Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 9/2021

11.05.2021 | Research Article-Computer Engineering and Computer Science

A Truly Dynamic Substitution Box Generator for Block Ciphers Based on Elliptic Curves Over Finite Rings

verfasst von: Umar Hayat, Naveed Ahmed Azam, Homero Renato Gallegos-Ruiz, Saima Naz, Lubna Batool

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 9/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Several dynamic substitution box (S-box) generators have been proposed in recent years. Some of the existing S-box generators can generate an S-box with good cryptographic properties. However, no analysis has been performed for almost all generators to confirm if they can output highly dynamic S-boxes in a reasonable computational complexity. This article aims to propose an S-box generator that can efficiently generate highly dynamic S-boxes with good cryptographic properties. For this purpose, we use elliptic curves over finite rings. To create randomness in the points on the curves, we define two families of total orders. We then use these ordered curves to generate an S-box of size m using the y-coordinates of an ordered subset of size m of the underlying curve. We performed a rigorous analysis to show that our proposed generator can efficiently generate dynamic S-boxes with good cryptographic properties. Compared to some of the existing generators, it is shown that the proposed S-box generator is more suitable for cryptographic purposes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Lai, X.; Massey, J.L.: A proposal for a new block encryption standard. In: Workshop on the Theory and Application of of Cryptographic Techniques (pp. 389-404). Springer, Heidelberg (1990) Lai, X.; Massey, J.L.: A proposal for a new block encryption standard. In: Workshop on the Theory and Application of of Cryptographic Techniques (pp. 389-404). Springer, Heidelberg (1990)
3.
Zurück zum Zitat Schneier, B.; Kelsey, J.; Whiting, D.; Wagner, D.; Hall, C.; Ferguson, N.: The Twofish encryption algorithm: a 128-bit block cipher. John Wiley and Sons Inc., NY (1999)MATH Schneier, B.; Kelsey, J.; Whiting, D.; Wagner, D.; Hall, C.; Ferguson, N.: The Twofish encryption algorithm: a 128-bit block cipher. John Wiley and Sons Inc., NY (1999)MATH
4.
Zurück zum Zitat Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In :International Workshop on Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg (1993) Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In :International Workshop on Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg (1993)
5.
Zurück zum Zitat Tian, Y.; Lu, Z.: Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation. AIP Adv. 7(8), 085008 (2017)CrossRef Tian, Y.; Lu, Z.: Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation. AIP Adv. 7(8), 085008 (2017)CrossRef
6.
Zurück zum Zitat Wu, Y.; Noonan, J.P.: Dynamic and Implicit Latin Square Doubly Stochastic S-Boxes with Reversibility. In: IEEE International Conference on Systems, Man, and Cybernetics, pp. 3358–3364 (2011) Wu, Y.; Noonan, J.P.: Dynamic and Implicit Latin Square Doubly Stochastic S-Boxes with Reversibility. In: IEEE International Conference on Systems, Man, and Cybernetics, pp. 3358–3364 (2011)
7.
Zurück zum Zitat Cassal-Quiroga, B.B.; Campos-Canton, E: Generation of dynamical S-boxes for block ciphers via extended logistic map. Math. Prob. Eng. 2020, 2702653 (2020) Cassal-Quiroga, B.B.; Campos-Canton, E: Generation of dynamical S-boxes for block ciphers via extended logistic map. Math. Prob. Eng. 2020, 2702653 (2020)
8.
Zurück zum Zitat Ahmed, H.A.; Zolkipli, M.F.; Ahmad, M.: A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput. Appl. 31(11), 7201–7210 (2019)CrossRef Ahmed, H.A.; Zolkipli, M.F.; Ahmad, M.: A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput. Appl. 31(11), 7201–7210 (2019)CrossRef
9.
Zurück zum Zitat Chen, G.; Chen, Y.; Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos solitons fract. 31(3), 571–579 (2007)MathSciNetMATHCrossRef Chen, G.; Chen, Y.; Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos solitons fract. 31(3), 571–579 (2007)MathSciNetMATHCrossRef
10.
