999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Nonlinear Components of a Block Cipher over Eisenstein Integers

2024-01-12 03:47:40MohammadMazyadHazzaziMuhammadSajjadZaidBassfarTariqShahandAshwagAlbakri
Computers Materials&Continua 2023年12期

Mohammad Mazyad Hazzazi ,Muhammad Sajjad ,Zaid Bassfar ,Tariq Shah,? and Ashwag Albakri

1Department of Mathematics,College of Science,King Khalid University,Abha,61413,Saudi Arabia

2Department of Mathematics,Quaid-I-Azam University,Islamabad,45320,Pakistan

3Department of Information Technology,University of Tabuk,Tabuk,71491,Saudi Arabia

4Department of Computer Science,College of Computer Science&Information Technology,Jazan University,Jazan,45142,Saudi Arabia

ABSTRACT In block ciphers,the nonlinear components,also known as substitution boxes(S-boxes),are used with the purpose to induce confusion in cryptosystems.For the last decade,most of the work on designing S-boxes over the points of elliptic curves,chaotic maps,and Gaussian integers has been published.The main purpose of these studies is to hide data and improve the security levels of crypto algorithms.In this work,we design pair of nonlinear components of a block cipher over the residue class of Eisenstein integers(EI).The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters.However,in the same way,by taking three fixed parameters only one S-box is obtained through a prime field-dependent Elliptic curve(EC),chaotic maps,and Gaussian integers.The newly designed pair of S-boxes are assessed by various tests like nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability.

KEYWORDS Eisenstein integers;residue class of Eisenstein integers;block cipher;S-boxes;analysis of S-boxes

1 Introduction

Cryptography was widely used in military,diplomatic,and government applications until the 1970s.In the 1980s,the telecommunications and financial industries installed hardware cryptographic devices.The mobile phone system was the first cryptographic application in the late 1980s.Nowadays,everyone uses cryptographic applications in their daily lives.Our daily lives commonly depend on the secure transmission of information and data.Online shopping,cell phone messages and calls,ATMs,electronic mail,facsimile,wireless media,and data transfer over the internet all require a system to maintain the secrecy and integrity of private information.Cryptography offers a mechanism for everyone to interact safely in a hostile environment.Sensitive data is significantly aided by cryptography.Communication is encrypted to guarantee that its meaning is hidden,preventing anybody who reads it from understanding something regarding it unless somebody else manages to decrypt it[1].

In cryptography,the S-box is crucial for ensuring secure communication.Shannon suggested the notion of an S-box in 1949 in [2].S-boxes serve a pivotal role in causing confusion within the data.According to Shannon,concealing the relationship between the key and cipher text is referred to as confusion,while concealing the statistical link between plain text as well as cipher text is referred to as diffusion.In other words,the non-uniformity in the distribution of individual letters inside plain text should be redistributed into the non-uniformity in the distribution of much bigger structures in the encrypted text,which is substantially more difficult to decrypt[3].The Rijndael algorithm is basically the same as an iterated block cipher but has a few extra features.Before we talk about the Rijndael algorithm,we will talk about an iterated block cipher shown in[4].

Many scholars employed diverse algebraic and statistical frameworks to confound data and produce S-boxes.In[5],the authors suggested S-boxes over the permutation of the symmetric group.In [6],Javeed et al.constructed the non-linear component of block cipher by means of a chaotic dynamical system and symmetric group.In[7],the authors described the S-box based on the subgroup of the Galois field.The author suggested a robust encryption system using a modified Chebyshev map,Advanced Encryption Standard(AES)S-boxes,and a symmetric group of permutations[8].

In[9],the authors proposed a new scheme for the construction of the S-box based on the linear fractional transformation(LFT)and permutation function.In[10],the authors proposed S-box over the Mobius group and finite field.The author proposed S-box on a nonlinear chaotic map in[11].In[12],Sajjad et al.designed pair of nonlinear components of a block cipher over Gaussian integers.In[13,14],the authors constructed cyclic codes over quaternion integers,these quaternion structures can be helpful for the construction of S-boxes.The authors designed differential cryptanalysis of DESlike cryptosystems in [15].Cassal-Quiroga et al.generated the dynamical S-boxes for block ciphers via an extended logistic map[16].Tang et al.designed a new method of dynamical S-boxes based on discretized chaotic maps [17].Chen et al.extended method for obtaining S-boxes based on threedimensional chaotic Baker maps [18].The authors constructed s-boxes using different maps over elliptic curves for image encryption [19].Cavusoglu et al.[20] constructed S-box based on chaotic scaled zhongtang system.Siddiqui et al.developed a novel scheme of substitution-box design based on modified Pascal’s triangle and elliptic curve in[21].Farhan et al.designed a new S-box generation algorithm based on the multistability behavior of a plasma perturbation model[22].In[23],the authors approached the S-boxes and permutation,substitution,based encryption.

