A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S<sub>8</sub...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , |
| منشور في: |
2023
|
| الموضوعات: | |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513530522238976 |
|---|---|
| author | Iqtadar Hussain (14147850) |
| author2 | Amir Anees (14147853) Temadher Alassiry Al-Maadeed (14147847) |
| author2_role | author author |
| author_facet | Iqtadar Hussain (14147850) Amir Anees (14147853) Temadher Alassiry Al-Maadeed (14147847) |
| author_role | author |
| dc.creator.none.fl_str_mv | Iqtadar Hussain (14147850) Amir Anees (14147853) Temadher Alassiry Al-Maadeed (14147847) |
| dc.date.none.fl_str_mv | 2023-02-13T03:00:00Z |
| dc.identifier.none.fl_str_mv | 10.1007/s40314-023-02208-x |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/A_novel_encryption_algorithm_using_multiple_semifield_S-boxes_based_on_permutation_of_symmetric_group/24999077 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Information and computing sciences Cybersecurity and privacy Mathematical sciences Applied mathematics Statistics Block cipher encryption S-box Statistical analysis Cryptanalysis |
| dc.title.none.fl_str_mv | A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S<sub>8</sub> and establish an effective procedure for generating S<sub>8</sub> semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards, namely bijectivity, non-linearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</p><h2>Other Information</h2><p dir="ltr">Published in: Computational and Applied Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s40314-023-02208-x" target="_blank">https://dx.doi.org/10.1007/s40314-023-02208-x</a></p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_25fd1cb3f0fe64e57a50919f3acdf630 |
| identifier_str_mv | 10.1007/s40314-023-02208-x |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/24999077 |
| publishDate | 2023 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric groupIqtadar Hussain (14147850)Amir Anees (14147853)Temadher Alassiry Al-Maadeed (14147847)Information and computing sciencesCybersecurity and privacyMathematical sciencesApplied mathematicsStatisticsBlock cipher encryptionS-boxStatistical analysisCryptanalysis<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S<sub>8</sub> and establish an effective procedure for generating S<sub>8</sub> semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards, namely bijectivity, non-linearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</p><h2>Other Information</h2><p dir="ltr">Published in: Computational and Applied Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s40314-023-02208-x" target="_blank">https://dx.doi.org/10.1007/s40314-023-02208-x</a></p>2023-02-13T03:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1007/s40314-023-02208-xhttps://figshare.com/articles/journal_contribution/A_novel_encryption_algorithm_using_multiple_semifield_S-boxes_based_on_permutation_of_symmetric_group/24999077CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/249990772023-02-13T03:00:00Z |
| spellingShingle | A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group Iqtadar Hussain (14147850) Information and computing sciences Cybersecurity and privacy Mathematical sciences Applied mathematics Statistics Block cipher encryption S-box Statistical analysis Cryptanalysis |
| status_str | publishedVersion |
| title | A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group |
| title_full | A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group |
| title_fullStr | A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group |
| title_full_unstemmed | A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group |
| title_short | A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group |
| title_sort | A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group |
| topic | Information and computing sciences Cybersecurity and privacy Mathematical sciences Applied mathematics Statistics Block cipher encryption S-box Statistical analysis Cryptanalysis |