Zurück zum Zitat Tang, G.; Liao, X.; Chen, Y.: A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fract 23(2), 413–419 (2005)MATHCrossRef Tang, G.; Liao, X.; Chen, Y.: A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fract 23(2), 413–419 (2005)MATHCrossRef
11.
Zurück zum Zitat Jakimoski, G.; Kocarev, L.: Chaos and cryptography: block encryption ciphers based on chaotic maps. Ieee Trans. Circuits Syst. Fund Theory Appl. 48(2), 163–169 (2001)MathSciNetMATHCrossRef Jakimoski, G.; Kocarev, L.: Chaos and cryptography: block encryption ciphers based on chaotic maps. Ieee Trans. Circuits Syst. Fund Theory Appl. 48(2), 163–169 (2001)MathSciNetMATHCrossRef
12.
Zurück zum Zitat Özkaynak, F.; Özer, A.B.: A method for designing strong S-Boxes based on chaotic Lorenz system. Phys. Lett. A 374(36), 3733–3738 (2010)MATHCrossRef Özkaynak, F.; Özer, A.B.: A method for designing strong S-Boxes based on chaotic Lorenz system. Phys. Lett. A 374(36), 3733–3738 (2010)MATHCrossRef
13.
Zurück zum Zitat Gautam, A.; Gaba, G.S.; Miglani, R.; Pasricha, R.: Application of chaotic functions for construction of strong substitution boxes. Indian J. Sci. Technol. 8(28), 1–5 (2015)CrossRef Gautam, A.; Gaba, G.S.; Miglani, R.; Pasricha, R.: Application of chaotic functions for construction of strong substitution boxes. Indian J. Sci. Technol. 8(28), 1–5 (2015)CrossRef
14.
Zurück zum Zitat Khan, M.; Shah, T.; Mahmood, H.; Gondal, M.A.; Hussain, I.: A novel technique for the construction of strong s-boxes based on chaotic lorenz systems. Nonlinear Dynam. 70(3), 2303–2311 (2012)MathSciNetCrossRef Khan, M.; Shah, T.; Mahmood, H.; Gondal, M.A.; Hussain, I.: A novel technique for the construction of strong s-boxes based on chaotic lorenz systems. Nonlinear Dynam. 70(3), 2303–2311 (2012)MathSciNetCrossRef
15.
Zurück zum Zitat Farah, M.B.; Farah, A.; Farah, T.: An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynam. 99, 3041–3064 (2020) Farah, M.B.; Farah, A.; Farah, T.: An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynam. 99, 3041–3064 (2020)
16.
Zurück zum Zitat Farah, T.; Rhouma, R.; Belghith, S.: A novel method for designing S-box based on chaotic map and Teaching-Learning-Based Optimization. Nonlinear Dynam. 88(2), 1059–1074 (2017)CrossRef Farah, T.; Rhouma, R.; Belghith, S.: A novel method for designing S-box based on chaotic map and Teaching-Learning-Based Optimization. Nonlinear Dynam. 88(2), 1059–1074 (2017)CrossRef
17.
Zurück zum Zitat Abd el-Latif, A.A., Abd-el-Atty, B., Amin, M., Iliyasu, A.M.: Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci. Rep. 10(1), 1–16 (2020) Abd el-Latif, A.A., Abd-el-Atty, B., Amin, M., Iliyasu, A.M.: Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci. Rep. 10(1), 1–16 (2020)
18.
Zurück zum Zitat Alzaidi, A.A.; Ahmad, M.; Ahmed, H.S.; Solami, E.A.: Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map. Complexity 2018, 1–16 (2018)CrossRef Alzaidi, A.A.; Ahmad, M.; Ahmed, H.S.; Solami, E.A.: Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map. Complexity 2018, 1–16 (2018)CrossRef
19.