Eisenstein integers are named after German mathematician Ferdinand Eisenstein,who first introduced them in the 1850s while studying the theory of quadratic forms.Like ordinary complex numbers,Eisenstein integers can be added and multiplied together.However,their properties are different.Eisenstein integers have important applications in number theory,coding theory,data security,and algebraic geometry.They also have connections to other areas of mathematics,such as algebraic number theory and modular forms[24].

An S-box generator is appropriate for cryptographic purposes if it can efficiently make highly dynamic S-boxes with good cryptographic properties or tests like nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability.The key contributions of our proposed study are given below:

? Propose an algorithm to generate pair of S-boxes by the cyclic group over the residue class of Eisenstein integers.

? Security Analysis.

? The advantages of the proposed algorithm over EI with some of the existing algorithms over EC.

This paper is structured as follows: Basic definitions,cyclic group over the residue class of Eisenstein integers,and some fundamental results are elaborated in Section 2.The scheme of the pair of new S-boxes is proposed in Section 3.Analysis of the proposed S-boxes including nonlinearity,bit independence criterion,strict avalanche criterion,linear approximation probability,and differential approximation probability investigated in Section 4.The comparison of the proposed S-boxes with some of the existing S-boxes are given in Section 5.Conclusions and future directions are given in Section 6.

2 Preliminaries

This section provides the key concepts and basic findings that will be used in the study of upcoming sections.First of all,we recall the definition of Eisenstein integers,cyclic group over a residue class of Eisenstein integers,and some fundamental results.

Eisenstein Integers

In[24],Eisenstein integers are a subset of complex numbers with real and vector parts.

1.Z[ω]={b0+b1ω:b0,b1∈Z},where Z is the set of integers.

2.Multiplicative identity is 1.

3.ωis the cube root of unity.

Leth=b0+b1ωbe an element of the Eisenstein integer ring,then the conjugate ofhis=b0+b1ω2.Then the norm ofhis given by

An Eisenstein integer has only two parts,one is the scalar partb0and the other is the vector partb1ω.

Addition of Two Eisenstein Integers

Leth=a1+b1ωandk=a2+b2ωbe two Eisenstein integers then,the sum of two Eisenstein integers is also an Eisenstein integer defined as

Multiplication of Two Eisenstein Integers

Leth=a1+b1ωandk=a2+b2ωare two Eisenstein integers then,the multiplication of two Eisenstein integers is also an Eisenstein integer defined as

Theorem:In[24],the set of natural numbers for each odd rational primep,there is a primeh∈Z[ω],such thatN(h)=p=.In particular,pis not prime in Z[ω].

Theorem:In [24],if the norm of an Eisenstein integerN(h) is prime in Z,then the Eisenstein integerhis prime in Z[ω].

Definition:In [24],let Z[ω] be the set of Eisenstein integers and Z[ω]hbe the residue class of Eisenstein integers over moduloh,h=a+bω.Then,the modulo function:

wherez∈Z[ω]hand[.]are rounding to the nearest integer.The rounding of an Eisenstein integer can be done by rounding the real part and coefficients of the vector part separately to the closest integer.

Theorem:In[24],lethbe an Eisenstein prime,and the number of Eisenstein integers modulohis the norm ofh.Ifρ0(modh),thenρn(h)-1≡1(modh).

Remark:The group generated b<ρ>in the above Theorem is namedS.

3 Redesign of Pair of n×n S-boxes over Eisenstein Integers

Multiple methods can be employed to cause confusion inside a security system.S-box is one of the most efficient cryptographic algorithms in use today.The S-boxes are generally formed using the EI class or the multiplicative cyclic group.As a result,it is feasible to create a variety of S-boxes across the residue class of EI,which presents a fantastic outlook for the development of secure and consistent cryptosystems.The subsequent procedures are useful for constructing S-boxes over the residue class of EI(Multiplicative cyclic group).

Step 1:Construct a cyclic groupSof orderp-1 over the residue class of EI.

