A Novel Scheme for Designing Secure Substitution Boxes (S-Boxes) Based on Mobius Group and Finite Field | Wireless Personal Communications Skip to main content

Advertisement

Log in

A Novel Scheme for Designing Secure Substitution Boxes (S-Boxes) Based on Mobius Group and Finite Field

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Data encryption with substitution-box (S-box) is now widely regarded as the most secure method of communicating in order to prevent unauthorized access to sensitive and confidential information. An S-box is the basic component in a cryptosystem, which provides confusion in data. An S-box that holds a high degree of nonlinearity, as well as a low level of linear and differential approximation probability, is considered cryptographically secure. In this regard, cryptography plays an important role in the encryption of private data and information. The field of graph theory is important in a variety of domains. Graph theory, in particular, is commonly utilized as an encryption technique, as graphs can be transformed into matrices. In this study, we use graph theory and adjacency matrices to generate highly nonlinear S-boxes. We use an adjacency matrix corresponding to the coset diagram for the action of the Mobius group \(M = \left\langle {x,y:x^{2} = y^{6} = 1} \right\rangle\) on \(PL\left( {F_{7} } \right)\). We then use this matrix to the Galois field \(GF\left( {2^{8} } \right)\) to obtain new S-boxes. The proposed S-boxes are then analyzed using algebraic and statistical methods. The analyses and findings are encouraging, demonstrating that the proposed S-boxes are well protected. Also, as a means of confusion, the proposed S-boxes have a high level of security and enhance resistance against the potential attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Availability of data and material (data transparency)

The data that support the findings of this study are available from the corresponding author, Mr. Bilal Arshad, upon reasonable request.

Code availability

Due to the nature of this research, participants of this study did not agree for their code to be shared publicly, so supporting code is not available.

References

  1. Afzal, Q., & Afzal, F. (2018). Golden Mean and the Action of Mobius Group M, International Journal of Mathematics and Computational. Science, 4(4), 124–127.

    Google Scholar 

  2. Ruohonen, K. (2014). Mathematical Cryptology, Translation by J. Kangas and P. Coughlan, p. 1.

  3. Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Labs Technical Journal, 28, 656–715.

    Article  MathSciNet  Google Scholar 

  4. Hoobi, M. M. (2017). Strong triple data encryption standard algorithm using nth degree truncated polynomial ring unit. Journal of Science, 58(3C), 1760–1771.

    Google Scholar 

  5. Fathy, A., Tarrad, I.F., Hamed, H.F.A., & Awad, A. I. (2012). Advanced encryption standard algorithm: Issues and implementation aspects, AMLTA 2012, CCIS 322, 2012, pp. 516–523. C-Springer-Verlag, Berlin Heidelberg.

  6. Anees, A., & Chen, Y. P. P. (2019). Designing secure substitution boxes based on permutation of symmetric group. Neural Computing and Applications, 32(11), 7045–7056.

    Article  Google Scholar 

  7. Shahzad, I., Mushtaq, Q. & Razaq, A. (2019). Construction of new S-Box using action of quotient of the modular group for multimedia security, Security and Communication Networks, pp. 1–13.

  8. Shah, T., & Qureshi, A. (2019). S-Box on subgroup of galois field. Cryptography, 3(2), 13.

    Article  Google Scholar 

  9. Hayat, U., Azam, N. A., & Asif, M. (2018). A method of generating 8 × 8 substitution boxes based on elliptic curves. Wireless Personal Communications, 101(1), 439–451.

    Article  Google Scholar 

  10. Hussain, I., Shah, T., Gondal, M. A., & Mahmood, H. (2013). A novel image encryption algorithm based on chaotic maps and exponent transformation. Nonlinear Dynamics, 72(1–2), 399–406.

    Article  MathSciNet  Google Scholar 

  11. Hussain, I., Anees, A., Alkhaldi, A. H., Aslam, M., Siddiqui, N., & Ahmed, R. (2019). Image encryption based on Chebyshev chaotic map and S8 S-boxes. Optica Applicata, 49(2).

  12. Nizam Chew, L. C., & Ismail, E. S. (2020). S-box construction based on linear fractional transformation and permutation function. Symmetry, 12(5), 826.

    Article  Google Scholar 

  13. Murphy, S., & Robshaw, M. J. B. (2002). Essential algebraic structure with in the AES, Information Security Group, Royal Holloway University of London. Springer.

