majority logic criterion
Recently Published Documents


TOTAL DOCUMENTS

6
(FIVE YEARS 1)

H-INDEX

3
(FIVE YEARS 0)

2021 ◽  
Vol 8 (3) ◽  
pp. 30-35
Author(s):  
Razzaque et al. ◽  

For the evaluation of the substitution boxes, the majority logic criterion is used to analyze the statistical strength of the existing substitution boxes. The main objective of this paper is to make a decision on the analysis and selection of the most appropriate S-box based on a fuzzy soft-aggregation operator. Instead of the usual practice in which a single parameter is considered, we are considering several parameters that will definitely give us a comprehensive analysis of the S-boxes.


Cryptography ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 13
Author(s):  
Tariq Shah ◽  
Ayesha Qureshi

In substitution–permutation network as a cryptosystem, substitution boxes play the role of the only nonlinear part. It would be easy for adversaries to compromise the security of the system without them. 8-bit S-boxes are the most used cryptographic components. So far, cryptographers were constructing 8-bit S-boxes used in cryptographic primitives by exhaustive search of permutations of order 256. However, now for cryptographic techniques with 8-bit S-boxes as confusion layers, researchers are trying to reduce the size of S-box by working with a small unit of data. The aim is to make the techniques compact, fast and elegant. The novelty of this research is the construction of S-box on the elements of the multiplicative subgroup of the Galois field instead of the entire Galois field. The sturdiness of the proposed S-box against algebraic attacks was hashed out by employing the renowned analyses, including balance, nonlinearity, strict avalanche criterion, and approximation probabilities. Furthermore, the statistical strength of the S-box was tested by the majority logic criterion. The fallouts show that the S-box is appropriate for applications for secure data communications. The S-box was also used for watermarking of grayscale images with good outcomes.


Cryptography ◽  
2019 ◽  
Vol 3 (1) ◽  
pp. 6 ◽  
Author(s):  
Yasir Naseer ◽  
Tariq Shah ◽  
Dawood Shah ◽  
Sadam Hussain

The role of substitution boxes is very important in block ciphers. Substitution boxes are utilized to create confusion in the cryptosystem. However, to create both confusion and diffusion in any cryptosystem p-boxes and chaos base substitution boxes are designed. In this work, a simple method is presented that serves both ways. This method is based on composition of the action of symmetric group on Galois field and inversion map. This construction method provides a large number of highly non-linear substitution permutation boxes having the property of confusion as well as diffusion. These substitution permutation boxes have all the cryptography properties. Their utilization in the image encryption application is measured by majority logic criterion. We named these newly designed substitution boxes (S-boxes) as substitution permutation boxes (S-p-boxes), because they serve as both substitution boxes (S-boxes) as well as permutation boxes (p-boxes).


2013 ◽  
Vol 68 (8-9) ◽  
pp. 567-572 ◽  
Author(s):  
Tariq Shah ◽  
Attiq Qamar ◽  
Iqtadar Hussain

In this paper, we construct a new substitution box (S-box) structure based on the elements of the maximal cyclic subgroup of the multiplicative group of units in a finite Galois ring instead of Galois field. We analyze the potency of the proposed S-box by using the majority logic criterion. Moreover, we illustrate the utility of the projected S-box in watermarking.


2012 ◽  
Vol 67 (5) ◽  
pp. 282-288 ◽  
Author(s):  
Iqtadar Hussain ◽  
Tariq Shah ◽  
Muhammad Asif Gondal ◽  
Hasan Mahmood

The majority logic criterion is applicable in the evaluation process of substitution boxes used in the advanced encryption standard (AES). The performance of modified or advanced substitution boxes is predicted by processing the results of statistical analysis by the majority logic criteria. In this paper, we use the majority logic criteria to analyze some popular and prevailing substitution boxes used in encryption processes. In particular, the majority logic criterion is applied to AES, affine power affine (APA), Gray, Lui J, residue prime, S8 AES, Skipjack, and Xyi substitution boxes. The majority logic criterion is further extended into a generalized majority logic criterion which has a broader spectrum of analyzing the effectiveness of substitution boxes in image encryption applications. The integral components of the statistical analyses used for the generalized majority logic criterion are derived from results of entropy analysis, contrast analysis, correlation analysis, homogeneity analysis, energy analysis, and mean of absolute deviation (MAD) analysis.


Sign in / Sign up

Export Citation Format

Share Document