- Omar A. Dawood ORCID:orcid.org/0000-0003-3276-602X9,
- Mohammed Khalaf ORCID:orcid.org/0000-0002-3805-562710,
- Falath M. Mohammed ORCID:orcid.org/0000-0002-8764-840211 &
- …
- Hussein K. Almulla ORCID:orcid.org/0000-0003-3877-096X9
Part of the book series:Communications in Computer and Information Science ((CCIS,volume 1174))
Included in the following conference series:
873Accesses
Abstract
The present paper introduces a new method of S-Box construction which work as a byte-oriented substitution scheme. The S-Box design considers the core part for the building most block cipher algorithms and play a major role in generating confusion property. Modern ciphers build with different types of S-Box of half-byte (nibble of 4-bit) or full-byte 8-bit as lookup tables with distinct mathematical Boolean functions (BFs). The proposed method generates the S-box based on multiplications of multiple different affine transforms with multiple distinct overlapped vectors of 8-bit to achieve high nonlinearity. The construction of S-box focused on use an irreducible polynomial of order eight over Galois Field GF (28). The proposed S-box quit similar to the S-box of Advance Encryption Standard (AES) but with more algebraic complexity and high non-linearity factor.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 5719
- Price includes VAT (Japan)
- Softcover Book
- JPY 7149
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dragomir, I.R., Lazǎr, M.: Generating and testing the components of a block cipher. In: Proceedings of the 8th International Conference on Electronics, Computers and Artificial Intelligence, IEEE, ECAI 2016, pp. 1–4 (2017).https://doi.org/10.1109/ecai.2016.7861190
Lin, Z.: Diffusion and confusion of chaotic iteration based hash functions. In: International Conference on Embedded and Ubiquitous Computing (EUC) and 15th International Symposium on Distributed Computing and Applications for Business Engineering (DCABES). IEEE, pp. 444–447 (2016)
Du, Z.Q., Xu, Q.J., Zhang, J., Li, M.: Design and analysis of dynamic S-box based on Feistel. In: Proceedings of 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2015, pp. 590–594. IEEE (2016).https://doi.org/10.1109/iaeac.2015.7428622
Agrawal, D.P., Wang, H., Dey, S., Ghosh, R.: A review of cryptographic properties of 4-bit S-boxes with generation and analysis of crypto secure S-boxes. In: Computer Cyber Security, pp. 527–555 (2019).https://doi.org/10.1201/9780429424878-20
Dawood, O.A., Rahma, A.M.S., Abdul Hossen, A.M.J.: The new block cipher design (Tigris Cipher). Int. J. Comput. Netw. Inf. Secur.7(12), 10–18 (2015)
Dawood, O.A., Rahma, A.M.S., Abdul Hossen, A.M.J.: New symmetric cipher fast algorithm of revertible operations’ queen (FAROQ) cipher. Int. J. Comput. Netw. Inf. Secur.9, 29–36 (2017)
Dawood, O.A., Rahma, A.M.S., Mohssen, A., Hossen, J.A.: The euphrates cipher. IJCSI Int. J. Comput. Sci.12(2), 154–160 (2015)
Rodinko, M., Oliynykov, R., Gorbenko, Y.: Optimization of the high nonlinear S-boxes generation method. In: Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), vol. 70, pp. 93–105. in Tatra Mountains Mathematical Publications (2017)
Alamsyah Bejo, A., Adji, T.B.: AES S-box construction using different irreducible polynomial and constant 8-bit vector. In: 2017 IEEE Conference on Dependable and Secure Computing, pp. 366–369 (2017).https://doi.org/10.1109/desec.2017.8073857
Gomes, O.D.S.M., Moreno, R.L.: A compact S-box module for 128/192/256-bit symmetric cryptography hardware. In: Proceedings - 2016 9th International Conference on Developments in eSystems Engineering, DeSE 2016, pp. 94–97 (2017).https://doi.org/10.1109/dese.2016.17
