999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Mathematical Approach for Generating a Highly Non-Linear Substitution Box Using Quadratic Fractional Transformation

2023-12-15 03:58:08AbidMahboobMuhammadAsifRanaMuhammadZulqarnainImranSaddiqueHijazAhmadandSamehAskar
Computers Materials&Continua 2023年11期

Abid Mahboob,Muhammad Asif,Rana Muhammad Zulqarnain,Imran Saddique,Hijaz Ahmad and Sameh Askar

1Department of Mathematics,Division of Science and Technology,University of Education,Lahore,Pakistan 2Department of Mathematics,University of Management and Technology,Sialkot Campus,51310,Pakistan

3School of Mathematical Sciences,Zhejiang Normal University,Jinhua,321004,China

4Department of Mathematics,University of Management and Technology,Lahore,54770,Pakistan

5Section of Mathematics,International Telematic University Uninettuno,Corso Vittorio Emanuele II,Roma,39-00186,Italy

6Department of Statistics and Operations Research,College of Science,King Saud University,P.O.Box 2455,Riyadh,11451,Saudi Arabia

ABSTRACT Nowadays,one of the most important difficulties is the protection and privacy of confidential data.To address these problems,numerous organizations rely on the use of cryptographic techniques to secure data from illegal activities and assaults.Modern cryptographic ciphers use the non-linear component of block cipher to ensure the robust encryption process and lawful decoding of plain data during the decryption phase.For the designing of a secure substitution box (S-box),non-linearity (NL) which is an algebraic property of the S-box has great importance.Consequently,the main focus of cryptographers is to achieve the S-box with a high value of non-linearity.In this suggested study,an algebraic approach for the construction of 16×16 S-boxes is provided which is based on the fractional transformation and finite field.This technique is only applicable for the even number exponent in the range(2-254)that are not multiples of 4.Firstly,we choose a quadratic fractional transformation,swap each missing element with repeating elements,and acquire the initial S-box.In the second stage,a special permutation of the symmetric group S256 is utilized to construct the final S-box,which has a higher NL score of 112.75 than the Advanced Encryption Standard(AES)S-box and a lower linear probability score of 0.1328.In addition,a tabular and graphical comparison of various algebraic features of the created S-box with many other S-boxes from the literature is provided which verifies that the created S-box has the ability and is good enough to withstand linear and differential attacks.From different analyses,it is ensured that the proposed S-boxes are better than as compared to the existing S-boxes.Further these S-boxes can be utilized in the security of the image data and the text data.

KEYWORDS Block cipher;S-box;data security;fractional transformation

1 Introduction

The amount of data being exchanged has risen substantially as a result of recent technology advancements and its successful use in daily life.The confidential nature of data necessitates the development of tools and safeguards against misuse.Data from a user must be altered before transmission so that an attacker cannot understand it.Symmetric block ciphers have become among the most extensively utilized approaches for such purposes given their ease of implementation and able to give much-required encryption security[1,2].By utilizing a symmetric key and a varied number of several rounds,one common sort of block cipher converts an input block of data into a nonsensical output block via substitution and permutation techniques.On the input block of data,substitution,and permutation operations are typically performed in each cycle.A replacement process uses a substitution box(S-box)to swap out an input block with another output block[3].The most widely used symmetric block cipher is AES,as an illustration.

S-box is a Vectorial Boolean function that is defined mathematically as,φ:which maps theuinput bit into thevoutput bit.As a crucial part of modern block ciphers,an Sbox creates a randomized cipher text from the input plaintext.The single nonlinear component of contemporary block ciphers is the S-box,which provides a complicated link between the plaintext and the cipher text.The algebraic and statistical features of the S-box,such as non-linearity,Bit Independent Criterion (BIC),Strict Avalanche Criterion (SAC),Differential Uniformity (DU),and Linear Approximation Probability (LAP) are used to assess its validity.Numerous methods and technologies are used throughout literature to create securely powerful Substitution-boxes.A method to create robust and resistant S-boxes that can help in the modification of block cryptosystems was proposed by Dragomir et al.[4].The authors of[5]proposed a novel S-box constructed system using group theory ideas.Reference [6] Describes a unique genetic approach for evolving S-boxes with high non-linearity scores.Artu?ger et al.[7] present a new technique for improving the performance of Chaos-Based S-boxes.They have implemented their system on a large number of S-boxes.In [8],an efficient algebraic approach for evolving S-boxes with reasonable strength is presented.Particle Swarm Optimization was used by Musheer et al.[9] to generate a robust S-box.In [10],an efficient S-box with essentially optimum characteristics was created.For this,the authors used a methodical group theoretical method.Javeed et al.[11]created an S-box with outstanding cryptographic features using a freshly created chaotic map and the suitable S256component.In [12],Khan et al.created an S-box utilizing (Difference Distribution Table) DDT and a chaotic logistic map.In contrast to previously established S-boxes based on chaos,it was a significant effort to generate an S-box that had an extremely low value of differential approximation probability.To construct an S-box that has excellent cryptographic features,Ahmad et al.[13] suggested a unique approach that utilizes artificial bee colony optimization and chaotic maps.A unique method to build safe S-boxes using the fractional-order chaotic Chen scheme was put out by ?zkaynak et al.[14].To ensure the accuracy of Chen scheme’s numerical findings,they used the predictor-corrector approach.It is a straightforward approach for creating an S-box using Chen’s fractional-order chaotic Chen scheme.By utilizing Lorenz equations,Khan et al.[15]established a novel S-box method of construction.To develop a robust Sbox,Ahmad et al.looked at the traveling salesman problem and piecewise linear chaotic map [16].Five strong S-boxes were created by Ullah et al.[17] using a chaotic map and a linear fractional transformation (LFT).Different techniques are utilized for the construction of S-boxes and other techniques to solve different model issues[18-29].

