Abstract
Substitution box is the most significant component of block cipher. The property of nonlinearity is of great importance for the design of secure substitution boxes. Therefore, it is necessary to develop new methods for the production of substitution boxes with a high non-linearity score. In this paper, we have introduced a novel group theoretic method to construct a robust S-box with non-linearity score 113.75 greater than that of AES S-box. The performance of generated S-box is found to be excellent, when examined through various other well-known algebraic criteria such as strict avalanche criterion, bit independence criterion, differential uniformity and linear approximation probability. The suitability of proposed S-box is tested for image encryption applications through different statistical analyses. We got very encouraging outcomes from all these examinations which certify that the generated S-box meets all the criteria needed to be reliable for secure communication and image encryption.
Similar content being viewed by others
References
Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design. Procedia Comput Sci 57:572–580
Ahmad M, Mittal N, Garg P, Khan MM (2016) Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspect Sci 8:465–468
Ahmed HA, Zolkipli MF, Ahmad M (2019) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Appl 31(11):7201–7210
Ahmet ME, Paul SF (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959–2965
Alhadawi H. S, Lambić D, Zolkipli MF, Ahmad M (2020). Globalized firefly algorithm and chaos for designing substitution box. J Inf Secur Appl, 55:102671.
Alhadawi HS, Majid MA, Lambić D, Ahmad M (2021) A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimedia Tools and Applications 80(5):7333–7350
Ali KM, Khan M (2019) Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int J Theor Phys 58(9):3091–3117
Aslan B, Sakalli MT, Bulus E (2008) Classifying 8-bit to 8-bit S-boxes based on power mappings from the point of DDT and LAT distributions. International Workshop on the Arithmetic of Finite Fields. Springer, Berlin, Heidelberg, pp 123–133
Bhanot R, Hans R (2015) A review and comparative analysis of various encryption algorithms. International Journal of Security and Its Applications 9(4):289–306
Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72
Cameron PJ (2013). Cayley graphs and coset diagrams. Encyclopaedia of design theory, 1–9.
Carlet C, Faugere JC, Goyet C, Renault G (2012) Analysis of the algebraic side channel attack. J Cryptogr Eng 2(1):45–62
Choy J, Yap H, Khoo K (2009). An analysis of the compact XSL attack on BES and embedded SMS4. In International Conference on Cryptology and Network Security, 103–118.
Daemen J, Rijmen V (2001). Reijndael: The Advanced Encryption Standard. Dr. Dobb's Journal: Software Tools for the Professional Programmer, 26(3):137–139.
Diem C (2004). The XL-algorithm and a conjecture from commutative algebra. In International Conference on the Theory and Application of Cryptology and Information Security, 323–337.
Dobbertin H (1998). One to one highly nonlinear power functions on GF(2n). Applicable Algebra in Engineering. Communication and Computing, 9(139):152 (1998).
Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and teaching–learning-based Optimization. Nonlinear Dyn 88(2):1059–1074
Firdousi F, Batool SI, Amin M (2019) A novel construction scheme for nonlinear component based on quantum map. J Theor Phys 58(11):3871–3898
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(06):1259–1284
Guesmi R, Farah MAB, Kachouri A, Samet M (2014). A novel design of Chaos based S-Boxes using genetic algorithm techniques. In 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications, 678–684.
Higman G, Mushtaq Q (1983) Coset diagrams and relations for PSL(2, Z). Arab Gulf J Sci Res 1(1):159–164
Hussain I, Shah T, Gondal MA, Mahmood H (2012) Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z Naturforsch A 67(5):282–288
Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. IET Electronic Letters 44(13):800–801
Jamal SS, Shah T (2018) A novel algebraic technique for the construction of strong substitution box. Wirel Pers Commun 99(1):213–226
Javeed A, Shah T, Ullah A (2020) Construction of non-linear component of block cipher by means of chaotic dynamical system and symmetric group. Wirel Pers Commun 12:467–480
Jovanovic P, Kreuzer M (2010) Algebraic attacks using SAT-solvers. Groups Complex Cryptol 2(2):247–259
Kazlauskas K, Kazlauskas J (2009) Key-dependent S-box generation in AES block cipher system. Informatica 20(1):23–34
Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71(3):489–492
Khan M, Shah T, Batool SI (2016) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput Appl 27(3):677–685
Lambić D (2017) A novel method of S-box design based on discrete chaotic map. Nonlinear Dyn 87(4):2407–2413
Lambić D (2020) A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design. Nonlinear Dyn 100(1):699–711
Li C, Preneel B (2019). Improved interpolation attacks on cryptographic primitives of low algebraic degree. In International Conference on Selected Areas in Cryptography, 171–193.
Lu Q, Zhu C, Wang G (2019) A novel S-box design algorithm based on a new compound chaotic system. Entropy 21(10):1004
Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 8:25664–25678
Lyndon RC, Schupp PE (2015) Combinatorial group theory. Springer
Matsui M (1993) Linear cryptanalysis method for DES cipher. Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp 386–397
Mushtaq Q (1989) Coset diagrams for an action of the extended modular group on the projective line over a finite field. Indian J Pure Appl Math 20(8):747–754
Mustaq Q (1992) Parametrization of all homomorphisms from PGL(2 Z) into PGL(2, q). Commun Algebra 20(4):1023–1040
Özkaynak F (2019) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl 31(8):3317–3326
Pieprzyk J, Finkelstein G (1988) Towards effective nonlinear cryptosystem design. IEE Proceedings E-Computers and Digital Techniques 135(6):325–335
Razaq A, Alolaiyan H, Ahmad M, Yousaf MA, Shuaib U, Aslam W, Alawida M (2020) A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups. IEEE Access 8:75473–75490
Selcuk AA (2008) On probability of success in linear and differential cryptanalysis. J Cryptol 21(1):131–147
Shafique A (2020) A new algorithm for the construction of substitution box by using chaotic map. Eur Phys J Plus 135(2):1–13
Siddiqui N, Khalid H, Murtaza F, Ehatisham-Ul-Haq M, Azam MA (2020) A novel algebraic technique for design of computational substitution-boxes using action of matrices on galois field. IEEE Access 8:197630–197643
Siddiqui N, Naseer A, Ehatisham-ul-Haq M (2020) A Novel Scheme of Substitution-Box Design Based on Modified Pascal’s Triangle and Elliptic Curve. Wireless Pers Commun 116(4):3015–3030
Siddiqui N, Yousaf F, Murtaza F, Ehatisham-ul-Haq M, Ashraf MU, Alghamdi AM, Alfakeeh AS (2020). A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field. Plos one, 15(11):e0241890.
Silva García VM, Flores Carapia R, Rentería Márquez C, Luna Benoso B, Aldape Pérez M (2018) Substitution box generation using Chaos: an image encryption application. Appl Math Comput 332:123–135
Tian Y, Lu Z (2016) S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm. J Syst Eng Electron 27(1):232–241
Tian Y, Lu Z (2017). Chaotic S-box: intertwining logistic map and bacterial foraging optimization. Mathematical Problems in Engineering.
Torstensson A (2010) Coset diagrams in the study of finitely presented groups with an application to quotients of the modular group. J Commut Algebra 2(4):501–514
Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88(4):2757–2769
Vergili I, Yücel MD (2001) Avalanche and bit independence properties for the ensembles of randomly chosen n×n S-boxes. Turk J Electr Eng Comput Sci 9(2):137–146
Wang J, Zhu Y, Zhou C, Qi Z (2020) Construction method and performance analysis of chaotic S-box based on a memorable simulated annealing algorithm. Symmetry 12(12):2115
Wu XJ, Kan HB, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39
Ye T, Zhimao L (2018) Chaotic S-box: Six-dimensional fractional Lorenz-Duffing chaotic system and O-shaped path scrambling. Nonlinear Dyn 94(3):2115–2126
Yi L, Tong X, Wang Z, Zhang M, Zhu H, Liu J (2019) A novel block encryption algorithm based on chaotic S-box for wireless sensor network. IEEE Access 7:53079–53090
Webster AF, Tavares SE (1986). On the design of s-boxes. Advances in cryptology, Berlin: Springer.
Yousaf MA, Alolaiyan H, Ahmad M, Dilbar M, Razaq A (2020) Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes. IEEE Access 8:39781–39792
Zahid AH, Arshad MJ, Ahmad M (2019) A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21(3):245
Zahid AH, Al-Solami E, Ahmad M (2020) A Novel Modular Approach Based Substitution-Box Design for Image Encryption. IEEE Access 8:150326–150340
Zhang T, Chen CP, Chen L, Xu X, Hu B (2018) Design of highly nonlinear substitution boxes based on I-Ching operators. IEEE Trans Cybern 48(12):3349–3358
Zhao K, Cui J, Xie Z (2017) Algebraic cryptanalysis scheme of AES-256 using Gröbner basis. J Electr Comput Eng 2017:1–9
Zhu S, Wang G, Zhu C (2019) A secure and fast image encryption scheme based on double chaotic s-boxes. Entropy 21(8):790
Zhu D, Tong X, Zhang M, Wang Z (2020) A new S-box generation method and advanced design based on combined chaotic system. Symmetry 12(12):2087
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Razaq, A., Akhter, S., Yousaf, A. et al. A group theoretic construction of highly nonlinear substitution box and its applications in image encryption. Multimed Tools Appl 81, 4163–4184 (2022). https://doi.org/10.1007/s11042-021-11635-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11635-z