Rotation-k Affine-Power-Affine-like Multiple Substitution-Boxes for Secure Communication

نویسندگان

  • Musheer Ahmad
  • Hamed D. Al-Sharari
چکیده

Substitution boxes with thorough cryptographic strengths are essential for the development of strong encryption systems. They are the only portions capable of inducing nonlinearity in symmetric encryption systems. Bijective substitution boxes having both high nonlinearities and high algebraic complexities are the most desirable to thwart linear, differential and algebraic attacks. In this paper, a method of constructing algebraically complex and cryptographically potent multiple substitution boxes is proposed. The multiple substitution boxes are synthesized by applying the concept of rotation-k approach on the affine-power-affine structure. It is shown that the rotation-k approach inherits all the features of affine-power-affine structure. Performance assessment of all the proposed substitution boxes is done against nonlinearity, strict avalanche criteria, bits independent criteria, differential probability, linear approximation probability and algebraic complexity. It has been found that the proposed substitution boxes have outstanding cryptographic characteristics and outperform the various recent substitution boxes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chaotic Dynamic S Boxes Based Substitution Approach for Digital Images

In this paper, we propose an image encryption algorithm based on the chaos, substitution boxes, nonlinear transformation in galois field GF(2 8 ) and Latin square. Initially, the dynamic S-boxes are generated using Fisher-Yates shuffle method and piece-wise linear chaotic map. The algorithm utilizes advantages of keyed Latin square and affine-power-affine transformation to substitute highly cor...

متن کامل

A New S-box Structure Named Affine-power-affine

In this paper, we consider the problem of the simple algebraic structure of the Advanced Encryption Standard (AES) S-box, in which only 9 terms are involved in the algebraic expression, while its inverse S-box involves 255 terms. By resolving the reason why the algebraic expressions of AES-like S-boxes are so simple, the upper bound of items involved in the algebraic expressions of AES-like S-b...

متن کامل

AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)

In [eprint.iacr.org/2012/663] method of virtual isomorphisms of ciphers was applied for differential/linear cryptanalysis of AES. It was shown that AES seems to be weak against those attacks. That result can be generalized to AES-like ciphers, which diffusion map is a block matrix, and its block size is the same as the S-box size. S-box is possibly weak if it is affine equivalent to a substitut...

متن کامل

A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms

This paper presents two algorithms for solving the linear and the affine equivalence problem for arbitrary permutations (S-boxes). For a pair of n×n-bit permutations the complexity of the linear equivalence algorithm (LE) is O(n2). The affine equivalence algorithm (AE) has complexity O(n2). The algorithms are efficient and allow to study linear and affine equivalences for bijective S-boxes of a...

متن کامل

On Analytical Study of Self-Affine Maps

Self-affine maps were successfully used for edge detection, image segmentation, and contour extraction. They belong to the general category of patch-based methods. Particularly, each self-affine map is defined by one pair of patches in the image domain. By minimizing the difference between these patches, the optimal translation vector of the self-affine map is obtained. Almost all image process...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1607.05024  شماره 

صفحات  -

تاریخ انتشار 2016