    Google Scholar 

  14. Afzal, F., Afzal, Q., & Malik, M. A. (2013). Quadratic Fields under the Action of Subgroups of M. International Journal of Modeling and Optimization, 3(3).

  15. Malik, M.A., Husnine, S.M., Majeed, A. (2012). Action of the Mobius group on certain real quadratic fields. Journal of Mathematics 44, 31–37.

  16. Pieprzyk, J., & Finkelstein, G. (1988). Towards effective nonlinear cryptosystem design. IEE Proceedings Part E Computers and Digital Techniques, 135(6), 325–335.

    Article  Google Scholar 

  17. Kim, J., & Phan, R. C. W. (2009). Advanced differential-style cryptanalysis of the NSA’s Skipjack Block Cipher. Cryptologia, 33(3), 246–270.

    Article  Google Scholar 

  18. Yi, X., Cheng, S.X., You, X.H. & Lam, K.Y. (1997). A method for obtaining cryptographically strong 8/spl times/8 S-boxes. In GLOBECOM 97. IEEE global telecommunications conference. Conference record. vol. 2, pp. 689–693. IEEE.

  19. Hussain, I., Shah, T., Mahmood, H., Gondal, M. A., & Bhatti, U. Y. (2011). Some analysis of S-box based on residue of a prime number. Proc Pak Acad Sci, 48(2), 111–115.

    MathSciNet  Google Scholar 

  20. Tang, G., Liao, X., & Chen, Y. (2005). A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons and Fractals, 23(2), 413–419.

    Article  Google Scholar 

  21. Chen, G., Chen, Y., & Liao, X. (2007). An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos, Solitons and Fractals, 31(3), 571–579.

    Article  MathSciNet  Google Scholar 

  22. Belazi, A., Khan, M., El-Latif, A. A. A., & Belghith, S. (2017). Efficient cryptosystem approaches: S-boxes and permutation substitution-based encryption. Nonlinear Dynamics, 87(1), 337–361.

    Article  Google Scholar 

  23. Alkhaldi, A. H., Hussain, I., & Gondal, M. A. (2015). A novel design for the construction of safe S-boxes based on TDERC sequence. Alexandria Engineering Journal, 54, 65–69.

    Article  Google Scholar 

  24. Khan, M., Shah, T., & Gondal, M. A. (2013). An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dynamics, 73(3), 1795–1801.

    Article  MathSciNet  Google Scholar 

  25. Detombe, J. & Tavares, S. (1993). Constructing large cryptographically strong S-boxes. Lecture notes in computer science, pp. 165–181.

  26. Hussain, I., Shah, T., Gondal, M. A., Khan, M., & Khan, W. A. (2011). Construction of new S-box using a linear fractional transformation. World Applied Sciences Journal, 14(12), 1779–1785.

    Google Scholar 

  27. Yi, L., Tong, X., Wang, Z., Zhang, M., Zhu, H., & Liu, J. (2019). A novel block encryption algorithm based on chaotic S-Box for wireless sensor network. IEEE Access, 7, 53079–53090.

    Article  Google Scholar 

  28. Lambic, D. (2014). A novel method of S-box design based on chaotic map and composition method. Chaos, Solitons and Fractals, 58, 16–21.

    Article  Google Scholar 

  29. LambiC, D. (2016). A novel method of S-box design based on discrete chaotic map. Nonlinear Dynamics, 87(4), 2407–2413.

    Article  MathSciNet  Google Scholar 

  30. Ozkaynak, F. (2017). Construction of robust substitution boxes based on chaotic systems. Neural Computing and Applications, 31(8), 3317–3326.

    Article  Google Scholar 

  31. Ye, T., & Zhimao, L. (2018). Chaotic S-box: six-dimensional fractional Lorenz-Duffing chaotic system and O-shaped path scrambling. Nonlinear Dynamics, 94(3), 2115–2126.

    Article  Google Scholar 

  32. Riaz, F., & Siddiqui, N. (2020). Design of an Efficient Cryptographic Substitution Box by using Improved Chaotic Range with the Golden Ratio. International Journal of Computer Science and Information Security (IJCSIS), 18(1).

  33. Naseer, A., & Siddiqui, N. (2020). A novel approach for construction of S-box using modified Pascal’s triangle. International Journal of Computer Science and Information Security (IJCSIS), 18(1).