Zurück zum Zitat Alhadawi, H.S.; Lambić, D.; Zolkipli, M.F.; Ahmad, M.: Globalized firefly algorithm and chaos for designing substitution box. J. Infom. Sec. Appl. 55, 102671 (2020) Alhadawi, H.S.; Lambić, D.; Zolkipli, M.F.; Ahmad, M.: Globalized firefly algorithm and chaos for designing substitution box. J. Infom. Sec. Appl. 55, 102671 (2020)
20.
Zurück zum Zitat Özkaynak, F.: On the effect of chaotic system in performance characteristics of chaos based s-box designs. Phys. A Statist. Mech. App 550, 124072 (2020)CrossRef Özkaynak, F.: On the effect of chaotic system in performance characteristics of chaos based s-box designs. Phys. A Statist. Mech. App 550, 124072 (2020)CrossRef
22.
Zurück zum Zitat Alhadawi, H.S.; Majid, M.A.; Lambić, D.; Ahmad, M.: A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl. 1–18 (2020) Alhadawi, H.S.; Majid, M.A.; Lambić, D.; Ahmad, M.: A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl. 1–18 (2020)
23.
Zurück zum Zitat Khan, M.; Azam, N.A.: Right Translated AES Gray S-boxes. Sec. Comm. Netw. 8, 1627–1635 (2015)CrossRef Khan, M.; Azam, N.A.: Right Translated AES Gray S-boxes. Sec. Comm. Netw. 8, 1627–1635 (2015)CrossRef
25.
Zurück zum Zitat Hussain, I.; Shah, T.; Mahmood, H.; Gondal, M.A.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput Appl. 22(6), 1085–1093 (2013)CrossRef Hussain, I.; Shah, T.; Mahmood, H.; Gondal, M.A.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput Appl. 22(6), 1085–1093 (2013)CrossRef
26.
Zurück zum Zitat Hussain, I.; Shah, T.; Gondal, M.A.; Khan, W.A.; Mahmood, H.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 23(1), 97–104 (2013)CrossRef Hussain, I.; Shah, T.; Gondal, M.A.; Khan, W.A.; Mahmood, H.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 23(1), 97–104 (2013)CrossRef
27.
Zurück zum Zitat Hussain, I.; Azam, N.A.; Shah, T.: Stego optical encryption based on chaotic S-box transformation. Optics Laser Technol. 61, 50–56 (2014)CrossRef Hussain, I.; Azam, N.A.; Shah, T.: Stego optical encryption based on chaotic S-box transformation. Optics Laser Technol. 61, 50–56 (2014)CrossRef
29.
Zurück zum Zitat Gao, W.; Idrees, B.; Zafar, S.; Rashid, T.: Construction of Nonlinear Component of Block Cipher by Action of Modular Group PSL (2, Z) on Projective Line PL (GF (2 8)). IEEE Access 8, 136736–136749 (2020)CrossRef Gao, W.; Idrees, B.; Zafar, S.; Rashid, T.: Construction of Nonlinear Component of Block Cipher by Action of Modular Group PSL (2, Z) on Projective Line PL (GF (2 8)). IEEE Access 8, 136736–136749 (2020)CrossRef
30.
Zurück zum Zitat Hua, Z.; Zhou, Y.; Huang, H.: Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403–419 (2019)CrossRef Hua, Z.; Zhou, Y.; Huang, H.: Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403–419 (2019)CrossRef
31.
Zurück zum Zitat Ibrahim, A.K.; Hagras, E.A.; Alfhar, A.; El-Kamchochi, H.A.: Dynamic Chaotic Biometric Identity Isomorphic Elliptic Curve (DCBI-IEC) for Crypto Images. In: 2020 2nd International Conference on Computer Communication and the Internet (ICCCI) (pp. 119-125). IEEE. (2020) Ibrahim, A.K.; Hagras, E.A.; Alfhar, A.; El-Kamchochi, H.A.: Dynamic Chaotic Biometric Identity Isomorphic Elliptic Curve (DCBI-IEC) for Crypto Images. In: 2020 2nd International Conference on Computer Communication and the Internet (ICCCI) (pp. 119-125). IEEE. (2020)
32.
