Abstract
Cryptography entails the practice of designing mathematical algorithms to secure data communication over insecure networks in the presence of adversaries. In this aspect, a cryptographic algorithm encrypts the confidential data and converts it into a non-readable text for adversaries. Advanced Encryption Standard (AES) is the most effective encryption algorithm proposed till now. Substitution-box (S-box) is the most crucial and only nonlinear component in AES (or any cryptographic algorithm), which provides data confusion. A highly nonlinear S-box offers high confidentiality and security against cryptanalysis attacks; hence, the design of S-box is very crucial in any encryption algorithm. To address this challenge, we propose the action of matrices (conforming to the basis of P <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">7</sub> [Z <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> ]) on the Galois field GF (2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">8</sup> ). Consequently, a novel algebraic technique for S-box construction to generate highly nonlinear 8 × 8 S-boxes based on by our proposed algorithm, we obtain 1.324×10 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">14</sup> different S-boxes. Standard S-box tests analyze the cryptographic strength of our proposed S-boxes. The examined results show that the proposed S-boxes possess state-of-the-art cryptographic properties. Moreover, we also demonstrate the effectiveness of the proposed S-boxes in image encryption applications using the majority logic criterion.
Highlights
Nowadays, with the growing progress in the areas of communication and data transformation, the significance of information security is increasing day by day
[49], the authors proposed a novel algorithm for color image encryption based on a rectangular transform (RT)enhanced chaotic tent map (CTM)
In [54], Shah et al endorsed a standard norm to evaluate the fundamental types of S-boxes and analyze their competency for image encryption applications based on the statistical analyses
Summary
With the growing progress in the areas of communication and data transformation, the significance of information security is increasing day by day. In [29], the authors discussed the implementation of modified CAST-256 algorithm to secure big data They explained how the CAST encryption method could be made dynamic by using the modified S-box and a key generator. In [49], the authors proposed a novel algorithm for color image encryption based on a rectangular transform (RT)enhanced chaotic tent map (CTM). In [50], the authors utilized the RT-enhanced chaotic tent map to cryptanalysis the newly proposed color image encryption algorithm using chosen-plaintext attacks. The authors proposed an improved color image encryption algorithm based on logistic-tent map (LTM) by improving the key generation method and encryption strategy. The research work in [53] used cryptanalysis driven design technique to investigate different security issues in chaos-based image encryption algorithms. In [54], Shah et al endorsed a standard norm to evaluate the fundamental types of S-boxes and analyze their competency for image encryption applications based on the statistical analyses
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have