Abstract

In substitution–permutation network as a cryptosystem, substitution boxes play the role of the only nonlinear part. It would be easy for adversaries to compromise the security of the system without them. 8-bit S-boxes are the most used cryptographic components. So far, cryptographers were constructing 8-bit S-boxes used in cryptographic primitives by exhaustive search of permutations of order 256. However, now for cryptographic techniques with 8-bit S-boxes as confusion layers, researchers are trying to reduce the size of S-box by working with a small unit of data. The aim is to make the techniques compact, fast and elegant. The novelty of this research is the construction of S-box on the elements of the multiplicative subgroup of the Galois field instead of the entire Galois field. The sturdiness of the proposed S-box against algebraic attacks was hashed out by employing the renowned analyses, including balance, nonlinearity, strict avalanche criterion, and approximation probabilities. Furthermore, the statistical strength of the S-box was tested by the majority logic criterion. The fallouts show that the S-box is appropriate for applications for secure data communications. The S-box was also used for watermarking of grayscale images with good outcomes.

Highlights

  • Information security and privacy problems are growing day by day due to the presence of communication nets

  • Advanced encryption standard (AES) [6], affine–power–affine (APA) [7], Gray [8], Liu J [9], residue prime [10], S8 AES [11], SKIPJACK [12], and Xyi [13] are some well-known 8 × 8 S-boxes that are usually used in encryption applications

  • This criterion uses the results from contrast analysis, correlation analysis, energy analysis, entropy analysis, homogeneity analysis, and mean of absolute deviation analysis [22]. These analyses are applied to the distorted images by using proposed S-box and the majority logic criterion is used to determine the appropriateness of the S-box to image encryption applications

Read more

Summary

Introduction

Information security and privacy problems are growing day by day due to the presence of communication nets. Advanced encryption standard (AES) [6], affine–power–affine (APA) [7], Gray [8], Liu J [9], residue prime [10], S8 AES [11], SKIPJACK [12], and Xyi [13] are some well-known 8 × 8 S-boxes that are usually used in encryption applications These all are based on the elements of the Galois field GF(2) with almost similar algebraic and statistical properties. The suitability of the S-box for image encryption has been proved with the majority logic criterion It has been used for watermarking of grayscale images with good outcomes.

Construction of S-box on Subgroup of the Galois Field
Analyses
Balance Property
Nonlinearity Analysis
Linear Approximation Probability Analysis
Differential Approximation Probability Analysis
Majority Logic Criterion
Original
Application of Proposed S-box in Image Watermarking
Results
Conclusions and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call