Zurück zum Zitat Razaq, A.; Alolaiyan, H.; Ahmad, M.; Yousaf, M.A.; Shuaib, U.; Aslam, W.; Alawida, M.: A novel method for generation of strong substitution-boxes based on coset graphs and symmetric groups. IEEE Access 8, 75473–75490 (2020)CrossRef Razaq, A.; Alolaiyan, H.; Ahmad, M.; Yousaf, M.A.; Shuaib, U.; Aslam, W.; Alawida, M.: A novel method for generation of strong substitution-boxes based on coset graphs and symmetric groups. IEEE Access 8, 75473–75490 (2020)CrossRef
33.
Zurück zum Zitat Yousaf, M.A.; Alolaiyan, H.; Ahmad, M.; Dilbar, M.; Razaq, A.: Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes. IEEE Access 8, 39781–39792 (2020)CrossRef Yousaf, M.A.; Alolaiyan, H.; Ahmad, M.; Dilbar, M.; Razaq, A.: Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes. IEEE Access 8, 39781–39792 (2020)CrossRef
34.
Zurück zum Zitat Wang, Y.; Zhang, Z.; Zhang, L.Y.; Feng, J.; Gao, J.; Lei, P.: A genetic algorithm for constructing bijective substitution boxes with high nonlinearity. Inf. Sci. 523, 152–166 (2020)MathSciNetMATHCrossRef Wang, Y.; Zhang, Z.; Zhang, L.Y.; Feng, J.; Gao, J.; Lei, P.: A genetic algorithm for constructing bijective substitution boxes with high nonlinearity. Inf. Sci. 523, 152–166 (2020)MathSciNetMATHCrossRef
35.
Zurück zum Zitat Wang, Y.; Wong, K.W.; Li, C.; Li, Y.: A novel method to design S-box based on chaotic map and genetic algorithm. Phys. Lett. A 376(6–7), 827–833 (2012)MATHCrossRef Wang, Y.; Wong, K.W.; Li, C.; Li, Y.: A novel method to design S-box based on chaotic map and genetic algorithm. Phys. Lett. A 376(6–7), 827–833 (2012)MATHCrossRef
37.
Zurück zum Zitat Ahmad, M.; Al-Solami, E.; Alghamdi, A.M.; Yousaf, M.A.: Bijective S-boxes method using improved chaotic map-based heuristic search and algebraic group structures. IEEE Access 8, 110397–110411 (2020)CrossRef Ahmad, M.; Al-Solami, E.; Alghamdi, A.M.; Yousaf, M.A.: Bijective S-boxes method using improved chaotic map-based heuristic search and algebraic group structures. IEEE Access 8, 110397–110411 (2020)CrossRef
38.
Zurück zum Zitat Ahmad, M.; Doja, M.N.; Beg, M.S.: ABC optimization based construction of strong substitution-boxes. Wireless Personal Commun. 101(3), 1715–1729 (2018)CrossRef Ahmad, M.; Doja, M.N.; Beg, M.S.: ABC optimization based construction of strong substitution-boxes. Wireless Personal Commun. 101(3), 1715–1729 (2018)CrossRef
39.
Zurück zum Zitat Ahmad, M.; Khaja, I.A.; Baz, A.; Alhakami, H.; Alhakami, W.: Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications. IEEE Access 8, 116132–116147 (2020)CrossRef Ahmad, M.; Khaja, I.A.; Baz, A.; Alhakami, H.; Alhakami, W.: Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications. IEEE Access 8, 116132–116147 (2020)CrossRef
40.
Zurück zum Zitat Miller, V.S.: Use of elliptic curves in cryptography. In: Conference on the theory and application of cryptographic techniques (pp. 417-426). Springer, Heidelberg. (1985) Miller, V.S.: Use of elliptic curves in cryptography. In: Conference on the theory and application of cryptographic techniques (pp. 417-426). Springer, Heidelberg. (1985)
42.
Zurück zum Zitat Koblitz, N.; Menezes, A.; Vanstone, S.: The state of elliptic curve cryptography. Des. Codes Cryptogr. 19(2–3), 173–193 (2000)MathSciNetMATHCrossRef Koblitz, N.; Menezes, A.; Vanstone, S.: The state of elliptic curve cryptography. Des. Codes Cryptogr. 19(2–3), 173–193 (2000)MathSciNetMATHCrossRef
43.
Zurück zum Zitat Brown, D.: Standards for efficient cryptography, SEC 1: elliptic curve cryptography. Released Standard Version, 1 (2009) Brown, D.: Standards for efficient cryptography, SEC 1: elliptic curve cryptography. Released Standard Version, 1 (2009)
44.
Zurück zum Zitat Koblitz, A.H.; Koblitz, N.; Menezes, A.: Elliptic curve cryptography: the serpentine course of a paradigm shift. J. Number Theory 131(5), 781–814 (2011)MathSciNetMATHCrossRef Koblitz, A.H.; Koblitz, N.; Menezes, A.: Elliptic curve cryptography: the serpentine course of a paradigm shift. J. Number Theory 131(5), 781–814 (2011)MathSciNetMATHCrossRef
45.
Zurück zum Zitat Kunihiro, N.; Koyama, K.: Equivalence of counting the number of points on elliptic curve over the ring Zn and factoring n. In: International Conference on the Theory and Applications of Cryptographic Techniques (pp. 47-58). Springer, Heidelberg (1998) Kunihiro, N.; Koyama, K.: Equivalence of counting the number of points on elliptic curve over the ring Zn and factoring n. In: International Conference on the Theory and Applications of Cryptographic Techniques (pp. 47-58). Springer, Heidelberg (1998)
46.
Zurück zum Zitat Koyama, K.; Maurer, U.M.; Okamoto, T.; Vanstone, S.A.: New public-key schemes based on elliptic curves over the ring Zn. In: Annual International Cryptology Conference (pp. 252–266). Springer, Heidelberg (1991) Koyama, K.; Maurer, U.M.; Okamoto, T.; Vanstone, S.A.: New public-key schemes based on elliptic curves over the ring Zn. In: Annual International Cryptology Conference (pp. 252–266). Springer, Heidelberg (1991)
47.
Zurück zum Zitat Hayat, U.; Azam, N.A.; Asif, M.: A method of generating \(8 \times 8\) substitution boxes based on elliptic curves. Wireless Personal Commun. 101(1), 439–451 (2018)CrossRef Hayat, U.; Azam, N.A.; Asif, M.: A method of generating \(8 \times 8\) substitution boxes based on elliptic curves. Wireless Personal Commun. 101(1), 439–451 (2018)CrossRef
48.
Zurück zum Zitat Hayat, U.; Azam, N.A.: A novel image encryption scheme based on an elliptic curve. Sig. Process. 155, 391–402 (2019)CrossRef Hayat, U.; Azam, N.A.: A novel image encryption scheme based on an elliptic curve. Sig. Process. 155, 391–402 (2019)CrossRef
49.
Zurück zum Zitat Azam, N.A.; Hayat, U.; Ullah, I.: Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field. Front. Inf. Technol. Electron. Eng. 20(10), 1378–1389 (2019)CrossRef Azam, N.A.; Hayat, U.; Ullah, I.: Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field. Front. Inf. Technol. Electron. Eng. 20(10), 1378–1389 (2019)CrossRef
51.
Zurück zum Zitat Ullah, I.; Hayat, U.; Bustamante, M.D.: Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads. Entropy 22(4), 454 (2020) Ullah, I.; Hayat, U.; Bustamante, M.D.: Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads. Entropy 22(4), 454 (2020)
52.
Zurück zum Zitat Farwa, S.; Sohail, A.; Muhammad, N.: A novel application of elliptic curves in the dynamical components of block ciphers. Wireless Personal Commun. 1–8 (2020) Farwa, S.; Sohail, A.; Muhammad, N.: A novel application of elliptic curves in the dynamical components of block ciphers. Wireless Personal Commun. 1–8 (2020)
53.
