Abstract
Data encryption with substitution-box (S-box) is now widely regarded as the most secure method of communicating in order to prevent unauthorized access to sensitive and confidential information. An S-box is the basic component in a cryptosystem, which provides confusion in data. An S-box that holds a high degree of nonlinearity, as well as a low level of linear and differential approximation probability, is considered cryptographically secure. In this regard, cryptography plays an important role in the encryption of private data and information. The field of graph theory is important in a variety of domains. Graph theory, in particular, is commonly utilized as an encryption technique, as graphs can be transformed into matrices. In this study, we use graph theory and adjacency matrices to generate highly nonlinear S-boxes. We use an adjacency matrix corresponding to the coset diagram for the action of the Mobius group \(M = \left\langle {x,y:x^{2} = y^{6} = 1} \right\rangle\) on \(PL\left( {F_{7} } \right)\). We then use this matrix to the Galois field \(GF\left( {2^{8} } \right)\) to obtain new S-boxes. The proposed S-boxes are then analyzed using algebraic and statistical methods. The analyses and findings are encouraging, demonstrating that the proposed S-boxes are well protected. Also, as a means of confusion, the proposed S-boxes have a high level of security and enhance resistance against the potential attacks.












Similar content being viewed by others
Availability of data and material (data transparency)
The data that support the findings of this study are available from the corresponding author, Mr. Bilal Arshad, upon reasonable request.
Code availability
Due to the nature of this research, participants of this study did not agree for their code to be shared publicly, so supporting code is not available.
References
Afzal, Q., & Afzal, F. (2018). Golden Mean and the Action of Mobius Group M, International Journal of Mathematics and Computational. Science, 4(4), 124–127.
Ruohonen, K. (2014). Mathematical Cryptology, Translation by J. Kangas and P. Coughlan, p. 1.
Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Labs Technical Journal, 28, 656–715.
Hoobi, M. M. (2017). Strong triple data encryption standard algorithm using nth degree truncated polynomial ring unit. Journal of Science, 58(3C), 1760–1771.
Fathy, A., Tarrad, I.F., Hamed, H.F.A., & Awad, A. I. (2012). Advanced encryption standard algorithm: Issues and implementation aspects, AMLTA 2012, CCIS 322, 2012, pp. 516–523. C-Springer-Verlag, Berlin Heidelberg.
Anees, A., & Chen, Y. P. P. (2019). Designing secure substitution boxes based on permutation of symmetric group. Neural Computing and Applications, 32(11), 7045–7056.
Shahzad, I., Mushtaq, Q. & Razaq, A. (2019). Construction of new S-Box using action of quotient of the modular group for multimedia security, Security and Communication Networks, pp. 1–13.
Shah, T., & Qureshi, A. (2019). S-Box on subgroup of galois field. Cryptography, 3(2), 13.
Hayat, U., Azam, N. A., & Asif, M. (2018). A method of generating 8 × 8 substitution boxes based on elliptic curves. Wireless Personal Communications, 101(1), 439–451.
Hussain, I., Shah, T., Gondal, M. A., & Mahmood, H. (2013). A novel image encryption algorithm based on chaotic maps and exponent transformation. Nonlinear Dynamics, 72(1–2), 399–406.
Hussain, I., Anees, A., Alkhaldi, A. H., Aslam, M., Siddiqui, N., & Ahmed, R. (2019). Image encryption based on Chebyshev chaotic map and S8 S-boxes. Optica Applicata, 49(2).
Nizam Chew, L. C., & Ismail, E. S. (2020). S-box construction based on linear fractional transformation and permutation function. Symmetry, 12(5), 826.
Murphy, S., & Robshaw, M. J. B. (2002). Essential algebraic structure with in the AES, Information Security Group, Royal Holloway University of London. Springer.
Afzal, F., Afzal, Q., & Malik, M. A. (2013). Quadratic Fields under the Action of Subgroups of M. International Journal of Modeling and Optimization, 3(3).
Malik, M.A., Husnine, S.M., Majeed, A. (2012). Action of the Mobius group on certain real quadratic fields. Journal of Mathematics 44, 31–37.
Pieprzyk, J., & Finkelstein, G. (1988). Towards effective nonlinear cryptosystem design. IEE Proceedings Part E Computers and Digital Techniques, 135(6), 325–335.
Kim, J., & Phan, R. C. W. (2009). Advanced differential-style cryptanalysis of the NSA’s Skipjack Block Cipher. Cryptologia, 33(3), 246–270.
Yi, X., Cheng, S.X., You, X.H. & Lam, K.Y. (1997). A method for obtaining cryptographically strong 8/spl times/8 S-boxes. In GLOBECOM 97. IEEE global telecommunications conference. Conference record. vol. 2, pp. 689–693. IEEE.
Hussain, I., Shah, T., Mahmood, H., Gondal, M. A., & Bhatti, U. Y. (2011). Some analysis of S-box based on residue of a prime number. Proc Pak Acad Sci, 48(2), 111–115.
Tang, G., Liao, X., & Chen, Y. (2005). A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons and Fractals, 23(2), 413–419.
Chen, G., Chen, Y., & Liao, X. (2007). An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos, Solitons and Fractals, 31(3), 571–579.
Belazi, A., Khan, M., El-Latif, A. A. A., & Belghith, S. (2017). Efficient cryptosystem approaches: S-boxes and permutation substitution-based encryption. Nonlinear Dynamics, 87(1), 337–361.
