Abstract

New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for the plaintext in the encryption phase and transforming the ciphertext on the receiver side into original plaintext in the decryption phase. The overall security of a given cipher engaging an S-box greatly depends on the cryptographic forte of the respective S-box. Consequently, many researchers have used different innovative approaches to construct robust S-Boxes. In this article, an innovative and modest square polynomial transformation, the very first time, along with a novel affine transformation and a pioneering permutation approach to construct dynamic S-boxes is proposed. The proposed method has the capability to erect a huge number of robust S-boxes by applying minute changes in the parameters of transformation and permutation processes. An example S-Box is generated, and its recital analysis has been done using typical criteria including bijectivity, strict avalanche criterion, nonlinearity, bit independence criterion, linear probability, differential probability, and fixed-point analysis to check its cryptographic forte. This performance of the proposed S-box is placed side by side against state-of-the-art S-boxes to prove its strength. The performance and comparative analyses authenticate that the projected S-box possesses the true competence for its application in modern-day ciphers.

Highlights

  • Today, organizations have a huge volume of data within their data storerooms and systems

  • Different techniques are utilized to transform the given data into meaningless form. One such domain to help in this conversion is called cryptography and contemporary cryptographic techniques recognized as ciphers contribute their part for data and information protection

  • We demonstrate a novel technique to yield dynamic S-boxes using a new polynomial transformation, a dynamic affine transformation, and an innovative permutation technique to create the final substitution box (S-box)

Read more

Summary

INTRODUCTION

Organizations have a huge volume of data within their data storerooms and systems. Different techniques are utilized to transform the given data into meaningless form One such domain to help in this conversion is called cryptography and contemporary cryptographic techniques recognized as ciphers contribute their part for data and information protection. Are few examples of the renowned block ciphers being used in many security applications These block ciphers employ permutation and substitution operations as the core processes to encrypt the given data and decrypt the subsequent ciphertext. DES and AES original S-Boxes are static in nature and invaders attempted attacks on these in past To overcome such a weakness present in a static S-Box, modern-day ciphers employ dynamic S-boxes that are generated by using cipherkey and own more cryptographic strength. Such dynamic S-boxes offer various level of security to the ciphertext Some of these techniques for S-box generation follow complex construction process and are less efficient.

PROPOSED SCHEME FOR S-BOX GENERATION
INNOVATIVE SQUARE TRANSFORMATION
DYNAMIC AFFINE TRANSFORMATION
DYNAMIC PERMUTATION TECHNIQUE
SECURITY ASSESSMENT OF PROJECTED S-BOX
BIJECTIVENESS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.