Abstract
In substitution–permutation network as a cryptosystem, substitution boxes play the role of the only nonlinear part. It would be easy for adversaries to compromise the security of the system without them. 8-bit S-boxes are the most used cryptographic components. So far, cryptographers were constructing 8-bit S-boxes used in cryptographic primitives by exhaustive search of permutations of order 256. However, now for cryptographic techniques with 8-bit S-boxes as confusion layers, researchers are trying to reduce the size of S-box by working with a small unit of data. The aim is to make the techniques compact, fast and elegant. The novelty of this research is the construction of S-box on the elements of the multiplicative subgroup of the Galois field instead of the entire Galois field. The sturdiness of the proposed S-box against algebraic attacks was hashed out by employing the renowned analyses, including balance, nonlinearity, strict avalanche criterion, and approximation probabilities. Furthermore, the statistical strength of the S-box was tested by the majority logic criterion. The fallouts show that the S-box is appropriate for applications for secure data communications. The S-box was also used for watermarking of grayscale images with good outcomes.
Highlights
Information security and privacy problems are growing day by day due to the presence of communication nets
Advanced encryption standard (AES) [6], affine–power–affine (APA) [7], Gray [8], Liu J [9], residue prime [10], S8 AES [11], SKIPJACK [12], and Xyi [13] are some well-known 8 × 8 S-boxes that are usually used in encryption applications
This criterion uses the results from contrast analysis, correlation analysis, energy analysis, entropy analysis, homogeneity analysis, and mean of absolute deviation analysis [22]. These analyses are applied to the distorted images by using proposed S-box and the majority logic criterion is used to determine the appropriateness of the S-box to image encryption applications
Summary
Information security and privacy problems are growing day by day due to the presence of communication nets. Advanced encryption standard (AES) [6], affine–power–affine (APA) [7], Gray [8], Liu J [9], residue prime [10], S8 AES [11], SKIPJACK [12], and Xyi [13] are some well-known 8 × 8 S-boxes that are usually used in encryption applications These all are based on the elements of the Galois field GF(2) with almost similar algebraic and statistical properties. The suitability of the S-box for image encryption has been proved with the majority logic criterion It has been used for watermarking of grayscale images with good outcomes.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have