Alkhaldi, A. H., Hussain, I., & Gondal, M. A. (2015). A novel design for the construction of safe S-boxes based on TDERC sequence. Alexandria Engineering Journal, 54, 65–69.
Khan, M., Shah, T., & Gondal, M. A. (2013). An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dynamics, 73(3), 1795–1801.
Detombe, J. & Tavares, S. (1993). Constructing large cryptographically strong S-boxes. Lecture notes in computer science, pp. 165–181.
Hussain, I., Shah, T., Gondal, M. A., Khan, M., & Khan, W. A. (2011). Construction of new S-box using a linear fractional transformation. World Applied Sciences Journal, 14(12), 1779–1785.
Yi, L., Tong, X., Wang, Z., Zhang, M., Zhu, H., & Liu, J. (2019). A novel block encryption algorithm based on chaotic S-Box for wireless sensor network. IEEE Access, 7, 53079–53090.
Lambic, D. (2014). A novel method of S-box design based on chaotic map and composition method. Chaos, Solitons and Fractals, 58, 16–21.
LambiC, D. (2016). A novel method of S-box design based on discrete chaotic map. Nonlinear Dynamics, 87(4), 2407–2413.
Ozkaynak, F. (2017). Construction of robust substitution boxes based on chaotic systems. Neural Computing and Applications, 31(8), 3317–3326.
Ye, T., & Zhimao, L. (2018). Chaotic S-box: six-dimensional fractional Lorenz-Duffing chaotic system and O-shaped path scrambling. Nonlinear Dynamics, 94(3), 2115–2126.
Riaz, F., & Siddiqui, N. (2020). Design of an Efficient Cryptographic Substitution Box by using Improved Chaotic Range with the Golden Ratio. International Journal of Computer Science and Information Security (IJCSIS), 18(1).
Naseer, A., & Siddiqui, N. (2020). A novel approach for construction of S-box using modified Pascal’s triangle. International Journal of Computer Science and Information Security (IJCSIS), 18(1).
Iftikhar, W., & Siddiqui, N. (2020). An Effective Technique of Substitution-box Construction using Recurrence Relation with Logistic Map. International Journal of Computer Science and Information Security (IJCSIS), 18(3).
Siddiqui, N., Afsar, U., Shah, T., & Qureshi, A. (2016). A Novel Construction of S16 AES S-boxes. International Journal of Computer Science and Information Security (IJCSIS), 14(8).
Khan, M., Shah, T., & Batool, S. I. (2015). Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Computing and Applications, 27, 677–685.
Ahmad, M., Bhatia, D., & Hassan, Y. (2015). A novel ant colony optimization based scheme for substitution box design. Procedia Computer Science, 57, 572–580.
Razaq, A., Yousaf, A., Shuaib, U., Siddiqui, N., Ullah, A., & Waheed, A. (2017). A novel construction of substitution box involving coset diagram and a bijective map. Security and Communication Networks, 2017.
Silva-Garcia, V. M., Flores-Carapia, R., Renteria-Marquez, C., Luna-Benoso, B., & Aldape-Perez, M. (2018). Substitution box generation using Chaos: An image encryption application. Applied Mathematics and Computation, 332, 123–135.
Jamal, S. S., Khan, M. U., & Shah, T. (2016). A watermarking technique with chaotic fractional S-box transformation. Wireless Personal Communications, 90, 2033–2049.
Lu, Q., Zhu, C., & Wang, G. (2019). A novel S-box design algorithm based on a new compound chaotic system. Entropy, 21, 1004.
Azam, N. A., Hayat, U., & Ullah, I. (2019). Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field. Frontiers of Information Technology and Electronic Engineering, 20, 1378–1389.
Sani, R. H., Behnia, S., & Akhshani, A. (2021). Creation of S-box based on a hierarchy of Julia sets: image encryption approach. Multidimensional Systems and Signal Processing, pp. 1-24.
Hayat, U., Azam, N. A., Gallegos-Ruiz, H. R., Naz, S., & Batool, L. (2021). A truly dynamic substitution box generator for block ciphers based on elliptic curves over finite rings. Arabian Journal for Science and Engineering, 46(9), 8887–8899.
Zhang, Y. Q., Hao, J. L., & Wang, X. Y. (2020). An efficient image encryption scheme based on S-boxes and fractional-order differential logistic map. IEEE Access, 8, 54175–54188.
Bin Faheem, Z., Ali, A., Khan, M. A., Ul-Haq, M. E., & Ahmad, W. (2020). Highly dispersive substitution box (S-box) design using chaos. ETRI Journal, 42(4), 619–632.
Siddiqui, N., Naseer, A., & Ehatisham-ul-Haq, M. (2021). A novel scheme of substitution-box design based on modified Pascal’s triangle and elliptic curve. Wireless Personal Communications, 116(4), 3015–3030.
Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer Science and Business Media.
Tran, M. T., Bui, D. K., & Duong, A. D. (2008, December). Gray S-box for advanced encryption standard. In 2008 international conference on computational intelligence and security (Vol. 1, pp. 253-258). IEEE.
Funding
There has been no significant financial support for this work.
Author information
Authors and Affiliations
Contributions
All authors have made equally contributions to the writing of this research paper.
Corresponding author
Ethics declarations
Conflict of interest
We know of no conflicts of interest associated with this publication.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Arshad, B., Siddiqui, N., Hussain, Z. et al. A Novel Scheme for Designing Secure Substitution Boxes (S-Boxes) Based on Mobius Group and Finite Field. Wireless Pers Commun 124, 3527–3548 (2022). https://doi.org/10.1007/s11277-022-09524-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09524-1