Zahid, A.H., Arshad, M.J., Ahmad, M.: A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy21, 245 (2019)
Dawood, O.A., Hammadi, O.I., Asman, T.K.: Developing a new secret symmetric algorithm for securing wireless applications. In: Proceedings - 2018 1st Annual International Conference on Information and Sciences, AiCIS 2018, pp. 152–157 (2019).https://doi.org/10.1109/aicis.2018.00038
Shreenivas Pai, N., Raghuram, S., Chennakrishna, M., Karthik, A.S.V.: Logic optimization of AES S-Box. In: International Conference on Automatic Control and Dynamic Optimization Techniques, ICACDOT 2016, pp. 1042–1046 (2017).https://doi.org/10.1109/icacdot.2016.7877745
Dawood, O.A., Sagheer, A.M., Al-Rawi, S.S.: Design large symmetric algorithm for securing big data. In: Proceedings - International Conference on Developments in eSystems Engineering, DeSE 2018-September, pp. 123–128 (2019)
Cui, L., Cao, Y.A.: New S-box structure named affine-power-affine. Int. J. Innov. Comput. Inf. Control3, 751–759 (2007)
Lee, J., et al.: Avalanche and bit independence properties of photon-counting double random phase encoding in gyrator domain. Curr. Opt. Photon.2(4), 368–377 (2018)
Lambi, D., Živkovi, M.: Comparison of random S-Box generation methods. Publications DE L’Institute Mathematique Nouvelle série93(107), 109–115 (2013)
Mroczkowski, P.: Generating pseudorandom S-boxes – a method of improving the security of cryptosystems based on block ciphers. J. Telecommun. Inf. Technol.2, 74–79 (2009)
Ivanov, G., Nikolov, N., Nikova, S.: Cryptographically strong s-boxes generated by modified immune algorithm. In: Pasalic, E., Knudsen, L.R. (eds.) BalkanCryptSec 2015. LNCS, vol. 9540, pp. 31–42. Springer, Cham (2016).https://doi.org/10.1007/978-3-319-29172-7_3
Sagheer, A.M., Al-Rawi, S.S., Dawood, O.A.: Proposing of developed advance encryption standard. In: Proceedings - 4th International Conference on Developments in eSystems Engineering, DeSE 2011, pp. 197–202 (2011).https://doi.org/10.1109/dese.2011.74
Baylis, J., Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1988). Math. Gaz. 72, 335
Author information
Authors and Affiliations
College of Computer Science & IT, University of Anbar, Ramadi, 31001, Iraq
Omar A. Dawood & Hussein K. Almulla
Department of Computer Science, Al-Maarif University College, Ramadi, Anbar, 31001, Iraq
Mohammed Khalaf
College of Education for Humanities Sciences, University of Anbar, Ramadi, Anbar, 31001, Iraq
Falath M. Mohammed
- Omar A. Dawood
You can also search for this author inPubMed Google Scholar
- Mohammed Khalaf
You can also search for this author inPubMed Google Scholar
- Falath M. Mohammed
You can also search for this author inPubMed Google Scholar
- Hussein K. Almulla
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toOmar A. Dawood.
Editor information
Editors and Affiliations
Al Maaref University College, Ramadi, Iraq
Mohammed I. Khalaf
Liverpool John Moores University, Liverpool, UK
Dhiya Al-Jumeily
University of Liverpool, Liverpool, UK
Alexei Lisitsa
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Dawood, O.A., Khalaf, M., Mohammed, F.M., Almulla, H.K. (2020). Design a Compact Non-linear S-Box with Multiple-Affine Transformations. In: Khalaf, M., Al-Jumeily, D., Lisitsa, A. (eds) Applied Computing to Support Industry: Innovation and Technology. ACRIT 2019. Communications in Computer and Information Science, vol 1174. Springer, Cham. https://doi.org/10.1007/978-3-030-38752-5_34
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-030-38751-8
Online ISBN:978-3-030-38752-5
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative