A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group

<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S<sub>8</sub...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Iqtadar Hussain (14147850) (author)
مؤلفون آخرون: Amir Anees (14147853) (author), Temadher Alassiry Al-Maadeed (14147847) (author)
منشور في: 2023
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513530522238976
author Iqtadar Hussain (14147850)
author2 Amir Anees (14147853)
Temadher Alassiry Al-Maadeed (14147847)
author2_role author
author
author_facet Iqtadar Hussain (14147850)
Amir Anees (14147853)
Temadher Alassiry Al-Maadeed (14147847)
author_role author
dc.creator.none.fl_str_mv Iqtadar Hussain (14147850)
Amir Anees (14147853)
Temadher Alassiry Al-Maadeed (14147847)
dc.date.none.fl_str_mv 2023-02-13T03:00:00Z
dc.identifier.none.fl_str_mv 10.1007/s40314-023-02208-x
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/A_novel_encryption_algorithm_using_multiple_semifield_S-boxes_based_on_permutation_of_symmetric_group/24999077
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Mathematical sciences
Applied mathematics
Statistics
Block cipher encryption
S-box
Statistical analysis
Cryptanalysis
dc.title.none.fl_str_mv A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S<sub>8</sub> and establish an effective procedure for generating S<sub>8</sub> semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards, namely bijectivity, non-linearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</p><h2>Other Information</h2><p dir="ltr">Published in: Computational and Applied Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s40314-023-02208-x" target="_blank">https://dx.doi.org/10.1007/s40314-023-02208-x</a></p>
eu_rights_str_mv openAccess
id Manara2_25fd1cb3f0fe64e57a50919f3acdf630
identifier_str_mv 10.1007/s40314-023-02208-x
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/24999077
publishDate 2023
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric groupIqtadar Hussain (14147850)Amir Anees (14147853)Temadher Alassiry Al-Maadeed (14147847)Information and computing sciencesCybersecurity and privacyMathematical sciencesApplied mathematicsStatisticsBlock cipher encryptionS-boxStatistical analysisCryptanalysis<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S<sub>8</sub> and establish an effective procedure for generating S<sub>8</sub> semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards, namely bijectivity, non-linearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</p><h2>Other Information</h2><p dir="ltr">Published in: Computational and Applied Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s40314-023-02208-x" target="_blank">https://dx.doi.org/10.1007/s40314-023-02208-x</a></p>2023-02-13T03:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1007/s40314-023-02208-xhttps://figshare.com/articles/journal_contribution/A_novel_encryption_algorithm_using_multiple_semifield_S-boxes_based_on_permutation_of_symmetric_group/24999077CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/249990772023-02-13T03:00:00Z
spellingShingle A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Iqtadar Hussain (14147850)
Information and computing sciences
Cybersecurity and privacy
Mathematical sciences
Applied mathematics
Statistics
Block cipher encryption
S-box
Statistical analysis
Cryptanalysis
status_str publishedVersion
title A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
title_full A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
title_fullStr A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
title_full_unstemmed A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
title_short A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
title_sort A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
topic Information and computing sciences
Cybersecurity and privacy
Mathematical sciences
Applied mathematics
Statistics
Block cipher encryption
S-box
Statistical analysis
Cryptanalysis