scholarly journals S-Box on Subgroup of Galois Field

Cryptography ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 13
Author(s):  
Tariq Shah ◽  
Ayesha Qureshi

In substitution–permutation network as a cryptosystem, substitution boxes play the role of the only nonlinear part. It would be easy for adversaries to compromise the security of the system without them. 8-bit S-boxes are the most used cryptographic components. So far, cryptographers were constructing 8-bit S-boxes used in cryptographic primitives by exhaustive search of permutations of order 256. However, now for cryptographic techniques with 8-bit S-boxes as confusion layers, researchers are trying to reduce the size of S-box by working with a small unit of data. The aim is to make the techniques compact, fast and elegant. The novelty of this research is the construction of S-box on the elements of the multiplicative subgroup of the Galois field instead of the entire Galois field. The sturdiness of the proposed S-box against algebraic attacks was hashed out by employing the renowned analyses, including balance, nonlinearity, strict avalanche criterion, and approximation probabilities. Furthermore, the statistical strength of the S-box was tested by the majority logic criterion. The fallouts show that the S-box is appropriate for applications for secure data communications. The S-box was also used for watermarking of grayscale images with good outcomes.

Cryptography ◽  
2019 ◽  
Vol 3 (1) ◽  
pp. 6 ◽  
Author(s):  
Yasir Naseer ◽  
Tariq Shah ◽  
Dawood Shah ◽  
Sadam Hussain

The role of substitution boxes is very important in block ciphers. Substitution boxes are utilized to create confusion in the cryptosystem. However, to create both confusion and diffusion in any cryptosystem p-boxes and chaos base substitution boxes are designed. In this work, a simple method is presented that serves both ways. This method is based on composition of the action of symmetric group on Galois field and inversion map. This construction method provides a large number of highly non-linear substitution permutation boxes having the property of confusion as well as diffusion. These substitution permutation boxes have all the cryptography properties. Their utilization in the image encryption application is measured by majority logic criterion. We named these newly designed substitution boxes (S-boxes) as substitution permutation boxes (S-p-boxes), because they serve as both substitution boxes (S-boxes) as well as permutation boxes (p-boxes).


Entropy ◽  
2020 ◽  
Vol 22 (7) ◽  
pp. 717 ◽  
Author(s):  
Musheer Ahmad ◽  
Eesa Al-Solami

Static substitution-boxes in fixed structured block ciphers may make the system vulnerable to cryptanalysis. However, key-dependent dynamic substitution-boxes (S-boxes) assume to improve the security and robustness of the whole cryptosystem. This paper proposes to present the construction of key-dependent dynamic S-boxes having high nonlinearity. The proposed scheme involves the evolution of initially generated S-box for improved nonlinearity based on the fractional-order time-delayed Hopfield neural network. The cryptographic performance of the evolved S-box is assessed by using standard security parameters, including nonlinearity, strict avalanche criterion, bits independence criterion, differential uniformity, linear approximation probability, etc. The proposed scheme is able to evolve an S-box having mean nonlinearity of 111.25, strict avalanche criteria value of 0.5007, and differential uniformity of 10. The performance assessments demonstrate that the proposed scheme and S-box have excellent features, and are thus capable of offering high nonlinearity in the cryptosystem. The comparison analysis further confirms the improved security features of anticipated scheme and S-box, as compared to many existing chaos-based and other S-boxes.


Author(s):  
Michael D. Matthews ◽  
Silas G. Martinez ◽  
Jarle Eid ◽  
Bjorn Helge Johnsen ◽  
Ole Christian Boe

The Situation Awareness Behavioral Rating Scale (SABARS) utilizes ratings by expert observer/controllers (O/Cs) to evaluate situation awareness (SA) of infantry small unit leaders. Previous research (Matthews et al., 2004) showed SABARS to be predictive of a variety of performance measures. The current study explored the question of whether small unit leaders could use SABARS to accurately rate their own behavior as an index of their SA. To evaluate this question, 12 Norwegian Army and Navy Academy cadets participating in the role of squad leader during summer training exercises were given the SABARS to complete following an infantry mission. An experienced officer O/C observed the cadets though the execution of the mission and also provided SABARS ratings on the squad leader. Results indicated that “self-SABARS” evaluations did not correlate with SABARS completed by O/C's, and were not predictive of performance criteria. O/C-completed SABARS were, however, predictive of performance criteria thus replicating findings reported previously (Matthews et al., 2004). Implications for assessing SA in the field are discussed.


