Abstract
In this paper, we present a matrix approach based on the rule 90 cellular automata, and a fractional linear transformation over Galois field \(GF(2^8)\), to implement a strong substitution box (S-box). To make the assessment of this proposal, some standard tests are performed, and the obtained numerical results show that this proposed S-box is comparable or superior to some S-boxes used as benchmarks in this work. Also, to measure the strength of the S-box in image encryption, some statistical tests are carried out, which prove that our proposal exhibits appealing security properties.
Similar content being viewed by others
References
Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, Berlin (2010)
Cusick, T., Stanica, P.: Cryptographic Boolean Functions and Applications. Elsevier, Amsterdam (2009)
Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, New York (2002)
Shannon, C.E.: Communication theory of secrecy systems. Bell Labs Tech. J. 28(4), 656–715 (1949)
Farwa, S., Muhammad, N., Shah, T., Ahmad, S.: A novel image encryption based on algebraic S-box and Arnold transform. 3D Disp. Res. Cent. 8, 1–14 (2017). https://doi.org/10.1007/s13319-017-0135-x
Ullah, A., Jamal, S.S., Shah, T.: A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn. 91, 359–370 (2018). https://doi.org/10.1007/s11071-017-3874-6
Jamal, S.S., Khan, M.U., Shah, T.: A watermarking technique with chaotic fractional S-box transformation. Wirel. Pers. Commun. 90, 2033–2049 (2016)
Gangadari, B.R., Ahamed, S.R.: Circuits Syst. Signal Process (2017). https://doi.org/10.1007/s00034-017-0592-8
Ye, Y., Wu, N., Zhang, X., Dong, L., F. Zhou.: An optimized design for compact masked AES S-box based on composite field and common subexpression elimination algorithm. J. Circuits Syst. Comput. 27 (11), 1850171 (2018). https://doi.org/10.1142/S0218126618501712
Ahmad, N., Hasan, R., Jubadi, W.M.: Design of AES S-Box using combinational logic optimization. IEEE Symposium on Industrial Electronics and Applications, pp. 696–699 (2010)
Webster, A.F., Tavares, S.E.: On the Design of S-boxes, Advances in Cryptology: Proceedings of CRYPTO ’85, pp. 523–534. Lecture Notes in Computer Science
Farwa, S., Shah, T., Idrees, L.: A highly nonlinear S-box based on a fractional linear transformation. Springerplus 5(1), 1658 (2016). https://doi.org/10.1186/s40064-016-3298-7
Khan, M., Asghar, Z.: A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S\(_8\) permutation. Neural Comput. and Appl. (2016). https://doi.org/10.1007/s00521-016-2511-5
Hussain, I., Shah, T., Asif-Gondal, M., Ahmad-Khan, W., Mahmood, H.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 23, 97–104 (2013)
Peng, J., Zhang, D., Liao, X.: A method for designing dynamical S-boxes based on hyperchaotic Lorenz system. In: IEEE 10th International Conference on Cognitive Informatics and Cognitive Computing (ICCI*CC), pp. 304–309 (2011)
Ullah, A., Jamal, S.S., Shah, T.: A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn. 88, 2757–2769 (2017)
Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag. 1, 6–21 (2001)
Lambić, D.: A novel method of S-box design based on discrete chaotic map. Nonlinear Dyn. 87, 2407–2413 (2017)
Szaban, M., Seredynski, F.: Designing cryptographically strong S-boxes with use of 1D cellular automata. J. Cell. Autom. 6, 91–104 (2009)
Seredynski, F., Bouvry, P., Zomaya, A.Y.: Cellular automata computations and secret key cryptography. Parallel Comput. 30, 753–766 (2004)
Szaban, M., Seredynski, F.: Dynamic cellular automata-based S-boxes. In: International Conference on Computer Aided Systems Theory, pp. 184–191 (2011)
Picek, S., et al.: Design of S-boxes defined with cellular automata rules. In: Proceedings of the Computing Frontiers Conference. ACM (2017)
Murguía, J.S., Flores, G., Mejía-Carlos, M., Rosu, H.C.: Matrix approach of an encryption system based on cellular automata and its numerical implementation. Int. J. Mod. Phys. C 23, 1250078 (2012). https://doi.org/10.1142/S0129183112500787
Wolfram, S.: Cryptography with cellular automata. In: Advances in Cryptology: Crypto’85, pp. 429–432. Lecture Notes in Computer Science (1986)
Fúster-Sabater, A., Caballero-Gil, P.: Chaotic modelling of the generalized self-shrinking generator. Appl. Soft Comput. 11, 1876–1880 (2011)
Murguía, J.S., Mejía Carlos, M.M., Rosu, H.C., Flores-Eraña, G.: Improvement and analysis of a pseudo-random bit generator by means of cellular automata. Int. J. Mod. Phys. C 21, 741–756 (2010)
Ramírez-Torres, M.T., Murguía, J.S., Mejía-Carlos, M.: Image encryption with an improved cryptosystem based on a matrix approach. Int. J. Mod. Phys. C 25, 1450054 (2014). https://doi.org/10.1142/S0129183114500545
Trant M. T., Bui D. K., Doung, A. D.: Gray S-box for advanced encryption standard. In: IEEE International Conference on Computational Intelligence and Security (CIS’08), pp. 253–258 (2008)
Hussain, I., Shah, T., Asif-Gondal, M., Mahmood, H.: Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z. Naturforsch. A 67a, 282–288 (2012)
Acknowledgements
J. A. Aboytes-González is a doctoral fellow of CONACyT (México) in the Graduate Program on “Ciencias Aplicadas” at IICO-UASLP.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest regarding the publication of this paper.
Rights and permissions
About this article
Cite this article
Aboytes-González, J.A., Murguía, J.S., Mejía-Carlos, M. et al. Design of a strong S-box based on a matrix approach. Nonlinear Dyn 94, 2003–2012 (2018). https://doi.org/10.1007/s11071-018-4471-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-018-4471-z