Zurück zum Zitat Farwa, S.; Bibi, N.; Muhammad, N.: An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling. Multimed. Tools Appl. 79(37), 28225–28238 (2020)CrossRef Farwa, S.; Bibi, N.; Muhammad, N.: An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling. Multimed. Tools Appl. 79(37), 28225–28238 (2020)CrossRef
54.
Zurück zum Zitat Ullah, I.; Azam, N.A.; Hayat, U.: Efficient and secure substitution box and random number generators over Mordell elliptic curves. J. Inf. Sec. Appl. 56, 102619 (2021) Ullah, I.; Azam, N.A.; Hayat, U.: Efficient and secure substitution box and random number generators over Mordell elliptic curves. J. Inf. Sec. Appl. 56, 102619 (2021)
55.
Zurück zum Zitat Azam, N.A.; Ullah, I.; Hayat, U.: A fast and secure public-key image encryption scheme based on Mordell elliptic curves. Optics Lasers Eng. 137, 106371 (2021)CrossRef Azam, N.A.; Ullah, I.; Hayat, U.: A fast and secure public-key image encryption scheme based on Mordell elliptic curves. Optics Lasers Eng. 137, 106371 (2021)CrossRef
56.
Zurück zum Zitat Bini, G.; Flamini, F.: Finite commutative rings and their applications, vol. 680. Springer, Berlin (2012)MATH Bini, G.; Flamini, F.: Finite commutative rings and their applications, vol. 680. Springer, Berlin (2012)MATH
57.
Zurück zum Zitat Shah, T.; Ali, A.; Khan, M.; Farooq, G.; de Andrade, A.A.: Galois Ring GR (2 (3), 8) Dependent 24 x 24 S-Box Design: An RGB Image Encryption Application. Wiresless Personal Commun. (2020) Shah, T.; Ali, A.; Khan, M.; Farooq, G.; de Andrade, A.A.: Galois Ring GR (2 (3), 8) Dependent 24 x 24 S-Box Design: An RGB Image Encryption Application. Wiresless Personal Commun. (2020)
58.
Zurück zum Zitat Shah, T.; Mehmood, N.; de Andrade, A.A.; Palazzo, R.: Maximal cyclic subgroups of the groups of units of Galois rings: a computational approach. Comput. Appl. Math. 36(3), 1273–1297 (2017)MathSciNetMATHCrossRef Shah, T.; Mehmood, N.; de Andrade, A.A.; Palazzo, R.: Maximal cyclic subgroups of the groups of units of Galois rings: a computational approach. Comput. Appl. Math. 36(3), 1273–1297 (2017)MathSciNetMATHCrossRef
59.
Zurück zum Zitat Azam, N.A.; Shah, T.; de Andrade, A.A.: A new transmission model in cognitive radio based on cyclic generalized polynomial codes for bandwidth reduction. Dis. Math. Algorithms Appl. 6(04), 1450059 (2014)MathSciNetMATHCrossRef Azam, N.A.; Shah, T.; de Andrade, A.A.: A new transmission model in cognitive radio based on cyclic generalized polynomial codes for bandwidth reduction. Dis. Math. Algorithms Appl. 6(04), 1450059 (2014)MathSciNetMATHCrossRef
60.
Zurück zum Zitat Hussain, S.A.; Shah, T.; Azam, N.A.; Andrade, A.A.D.; Naveed Malik, A.: Spectrum distribution in cognitive radio: error correcting codes perspective. Int. J. Distrib. Sensor Netw. 10(7), 864916 (2014)CrossRef Hussain, S.A.; Shah, T.; Azam, N.A.; Andrade, A.A.D.; Naveed Malik, A.: Spectrum distribution in cognitive radio: error correcting codes perspective. Int. J. Distrib. Sensor Netw. 10(7), 864916 (2014)CrossRef
61.