  34. Iftikhar, W., & Siddiqui, N. (2020). An Effective Technique of Substitution-box Construction using Recurrence Relation with Logistic Map. International Journal of Computer Science and Information Security (IJCSIS), 18(3).

  35. Siddiqui, N., Afsar, U., Shah, T., & Qureshi, A. (2016). A Novel Construction of S16 AES S-boxes. International Journal of Computer Science and Information Security (IJCSIS), 14(8).

  36. Khan, M., Shah, T., & Batool, S. I. (2015). Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Computing and Applications, 27, 677–685.

    Article  Google Scholar 

  37. Ahmad, M., Bhatia, D., & Hassan, Y. (2015). A novel ant colony optimization based scheme for substitution box design. Procedia Computer Science, 57, 572–580.

    Article  Google Scholar 

  38. Razaq, A., Yousaf, A., Shuaib, U., Siddiqui, N., Ullah, A., & Waheed, A. (2017). A novel construction of substitution box involving coset diagram and a bijective map. Security and Communication Networks, 2017.

  39. Silva-Garcia, V. M., Flores-Carapia, R., Renteria-Marquez, C., Luna-Benoso, B., & Aldape-Perez, M. (2018). Substitution box generation using Chaos: An image encryption application. Applied Mathematics and Computation, 332, 123–135.

    Article  MathSciNet  Google Scholar 

  40. Jamal, S. S., Khan, M. U., & Shah, T. (2016). A watermarking technique with chaotic fractional S-box transformation. Wireless Personal Communications, 90, 2033–2049.

    Article  Google Scholar 

  41. Lu, Q., Zhu, C., & Wang, G. (2019). A novel S-box design algorithm based on a new compound chaotic system. Entropy, 21, 1004.

    Article  MathSciNet  Google Scholar 

  42. Azam, N. A., Hayat, U., & Ullah, I. (2019). Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field. Frontiers of Information Technology and Electronic Engineering, 20, 1378–1389.

    Article  Google Scholar 

  43. Sani, R. H., Behnia, S., & Akhshani, A. (2021). Creation of S-box based on a hierarchy of Julia sets: image encryption approach. Multidimensional Systems and Signal Processing, pp. 1-24.

  44. Hayat, U., Azam, N. A., Gallegos-Ruiz, H. R., Naz, S., & Batool, L. (2021). A truly dynamic substitution box generator for block ciphers based on elliptic curves over finite rings. Arabian Journal for Science and Engineering, 46(9), 8887–8899.

    Article  Google Scholar 

  45. Zhang, Y. Q., Hao, J. L., & Wang, X. Y. (2020). An efficient image encryption scheme based on S-boxes and fractional-order differential logistic map. IEEE Access, 8, 54175–54188.

    Article  Google Scholar 

  46. Bin Faheem, Z., Ali, A., Khan, M. A., Ul-Haq, M. E., & Ahmad, W. (2020). Highly dispersive substitution box (S-box) design using chaos. ETRI Journal, 42(4), 619–632.

    Article  Google Scholar 

  47. Siddiqui, N., Naseer, A., & Ehatisham-ul-Haq, M. (2021). A novel scheme of substitution-box design based on modified Pascal’s triangle and elliptic curve. Wireless Personal Communications, 116(4), 3015–3030.

    Article  Google Scholar 

  48. Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer Science and Business Media.

    MATH  Google Scholar 

  49. Tran, M. T., Bui, D. K., & Duong, A. D. (2008, December). Gray S-box for advanced encryption standard. In 2008 international conference on computational intelligence and security (Vol. 1, pp. 253-258). IEEE.

Download references

Funding

There has been no significant financial support for this work.

Author information

Authors and Affiliations

Authors

Contributions

All authors have made equally contributions to the writing of this research paper.

Corresponding author

Correspondence to Bilal Arshad.

Ethics declarations

Conflict of interest

We know of no conflicts of interest associated with this publication.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arshad, B., Siddiqui, N., Hussain, Z. et al. A Novel Scheme for Designing Secure Substitution Boxes (S-Boxes) Based on Mobius Group and Finite Field. Wireless Pers Commun 124, 3527–3548 (2022). https://doi.org/10.1007/s11277-022-09524-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09524-1

Keywords

Navigation