Rotation-k Affine-Power-Affine-like Multiple Substitution-Boxes for Secure Communication
نویسندگان
چکیده
Substitution boxes with thorough cryptographic strengths are essential for the development of strong encryption systems. They are the only portions capable of inducing nonlinearity in symmetric encryption systems. Bijective substitution boxes having both high nonlinearities and high algebraic complexities are the most desirable to thwart linear, differential and algebraic attacks. In this paper, a method of constructing algebraically complex and cryptographically potent multiple substitution boxes is proposed. The multiple substitution boxes are synthesized by applying the concept of rotation-k approach on the affine-power-affine structure. It is shown that the rotation-k approach inherits all the features of affine-power-affine structure. Performance assessment of all the proposed substitution boxes is done against nonlinearity, strict avalanche criteria, bits independent criteria, differential probability, linear approximation probability and algebraic complexity. It has been found that the proposed substitution boxes have outstanding cryptographic characteristics and outperform the various recent substitution boxes.
منابع مشابه
Chaotic Dynamic S Boxes Based Substitution Approach for Digital Images
In this paper, we propose an image encryption algorithm based on the chaos, substitution boxes, nonlinear transformation in galois field GF(2 8 ) and Latin square. Initially, the dynamic S-boxes are generated using Fisher-Yates shuffle method and piece-wise linear chaotic map. The algorithm utilizes advantages of keyed Latin square and affine-power-affine transformation to substitute highly cor...
متن کاملA New S-box Structure Named Affine-power-affine
In this paper, we consider the problem of the simple algebraic structure of the Advanced Encryption Standard (AES) S-box, in which only 9 terms are involved in the algebraic expression, while its inverse S-box involves 255 terms. By resolving the reason why the algebraic expressions of AES-like S-boxes are so simple, the upper bound of items involved in the algebraic expressions of AES-like S-b...
متن کاملAES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)
In [eprint.iacr.org/2012/663] method of virtual isomorphisms of ciphers was applied for differential/linear cryptanalysis of AES. It was shown that AES seems to be weak against those attacks. That result can be generalized to AES-like ciphers, which diffusion map is a block matrix, and its block size is the same as the S-box size. S-box is possibly weak if it is affine equivalent to a substitut...
متن کاملA Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms
This paper presents two algorithms for solving the linear and the affine equivalence problem for arbitrary permutations (S-boxes). For a pair of n×n-bit permutations the complexity of the linear equivalence algorithm (LE) is O(n2). The affine equivalence algorithm (AE) has complexity O(n2). The algorithms are efficient and allow to study linear and affine equivalences for bijective S-boxes of a...
متن کاملOn Analytical Study of Self-Affine Maps
Self-affine maps were successfully used for edge detection, image segmentation, and contour extraction. They belong to the general category of patch-based methods. Particularly, each self-affine map is defined by one pair of patches in the image domain. By minimizing the difference between these patches, the optimal translation vector of the self-affine map is obtained. Almost all image process...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1607.05024 شماره
صفحات -
تاریخ انتشار 2016