Steps Towards Redesigning Cryptosystems by a Non-associative Algebra of IP-Loops | Wireless Personal Communications Skip to main content
Log in

Steps Towards Redesigning Cryptosystems by a Non-associative Algebra of IP-Loops

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In block ciphers, the substitution boxes (S-boxes) are used with the purpose to induce confusion in cryptosystems. For the last three decades most of algebraic and chaotic S-boxes are based on the associative algebras of Galois fields. However, recently a little but remarkable work on the designing of S-boxes over some local associative algebras have been published, which is in fact a mock of the associative algebras of Galois fields. The main purpose of these establishments is to hide data and improve the security levels of crypto algorithms. In this study we redesign S-boxes over the elements of inverse property loop. The fascinating features of this structure are; it’s non-associativity and the existence of the inverse of zero element. These properties not only increase the availability of the number of structures but also provide easy approach in constructing S-boxes. The newly designed S-boxes are assessed by various analyses, which include nonlinearity, strict avalanche criterion, bit independence criterion, linear approximation probabilities, and differential approximation probabilities. Majority logic criterion is also performed to evaluate its application in various encryption systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Hussain, I., & Shah, T. (2013). Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dynamics, 74(4), 869–904.

    Article  MathSciNet  MATH  Google Scholar 

  2. Sumathi, M., Nirmala, D., & Rajkumar, R. I. (2015). Study of data security algorithms using verilog HDL. International Journal of Electrical and Computer Engineering, 5(5), 1092–1101.

    Google Scholar 

  3. Daemen, J., & Rijmen, V. (2002). The design of Rijndael-AES: The advanced encryption standard. Berlin: Springer.

    Book  MATH  Google Scholar 

  4. Shah, T., Qamar, A., & Hussain, I. (2013). Substitution box on a maximal cyclic subgroup of units of a Galois ring. Zeitschrift für Naturforschung A, 68, 567–572.

    Article  Google Scholar 

  5. Attaullah, A., Jamal, S. S., & Shah, T. (2017). A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dynamics, 88(4), 2757–2769.

    Article  Google Scholar 

  6. Adams, C. M., & Tavares, S. E. (1990). The structured design of cryptographically good S-boxes. Journal of Cryptology, 3(1), 27–41.

    Article  MathSciNet  MATH  Google Scholar 

  7. Shankar, P. (1979). On BCH codes over arbitrary integer rings. IEEE Transactions on Information Theory, 25(4), 480–483.

    Article  MathSciNet  MATH  Google Scholar 

  8. Andrade, A. A., & Palazzo, R. (1999). Construction and decoding of BCH codes over finite rings. Linear Algebra and its Applications, 286, 69–85.

    Article  MathSciNet  MATH  Google Scholar 

  9. Hussain, I., Shah, T., Gondal, M. A., & Khan, W. A. (2011). Construction of cryptographically strong 8 × 8 S-boxes. World Applied Sciences Journal, 13(11), 2389–2395.

    Google Scholar 

  10. Hussain, I., Shah, T., & Aslam, S. K. (2011). Graphical SAC analysis of S8 APA S-box. International Journal of Difference Equations, 6(1), 51–56.

    Google Scholar 

  11. Jamal, S. S., Shah, T., & Attaullah, A. (2017). A group action method for construction of strong substitution box. 3D Research. https://doi.org/10.1007/s13319-017-0125-z.

    Google Scholar 

  12. Cui, J., Zhong, H., Wang, J., & Shi, R. (2014). Generation and optimization of Rijndael S-box equation system. Information Technology Journal, 13(15), 2482.

    Article  Google Scholar 

  13. Bruch, R. H. (1971). A survey of binary systems. Berlin: Springer.

    Book  Google Scholar 

  14. Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673–1687.

    Article  Google Scholar 

  15. Nyberg, K. (1991). Perfect nonlinear S-boxes. In Advances in cryptology: Proceedings of Eurocrypt ‘91, Springer-Verlag (pp. 378–386).

  16. Connor, L. O. (1994). An analysis of a class of algorithms for S-box construction. Journal of Cryptology, 7(3), 133–151.

    Article  MathSciNet  Google Scholar 

  17. Pflugfelder, H. O. (2000). Historical notes on loop theory. Commentationes Mathematicae Universitatis Carolinae, 41(2), 359–370.

    MathSciNet  MATH  Google Scholar 

  18. Ali, A., & Slaney, J. (2008). Counting loops with the inverse property. Quasigroups and related Structures, 16, 13–16.

    MathSciNet  MATH  Google Scholar 

  19. Tran, M. T., Bui, D. K., & Doung, A. D. (2008). Gray S-box for advanced encryption standard. In International conference on computational intelligence and security (pp. 253–256).

  20. Cui, L., & Cao, Y. (2007). A new S-box structure named Affine Power-Affine. International Journal of Innovative Computing, Information and Control, 3(3), 45–53.

    Google Scholar 

  21. Shah, T., Hussain, I., Gondal, M. A., & Mahmood, H. (2011). Statistical analysis of S-box in image encryption applications based on majority logic criterion. International Journal of the Physical Sciences, 6(16), 4110–4127.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yasir Naseer.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Naseer, Y., Shah, T., Hussain, S. et al. Steps Towards Redesigning Cryptosystems by a Non-associative Algebra of IP-Loops. Wireless Pers Commun 108, 1379–1392 (2019). https://doi.org/10.1007/s11277-019-06474-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06474-z

Keywords

Navigation