Step 2:Apply permutation through affine mapping as:

whereb∈Sandabe the unit element ofS.

Step 3:Separate real and vector parts of Step 2.

Step 4:Apply modulo 2nover the separated parts in Step 3.

Step 5:Select the first 2nnon-repeated elements from the elements of Step 4.

Step 6:Get a pair of S-boxes.

The construction of S-boxes by Eisenstein integers provides us with better performance instead of S-boxes by using other structures like as chaotic maps,elliptic curves,finite fields,etc.

3.1 Pair of 4×4 S-boxes over the Residue Class of EI

Leth=2+9ω,p=n(h)=22+92-18=67,andβ=2+3ω=(2,3),then the cyclic group generated byβis given in Table 1.

Table 1:Cyclic group generated by β

Table 2:4×4 S-box by the scalar part of EI

Table 3:4×4 S-box by the vector part of EI

Table 4:8×8 S-box by the scalar part of EI=S1

Table 5:8×8 S-box by the vector part of EI=S2

Table 6:8×8 S-box by the vector part of EI=S3

Table 7:8×8 S-box by the vector part of EI=S4

Apply the affine permutation mapping,f(x)=((63+61ω)x+(63+62ω))(mod16),separate real and vector parts,and select the first 16 non-repeating entries for real and vector parts,which are given in Tables 2 and 3.

3.2 Pair of 8×8 S-boxes over the Residue Class of EI

Example 1:Leth=81+71ω,p=n(h)=812+712-(81)(71)=5851,andβ=2+3ω=(2,3),then apply the same procedure of 3.1,we get pair of S-boxes by affine mappingf(x)=((59+29ω)x+(14+8ω))(mod256)given in Tables 4 and 5.

Example 2:Leth=81+71ω,p=n(h)=812+712-(81)(71)=5851,andβ=2+3ω=(2,3),then apply the same procedure of 3.1,we get pair of S-boxes by affine mappingf(x)((59+29ω)x+(7+5836ω))(mod256)given in Tables 6 and 7.

4 Analysis of S-boxes

There are the following tests to analyze the properties of S-boxes.

4.1 Non-Linearity

The nonlinearity of the S-box refers to the property of the substitution box used in cryptographic algorithms,which is designed to introduce nonlinearity into the encryption process.In particular,the S-box is used in block ciphers to perform the substitution of plaintext bits with cipher text bits,and its nonlinearity is important for the security of the cipher.The nonlinearity of the S-box is usually measured using a metric called the “nonlinearity coefficient”or “nonlinearity index”.This metric quantifies the degree of nonlinearity introduced by the S-box and is based on the Walsh-Hadamard transform of the S-box.A high nonlinearity coefficient indicates that the S-box is highly nonlinear,which is desirable for cryptographic purposes.Nonlinear S-boxes make it more difficult for an attacker to find patterns or correlations between the plaintext and cipher text,which can be used to break the cipher[25].To achieve high nonlinearity,S-boxes are often constructed using mathematical functions that are highly nonlinear,such as power functions or finite field operations.The upper bound of nonlinearity isN(f)=2n-1-,for S-box.The optimal value of non-linearity is 120.The nonlinearity of the proposed S-boxes is given in Table 8.

Table 8:Non-linearity of proposed S-boxes

Table 9:Bit independent criterion of S1

Table 10:Bit independent criterion of S2

Table 11:Bit independent criterion of S3

Table 12:Bit independent criterion of S4

Table 13:Differential approximation probability of S1

Table 14 Differential approximation probability of S2

Table 15:Differential approximation probability of S3

Table 16 Differential approximation probability of S4

Table 17:Strict avalanche criterion of S1

Table 18:Strict avalanche criterion of S2

Table 19:Strict avalanche criterion of S3

Table 20:Strict avalanche criterion of S4

The average non-linearity of proposed S-boxes is 107,106.75,107.0,and 106.75.

4.2 Bit Independent Criterion(BIC)

The bit independence criterion of an S-box is a measure of its resistance to linear and differential cryptanalysis attacks.Specifically,it refers to the property that no linear relationship exists between any two output bits of the S-box and any two input bits of the S-box.In other words,the bit independence criterion of an S-box ensures that changing one input bit or one output bit of the S-box will not affect the other output bits or input bits,respectively,in a linear way [26].This property makes it more difficult for an attacker to analyze the S-box using linear or differential cryptanalysis.To achieve high bit independence,S-box designers often use mathematical structures,such as finite fields and Boolean functions,to construct the S-box lookup table.They also perform extensive testing and analysis to ensure that the S-box meets the required bit independence criteria and other cryptographic properties.The results of the BIC are given in Tables 9–12.