Author(s):  
Hari Murti ◽  
Endang Lestariningsih ◽  
Rara Sriartati Redjeki ◽  
Eka Ardhianto

The rapid technological revolution had an impact on a variety of information security techniques. This will be important because information can be confidential to some entities that communicate with each other. Internet in intelligent technology will be a loophole for cryptanalysts to look for information vulnerabilities. Cryptography is a method of securing data and information which is currently still supported by the development of the method. However, the data and information that are secured will still have vulnerabilities in their delivery. The combination of fuzzy logic techniques with cryptographic techniques has been applied to support the improvement of information security. This study applies a systematic literature review method, to find articles that combine the two fields. The purpose of this study is to see the development of information security techniques with a fuzzy logic approach. As a result, it is found that the development of cryptographic and steganographic techniques that utilize fuzzy logic to help improve information security. In addition, the use of fuzzy logic is also not limited to increasing security. Fuzzy logic also plays a role in selecting the best key and password and issuing random numbers from a Pseudo-Random Number Generator (PRNG).


2017 ◽  
Author(s):  
Sankhanil Dey ◽  
Ranjan Ghosh

Substitution Box or S-Box had been generated using 4-bit Boolean Functions (BFs) for Encryption and Decryption Algorithm of Lucifer and Data Encryption Standard (DES) in late sixties and late seventies respectively. The S-Box of Advance Encryption Standard have also been generated using Irreducible Polynomials over Galois field GF(28) adding an additive constant in early twenty first century. In this paper Substitution Boxes have been generated from Irreducible or Reducible Polynomials over Galois field GF(pq). Binary Galois fields have been used to generate Substitution Boxes. Since the Galois Field Number or the Number generated from coefficients of a polynomial over a particular Binary Galois field (2q) is similar to log2q+1 bit BFs. So generation of log2q+1 bit S-Boxes is possible. Now if p = prime or non-prime number then generation of S-Boxes is possible using Galois field GF (pq ), where q = p-1.


Author(s):  
Sankhanil Dey ◽  
Ranjan Ghosh

In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance in modern cryptography. In this paper, a detailed review of cryptographic properties of S-boxes has been illustrated. The generation of crypto S-boxes with 4-bit as well as 8-bit Boolean functions (BFs) and Polynomials over Galois field GF(p q ) has also been of keen interest of this paper. The detailed analysis and comparisonof generated 4-bit and 8-bit S-boxes with 4-bit as well as 8-bit S-boxes of Data Encryption Standard (DES) and Advance Encryption Standard (AES) respectively, has incorporated with example. Detailed analysis of generated S-boxes claims a better result than DES and AES in view of security of crypto S-boxes.


2021 ◽  
Vol 20 ◽  
pp. 24-36
Author(s):  
Nabilah Abughazalah ◽  
Majid Khan

The basic requirement by adding confusion is to ensure the confidentiality of the secret information. In the present article, we have suggested new methodology for the construction of nonlinear confusion component. This confusion component is used for enciphering the secret information and hiding it in a cover medium by proposed scheme. The proposed scheme is based on ring structure instead of Galois field mechanism. To provide multi-layer security, secret information is first encrypted by using confusion component and then utilized three different substitution boxes (S-boxes) to hide into the cover medium


2017 ◽  
Author(s):  
Sankhanil Dey ◽  
Ranjan Ghosh

Substitution Box or S-Box had been generated using 4-bit Boolean Functions (BFs) for Encryption and Decryption Algorithm of Lucifer and Data Encryption Standard (DES) in late sixties and late seventies respectively. The S-Box of Advance Encryption Standard have also been generated using Irreducible Polynomials over Galois field GF(28) adding an additive constant in early twenty first century. In this paper Substitution Boxes have been generated from Irreducible or Reducible Polynomials over Galois field GF(pq). Binary Galois fields have been used to generate Substitution Boxes. Since the Galois Field Number or the Number generated from coefficients of a polynomial over a particular Binary Galois field (2q) is similar to log2q+1 bit BFs. So generation of log2q+1 bit S-Boxes is possible. Now if p = prime or non-prime number then generation of S-Boxes is possible using Galois field GF (pq ), where q = p-1.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3750-3754

Mobile Ad hoc Network, an infrastructure-less network is emerging as one of the major dynamic areas of communication. Due to the rapid increase in the moveable devices, an appreciable growth in wireless network is witnessed in the recent years. As the network is growing, the number of intruders is also rising to find a loophole in the security of network to achieve their evil means. So the network is prone to a large amount of attacks like wormhole attack, black hole attack, malicious node attack etc. In order to alleviate such attacks, security measures should be strong enough to combat. The objective of this paper is to study the cryptographic techniques implemented on Mobile Ad hoc Network in order to provide security to the foundation-less systems. Year-wise distribution of the cryptographic approach implementation has been presented and analysis has been made in terms of existing implementation and future work that necessitates its efficacious implementation.


Sign in / Sign up

Export Citation Format

Share Document