This article is a continuation of the work done by Mahboob et al.[30] to create an S-box using a Quantic Fractional Transformation and finite field.They used the mappingQ(x)=to construct a reliable S-box in their research,although it was only effective for odd values of m in the range of(0-255),and the authors also demonstrated that this mapping is bijective for odd values of m but there is no construction of S-boxes is available in literature which uses the fractional transformationwhenm∈{2+4n|0 ≤n≤63}since the proposed mapping is not bijective in this fashion.We provide a unique approach for the creation of S-boxes utilizing this fractional transformation and usem=2 for an example to create a specimen S-box in this paper.By changing the value of m,we may create several S-boxes.The following is the main contribution of our study in this paper:

1.An innovative and simple fractional transformation is defined for the construction of S-boxes.By altering their parameters,a large number of S-boxes can be constructed using this technique.

2.We use the Quadratic Fractional Transformation(QFT)as an illustration to create a specimen S-box by maintaining the value ofm=2.

3.To boost the unpredictability of the first S-box,suitable permutations of the symmetric group were utilized,and the suggested S-box was constructed whose average nonlinearity is 112.75 which is greater than AES S-box.

4.Additionally,visual and tabular comparisons of various algebraic analyses,including NL,BIC,DU,SAC,and LAP of the proposed S-box,were used,and a comparison of these results with the other S-boxes established in literature is presented to demonstrate that the suggested S-box is capable of withstanding linear and differential attacks.

The remainder of the paper is arranged as follows:Section 2 delves into the algebraic structure of the S-box’s construction.In Section 3,the constructed S-box is examined through its security analysis,and its results are compared with those of other S-boxes.In Section 4,we illustrate the discussion of our results and discuss our findings.Finally,Section 5 concludes the study.

2 Mathematical Structure

Step 1:To begin,let us define a fractional transformation,Q: Z257→Z257as[30]:

whereα∈Z257-{0},β∈Z257,&m∈{2+4n|0 ≤n≤63}.

This Eq.(1)is taken from[30].

Given that a bijective 16×16 S-box is essentially any rearrangement of the numbers(0-255).The Prime Field Z257is frequently used to ensure that all outputs remain within this range.Due to this,we restrict the parametersαandβ.These parameters allow for the creation of a vast number of S-boxes because each adjustment to one of the parameters results in the creation of a new S-box that differs from the previous ones.

Here we choosem=2,α=57 &β=24 to generate a specimen substitution box,then the quadratic fractional transformation(QFT)becomes:

After that,put all the elements from Z257into Eq.(2)and then write the outputs in a set W obtained from the quadratic fractional transformation after solving undermod257.

W={Q(z)|z∈Z257}

Since it is to be noted that the set W may include the number 256 but never have 0 we deducted 1 from each element of the set W to maintain the range(0-255).

Finally,to keep the S-box bijective,we put all missing numbers from(0-255)in ascending order in set{u1,u2,...,un}and duplicated numbers from(0-255)in descending order in set{v1,v2,...,vn}and replace everyujbyvjforj=1,2,...,n.

Table 1 explains the above method for eradicating the sequence{0,1,2,3,...,255}.After destroying the initial sequence of numbers {0,1,2,...,255},we retrieved our initial S-box 16 × 16 matrix present in Table 2,whose average nonlinearity is 103.25.

Table 1: Initial S-box construction based on quadratic fractional transformation

Table 2: Initial S-box

Step 2: To improve the random nature of our constructed S-box,we utilized a permutation of symmetric groupS256(shown in Table 3)to modify the location of the S-box’s elements and generated a proposed S-box(shown in Table 4)with a mean non-linearity value of 112.75.