HenceS1,S2,S3andS4satisfied the bit-independent criterion close to the best possible value.

4.3 Linear Approximation Probability(LP)

The linear approximation probability for a substitution box(S-box)is a measure of the probability that a linear approximation of the S-box will hold.In other words,it is a measure of the correlation between a set of input bits and a set of output bits of the S-box [27].The linear approximation probability of an S-box is defined asPr[a·x=b·S(x)],whereaandbare two-bit vectors of the same length as the input and output of the S-box,respectively,x is an input to the S-box,and S(x)is the output of the S-box.The symbol · denotes the bitwise inner product of the two-bit vectors.The linear approximation probability is a value between 0 and 1.A value of 0 means that there is no linear approximation of the S-box,while a value of 1 means that the linear approximation holds with certainty.We have calculated the linear approximation probability of the S-boxesS1,S2,S3andS4.The maximum value of LP is 0.1484375,0.1328125,0.1484375,and 0.1328125.

4.4 Differential Approximation Probability(DAP)

The differential approximation probability for a substitution box (S-box) is a measure of the probability that a differential approximation of the S-box will hold.In other words,it is a measure of the correlation between a set of input differences and a set of output differences of the S-box.The differential approximation probability of an S-box is defined asPr[Δx→Δy=Δu→Δv],where Δxand Δyare two input differences of the S-box,Δu,and Δvare the corresponding output differences,and →denotes the S-box operation.The differential approximation probability is a value between 0 and 1.A value of 0 means that there is no differential approximation of the S-box,while a value of 1 means that the differential approximation holds with certainty.The DAP results of the proposed work are given in Tables 13–16.

The maximum value of differential approximation probability for both S-boxesS1,S2,S3,andS2is 0.046875,0.0390625,0.046875,and 0.0390625.

4.5 Strict Avalanche Criterion(SAC)

The Strict Avalanche Criterion(SAC)is a measure of the cryptographic strength of a substitution box(S-box).The SAC measures how much a change in one input bit affects the output bits on average,and is defined as follows:For every pair of input bitsiandj,and for every pair of output bitskandl,the difference between the output bits when i and j are flipped is denoted byThe SAC requires that the average over all pairs of input and output bits of the total number of output bit differences that occur when a single input bit is flipped is at least 1/2:

wherenis the number of input bits,m is the number of output bits,andεis a small positive constant,typically set to 0.01 or smaller.The results in Tables 17–20 show that the value of the strict avalanche criterion of S-boxes based on the residue of a prime number is ~1/2.

5 Comparison

The former tests are performed on well-known S-boxes over EC,chaotic maps,and finite fields presented in[19–23,26,27]in order to compare them to the proposed S-boxesS1,S2,S3,andS4over EI.Table 21 shows the results of the EC,chaotic maps(CM),and EI analyses for the various parameters.It is discovered that the proposed S-boxes have a higher nonlinearity value than EC,CM,and other Sboxes.The intriguing features of the proposed technique provide S-boxes pair at a time by fixing three parametersa,b,andp.However,the prime field,which is dependent on the EC via various techniques,provides one S-box at a time by fixing three parametersa,b,andp.Table 21 and Fig.1 show the nonlinearity of the proposed S-box.The proposed S-box LAP results are lower than those presented in[19–23,26,27]and Fig.2.As a result,the proposed S-boxes generate more data confusion and are more resistant to linear attack [17] than [19–23,26,27].The proposed S-boxes’SAC and BIC results are comparable to those of other S-boxes used in Table 21 and Fig.2.As a result,the S-box generated by the proposed technique and the S-boxes shown in Table 21 cause equal magnitude diffusion in the data.The proposed DAP is comparable to the DAP of S-boxes in[19–23,26,27]and Fig.2.Thus,when compared to the others,the proposed technique generates an S-box with high resistance to differential cryptanalysis [18].Table 21 shows the analysis results of newly generated paired S-boxes by the EI cyclic group.Table 21 shows that the performance of paired S-boxes by the cyclic group over EI is comparable to that of S-boxes over EC.