Zurück zum Zitat Shah, T.; Azam, N.A.: Characterization of cyclic codes over \({\cal{B}}[X;(1/m) Z_ 0]_{m> 1}\) and efficient encoding decoding algorithm for cyclic codes. Int. J. Comp. Math. 94(5), 1015–1027 (2017)MATHCrossRef Shah, T.; Azam, N.A.: Characterization of cyclic codes over \({\cal{B}}[X;(1/m) Z_ 0]_{m> 1}\) and efficient encoding decoding algorithm for cyclic codes. Int. J. Comp. Math. 94(5), 1015–1027 (2017)MATHCrossRef
62.
Zurück zum Zitat Bhattacharya, D.; Bansal, N.; Banerjee, A.; RoyChowdhury, D.: A near optimal S-box design. In: International Conference on Information Systems Security (pp. 77-90). Springer, Heidelberg. (2007, December) Bhattacharya, D.; Bansal, N.; Banerjee, A.; RoyChowdhury, D.: A near optimal S-box design. In: International Conference on Information Systems Security (pp. 77-90). Springer, Heidelberg. (2007, December)
63.
Zurück zum Zitat Daemen, J.; Rijmen, V.: The Design of Rijndael-AES: the Advanced Encryption Standard. Springer, Germany (2002)MATHCrossRef Daemen, J.; Rijmen, V.: The Design of Rijndael-AES: the Advanced Encryption Standard. Springer, Germany (2002)MATHCrossRef
64.
Zurück zum Zitat Ivanov, G.; Nikolov, N.; Nikova, S.: Cryptographically strong S-boxes generated by modified immune algorithm. In: International Conference on Cryptography and Information Security in the Balkans (pp. 31-42). Springer, Cham. (2015, September) Ivanov, G.; Nikolov, N.; Nikova, S.: Cryptographically strong S-boxes generated by modified immune algorithm. In: International Conference on Cryptography and Information Security in the Balkans (pp. 31-42). Springer, Cham. (2015, September)
65.
Zurück zum Zitat Abd EL-Latif A. A., Abd-El-Atty B., Venegas-Andraca S.E.: A novel image steganography technique based on quantum substitution boxes. Optics Laser Technol. 116, 92–102 (2019) Abd EL-Latif A. A., Abd-El-Atty B., Venegas-Andraca S.E.: A novel image steganography technique based on quantum substitution boxes. Optics Laser Technol. 116, 92–102 (2019)
67.
Zurück zum Zitat Kim, J.; Phan, R.C.W.: Advanced differential-style cryptanalysis of the NSA’s Skipjack Block Cipher. Cryptologia 33, 246–270 (2009) Kim, J.; Phan, R.C.W.: Advanced differential-style cryptanalysis of the NSA’s Skipjack Block Cipher. Cryptologia 33, 246–270 (2009)
68.
Zurück zum Zitat Azam, N.A.; Hayat, U.; Ayubb M.: A Substitution Box Generator, its Analysis, and Applications in Image Encryption. [Submitted] (2020) Azam, N.A.; Hayat, U.; Ayubb M.: A Substitution Box Generator, its Analysis, and Applications in Image Encryption. [Submitted] (2020)
Metadaten
Titel
A Truly Dynamic Substitution Box Generator for Block Ciphers Based on Elliptic Curves Over Finite Rings
verfasst von
Umar Hayat
Naveed Ahmed Azam
Homero Renato Gallegos-Ruiz
Saima Naz
Lubna Batool
Publikationsdatum
11.05.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 9/2021
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-021-05666-9

Weitere Artikel der Ausgabe 9/2021

Arabian Journal for Science and Engineering 9/2021 Zur Ausgabe

Research Article-Computer Engineering and Computer Science

Research on Workpiece Image Mosaic Technology of Groove Cutting Robot

Research Article-Computer Engineering and Computer Science

A Jungle Community Detection Algorithm Based on New Weighted Similarity

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.