Table 3: Permutation of S256

Table 4: Proposed S-box

3 Security Analysis

In this part,we assess the cryptographic performance of recommended S-box(provided in Table 4)to generally recognized traditional S-box performance criteria.Five essential evaluations are utilized to assess the resilience of the S-box:nonlinearity,linear approximation probability,bit independence criterion,differential approximation probability,and strict avalanche criterion.We achieve fantastic results,which shows the high quality of the planned design.

3.1 Nonlinearity(NL)

This is a critical factor for determining the efficacy of S-box in contrast to linear and differential cryptanalysis.Pieprzyk and Finkelstein introduced this test in 1988 [31].The nonlinearity ofZ2,whereψis a Boolean function ofnvariables is defined as the minimum distance amongψand the set of affine transformationsAn.

Accordingly,the NL score is 0 when all affine transformations are linear.Forn×nS-box,the highest value of NL is,Thus,the ideal value of NL overGF(28)is 120 in AES.The high NL value of the S-box is a crucial component for creating a good cryptosystem.The recommended S-box has a minimum value of nonlinearity is 112,the maximum value of nonlinearity is 114,and the mean value of nonlinearity is 112.75.Table 5 displayed the NL scores for 8 Boolean functions,and Fig.1 contrasts the mean NL number of the final S-box with those of numerous other S-boxes.

Table 5: Nonlinearity score of proposed S-box

Fig.1 shows the comparison of non-linearity of our purposed S-box and existing S-boxes.The non-linearity is the very important and main component to check the strength of S-box.So,from Fig.1,it is ensured that our S-box have average non-linearity 112.75 which is higher than other existing S-boxes.

Figure 1:Analysis of mean NL score of suggested S-box with various S-boxes

3.2 Strict Avalanche Criterion(SAC)

In[32],Webster et al.suggested this essential algebraic criterion of S-box.SAC shows that output bits changed byof probability or 50%if a single bit changes in the input result.S-box is considered strong against cryptanalyst attacks whose SAC value is 0.5.The SAC criterion is conducted by using a dependency matrix.The SAC value of the suggested S-box is present in Table 6,which is close to the ideal value of SAC.

Table 6: SAC values

3.3 Bit Independence Criterion(BIC)

This is another relevant criterion for measuring the strength of the S-box,which is defined as the two output bits changing independently when any single input is modified.Webster et al.[32]presented BIC as an effective criterion in symmetric cryptosystems.Table 7 shows the BIC Non-linearity values of the proposed S-box.

Table 7: BIC nonlinearity values

Table 8 provide the BIC-SAC values for the final S-box.

Table 8: BIC SAC values

Table 9 and Fig.2 provide a comparison of the BIC NL and BIC SAC values of the proposed S-box with existing S-boxes.

Table 9: Analysis between SAC and BIC-NL scores of suggested S-box and other S-boxes

Figure 2:Analysis among BIC-SAC values of proposed S-box with other S-boxes

3.4 Differential Uniformity(DU)

Biham et al.[48] devised this test.To overcome differential assaults,a low value of differential uniformity (DU) is proposed,and S-box is deemed more secure.Eq.(4) provides a mathematical formula for calculating the DU.

whereM={0,1,2,...,255},ΔsandΔrdenote output and input differentials respectively,ψis a Boolean function and the symbol ⊕represents the XOR operation.Table 10 depicts the suggested S-box’s differential distribution table.The maximum DU score of the suggested S-box is 12 and the differential probability(DP)value is 0.0468.This low DP score demonstrated that the S-box is highly resistant to differential assaults.Table 11 compares DU with several S-boxes,and Fig.3 depicts a graphical comparison of the suggested S-box’s DP values with those of previously developed S-boxes in the literature.

Table 11: Analysis between DU and LAP scores of recommended S-boxes with some other S-boxes

Figure 3:Pie chart of DP values of recommended S-box with some other S-boxes

3.5 Linear Approximation Probability(LAP)

LAP criterion is used to check the strength and resistance of the S-box to linear assaults.In[49],Matsui provided this algebraic feature of S-box.The S-box is considered more secure whenever the value of LAP is smaller.A mathematical formula to calculate LAP is:

whereλpandλqdenote the input and output mask,respectively,2nis the total number of elements of the S-box andψrepresents the Boolean functions.The LAP value of the created S-box is 0.13281.Table 11 indicates the comparison among the LAP scores of the suggested S-box and various other S-boxes.

4 Results and Discussion

Researchers’major emphasis for the creation of powerful substitution boxes is a significant nonlinearity score.Our S-box has a mean nonlinearity of 112.75,which is higher than the AES Sbox as well as the other S-boxes from the literature shown in Table 6.

1.The S-box creators’ultimate goal is to obtain the ideal SAC value of 0.5.Our S-box has a SAC score of 0.4973,which is close to 0.5 when contrasted to other S-boxes in Table 10.We can claim that our S-box is impervious to cryptanalysis.