Figure 1:Comparison of NL of proposed work with existing works

Table 21:Proposed S-boxes comparison with EC S-boxes for different primes

Figure 2:Comparison of BIC,SAC and LAP of proposed work with existing works

6 Conclusion and Future Directions

We propose a novel construction of substitution boxes by using affine mapping and fixing three parameters a,b,and p.By fixing the three parameters,the prime field dependent on the EC,chaotic maps,and Gaussian integers provide one S-box at a time.Here,the Prime p must be greater than or equal to 257 and belong to the cyclic group over the residue class of Eisenstein integers in order to produce cryptographically robust S-boxes.The newly proposed S-boxes are tested by using different available algebraic and statistical tests.Additionally,the proposed S-boxes cryptographic characteristics are contrasted with some of the currently used S-boxes over EC,Gaussian integers,and chaotic maps.The results indicate that the proposed algorithm can generate paired S-boxes with high resistance to linear and differential attacks.

The proposed S-boxes over the residue class of EI integers may extend to the S-boxes over the residue class of quaternion and octonion integers.These structures may also use for watermarking and image encryption.

Acknowledgement:The authors would like to thank the anonymous reviewers for their valuable comments.This work was financially supported by the Deanship of Scientific Research at King Khalid University in Saudi Arabia.

Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University,for funding this work through the General Research Groups Program under Grant No.R.G.P.2/109/43.

Author Contributions:Study conception and design: M.S.,and T.S.;data collection: M.S.,and M.M.H.;analysis and interpretation of results: M.S.,T.S.,M.M.H.,Z.B.,and A.A.;draft manuscript preparation:M.S.,and M.M.H.All authors reviewed the results and approved the final version of the manuscript.

Availability of Data and Materials:Not applicable.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 国产一区二区在线视频观看| 最新国产精品第1页| 国产亚洲精品yxsp| 久久综合色播五月男人的天堂| 黑人巨大精品欧美一区二区区| 国产福利微拍精品一区二区| 天天综合网色中文字幕| 久久一本日韩精品中文字幕屁孩| 91精品久久久无码中文字幕vr| 久久国产V一级毛多内射| 久久熟女AV| 成年人国产网站| 国产欧美日韩在线在线不卡视频| 国产激爽大片高清在线观看| 亚洲欧美日本国产专区一区| 4虎影视国产在线观看精品| 成人午夜亚洲影视在线观看| 国产免费a级片| 成人另类稀缺在线观看| 人妻丝袜无码视频| 激情成人综合网| 国产91无码福利在线| 色综合狠狠操| 婷婷色一区二区三区| 精品亚洲麻豆1区2区3区 | 国产一区免费在线观看| 国产成人高清精品免费5388| 在线观看91精品国产剧情免费| 久久精品中文字幕免费| 一级毛片免费观看久| 亚洲日韩Av中文字幕无码| 国产成人综合网| 日韩在线第三页| 91九色最新地址| 亚洲美女久久| 久热re国产手机在线观看| 天天干天天色综合网| 日韩欧美中文在线| 亚洲伊人天堂| 久久国产乱子伦视频无卡顿| 亚洲动漫h| 青青操视频免费观看| 有专无码视频| 国产亚洲欧美在线人成aaaa| 夜夜拍夜夜爽| 亚洲日韩图片专区第1页| 992Tv视频国产精品| 久久久久九九精品影院| 亚洲不卡无码av中文字幕| 色哟哟精品无码网站在线播放视频| 一级毛片在线播放| 日韩成人午夜| 国产sm重味一区二区三区| 欧美亚洲国产视频| 91欧美在线| av午夜福利一片免费看| 在线五月婷婷| 欧美成人精品在线| 亚洲欧州色色免费AV| 中文字幕乱妇无码AV在线| 国产精品一线天| 亚洲无码视频图片| 亚洲精品高清视频| 亚洲天堂网在线视频| 女人天堂av免费| 九九精品在线观看| 久久久波多野结衣av一区二区| 久久久久中文字幕精品视频| 欧美中出一区二区| 4虎影视国产在线观看精品| 亚洲热线99精品视频| 欧美在线天堂| 一级爱做片免费观看久久| 国产欧美一区二区三区视频在线观看| 国产午夜无码片在线观看网站| 国产av无码日韩av无码网站 | 怡春院欧美一区二区三区免费| 亚洲欧洲一区二区三区| 亚洲天堂网在线播放| 国产精品99久久久久久董美香| 亚洲天堂在线免费| 国产乱子伦无码精品小说 |