.
Andrade, A. A., & Palazzo, R. (1999). Construction and decoding of BCH codes over finite rings. Linear Algebra and its Applications, 286, 69–85.
Hussain, I., Shah, T., Gondal, M. A., & Khan, W. A. (2011). Construction of cryptographically strong 8 × 8 S-boxes. World Applied Sciences Journal, 13(11), 2389–2395.
Hussain, I., Shah, T., & Aslam, S. K. (2011). Graphical SAC analysis of S8 APA S-box. International Journal of Difference Equations, 6(1), 51–56.
Jamal, S. S., Shah, T., & Attaullah, A. (2017). A group action method for construction of strong substitution box. 3D Research. https://doi.org/10.1007/s13319-017-0125-z.
Cui, J., Zhong, H., Wang, J., & Shi, R. (2014). Generation and optimization of Rijndael S-box equation system. Information Technology Journal, 13(15), 2482.
Bruch, R. H. (1971). A survey of binary systems. Berlin: Springer.
Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.
Nyberg, K. (1991). Perfect nonlinear S-boxes. In Advances in cryptology: Proceedings of Eurocrypt ‘91, Springer-Verlag (pp. 378–386).
Connor, L. O. (1994). An analysis of a class of algorithms for S-box construction. Journal of Cryptology, 7(3), 133–151.
Pflugfelder, H. O. (2000). Historical notes on loop theory. Commentationes Mathematicae Universitatis Carolinae, 41(2), 359–370.
Ali, A., & Slaney, J. (2008). Counting loops with the inverse property. Quasigroups and related Structures, 16, 13–16.
Tran, M. T., Bui, D. K., & Doung, A. D. (2008). Gray S-box for advanced encryption standard. In International conference on computational intelligence and security (pp. 253–256).
Cui, L., & Cao, Y. (2007). A new S-box structure named Affine Power-Affine. International Journal of Innovative Computing, Information and Control, 3(3), 45–53.
Shah, T., Hussain, I., Gondal, M. A., & Mahmood, H. (2011). Statistical analysis of S-box in image encryption applications based on majority logic criterion. International Journal of the Physical Sciences, 6(16), 4110–4127.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Naseer, Y., Shah, T., Hussain, S. et al. Steps Towards Redesigning Cryptosystems by a Non-associative Algebra of IP-Loops. Wireless Pers Commun 108, 1379–1392 (2019). https://doi.org/10.1007/s11277-019-06474-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06474-z