2.The proposed S-box BIC NL and BIC SAC scores are 103.64 and 0.501,respectively.Table 9 and Fig.2 provide a comparison of the values of BIC NL and BIC SAC.

3.Low DP S-boxes are resilient to different types of attacks.The DP score of the created S-box in Fig.3 is 0.0468,which is lower than the DP numbers of many other S-boxes.

4.The recommended S-box’s LAP value is 0.13281.This low value implies that the proposed Sbox is resistant to linear assaults.Table 11 compares the LAP value of created S-box to that of other S-boxes.

5 Conclusion

In this study an algebraic strategy for generating the substitution boxes was introduced.This methodology depends on fractional transformation and finite field.We designed a general form of transformation and choose quadratic fraction transformation as an example to generate an S-box.The nonlinearity of the proposed S-box after applying the permutations ofS256is 112.75 which is higher than AES S-box.The other algebraic properties of the S-box are good enough to stand against linear and differential approaches.The comparison between the algebraic and statistical properties of our S-box with many other S-boxes from the literature indicates that the recommended S-box withstands cryptanalysis attacks and can be used further to improve a security.Although a static prototype Sbox is created in this study,it will be feasible to create dynamic S-boxes in the future by utilizing the suggested mathematical methodology,which will enable the creation of a robust and effective cryptosystem that will safeguard sensitive and private data.

6 Limitation

This study develops a fractional transformation for creating substitution boxes that are applied to even values ofmwhenm={2,6,10,...,254} and we simply swap each missing element with a repeating element to keep the S-box bijective.If m is a multiple of 4,it is impossible to construct an S-box and it is impossible to maintain the bijectivity of the S-box because elements repeat more than once.

Acknowledgement:The authors would like to thanks for supporting the funding of this paper under the “Research Supporting Project Number (RSP2023R167),King Saud University,Riyadh,Saudi Arabia”.

Funding Statement:The authors received the funding for this study from King Saud University,Riyadh,Saudi Arabia under the research supporting project Number RSP 2023R167.Sameh Askar received this grant from King Saud University.

Conflicts of Interest:The authors declares that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 婷婷色狠狠干| 中文字幕丝袜一区二区| 国产精品女人呻吟在线观看| a毛片在线播放| 无码专区在线观看| 国产自视频| 久久99这里精品8国产| 午夜一级做a爰片久久毛片| 亚洲天堂免费在线视频| 114级毛片免费观看| 精品国产一二三区| 国产亚洲精久久久久久久91| 天天色天天综合网| 亚洲日韩Av中文字幕无码| 亚洲一区毛片| 亚洲成人福利网站| 国产福利微拍精品一区二区| 91精品综合| 欧美黄网在线| 免费无码AV片在线观看国产| 97久久免费视频| 久草国产在线观看| 亚洲AV无码不卡无码| 亚洲三级影院| 色婷婷亚洲综合五月| 播五月综合| 国产精品第一区在线观看| 国产精品.com| 99在线视频网站| 国产亚洲欧美在线中文bt天堂 | 最新国产精品第1页| 国产一级在线播放| av在线手机播放| 久久久久久久久18禁秘 | 欧美曰批视频免费播放免费| 黄片一区二区三区| 欧美国产日韩在线| 久久精品欧美一区二区| 99热亚洲精品6码| 婷婷激情亚洲| 国产亚洲精品资源在线26u| 国产精欧美一区二区三区| 国产精品观看视频免费完整版| 亚洲永久精品ww47国产| 91麻豆国产视频| 午夜激情福利视频| 精品五夜婷香蕉国产线看观看| 色婷婷综合激情视频免费看| 精品国产香蕉伊思人在线| 国产精品视频久| 四虎影视永久在线精品| 欧美精品成人一区二区在线观看| 国产成人高清精品免费软件 | 国产精品美女在线| 国产欧美日韩在线在线不卡视频| 中国一级特黄视频| 美女无遮挡免费网站| 91精品小视频| 婷婷中文在线| 激情無極限的亚洲一区免费| 亚洲精品图区| 日本亚洲国产一区二区三区| 九色视频一区| 欧美日韩成人在线观看| 性激烈欧美三级在线播放| 欧美中日韩在线| 女人18毛片水真多国产| 黄色网页在线观看| 久久久久久久久18禁秘| 特黄日韩免费一区二区三区| 国产精品自在在线午夜| 欧美日韩中文字幕二区三区| 色婷婷狠狠干| 久久精品欧美一区二区| 国产精品 欧美激情 在线播放 | 国产剧情一区二区| 最新亚洲人成无码网站欣赏网| 国产乱人伦偷精品视频AAA| 奇米影视狠狠精品7777| 成人无码一区二区三区视频在线观看| 91蜜芽尤物福利在线观看| 无码福利视频|