Abstract
Confusion component is an integral part of any modern information confidentiality technique. The selection of nonlinear confusion component requires an intelligent mechanism. In this article, we used an intelligent multi-criteria decision making (MCDM) mechanism for the selection of an optimum nonlinear confusion component namely substitution box (S-box) using combined compromise solution (CoCoSo) technique. We have thoroughly investigated substitution permutation network (SP-network) based lightweight S-boxes against standard benchmarks cryptographic properties. The fundamental cryptographic aspects includes nonlinearity, strict avalanche criterion (SAC), bit independent criterion (BIC), linear approximation probability (LAP) and differential approximation probability (DAP) for SP-network based 4-bit S-boxes. With this intelligent MCDM based mechanism, we have suggested an efficient mechanism for best nonlinear confusion component for SP-network based S-box.






Similar content being viewed by others
Data availability
The authors declare that data supporting the findings of this study are available within the article.
References
Abughazalah N, Khan M, Munir N, Zafar A (2021) Optimum criterion for lightweight nonlinear confusion component with multi-criteria decision making. J Intell Fuzzy Syst 40(6):12399–12410
Abughazalah, Nabilah, Mohsin Iqbal, Majid Khan, and Iqtadar Hussain (2023) "Novel Scheme for Robust Confusion Component Selection Based on Pythagorean Fuzzy Set." Comput Mater Continua 74(3)
Abughazalah, Nabilah, Iqra Ishaque, Majid Khan, Ammar S. Alanazi, Iqtadar Hussain (2023) "Classification of Nonlinear Confusion Component Using Hybrid Multi-Criteria Decision Making." Intell Autom Soft Comput 36(2)
Abughazalah, Nabilah, Majid Khan, and Mohsin Iqbal. "Hybrid multi-criteria decision-making technique for the selection of best cryptographic multivalued Boolean function." Complex & Intelligent Systems (2023): 1–14.
Abughazalah N, Khan M, Yaqoob N, Munir N, Hussain I (2023) A new authentication scheme based on monogenic semigroup. J Intell Fuzzy Syst 44:1661–1671
Zardari, Noorul Hassan, Kamal Ahmed, Sharif Moniruzzaman Shirazi, Zulkifli Bin Yusop (2015) Weighting methods and their effects on multi-criteria decision making model outcomes in water resources management. Springer
Haider MI, Shah T, Ali A, Shah D, Khalid I (2023) An Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques. Math Comput Simul 209(2023):153–168
Tong Y, Shiwei Xu, Huang J, Wang B, Ren Z (2023) A new analysis of small S-boxes based on a new notion of algebraic immunity. J Inform Secur Appl 77:103574
Behera PK, Gangopadhyay S (2023) Evolving bijective S-Boxes using hybrid adaptive genetic algorithm with optimal cryptographic properties. J Ambient Intell Humanized Comput 14(3):1713–1730
Brahim A, Hadj A, Ali Pacha N, Said HADJ (2023) A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes. Inform Secur J: A Global Perspective 32(2):59–75
Isa H, Junid SAAS, Z’aba MR, Endut R, Ammar SM, Ali N (2023) Enhancement of Non-Permutation Binomial Power Functions to Construct Cryptographically Strong S-Boxes. Mathematics 11(2):446
Nitaj A, Susilo W, Tonien J (2024) Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property. Comput Stand Interfaces 87:103769
Kuznetsov A, Frontoni E, Romeo L, Poluyanenko N, Kandiy S, Kuznetsova K, Beňová E (2023) Optimizing Hill Climbing Algorithm for S-Boxes Generation. Electronics 12(10):2338
Jamal SS, Anees A, Ahmad M, Khan MF, Hussain I (2019) Construction of cryptographic S-boxes based on mobius transformation and chaotic tent-sine system. IEEE Access 7(2019):173273–173285
Hussain I, Shah T (2013) ‘Literature survey on nonlinear components and chaotic nonlinear components of block ciphers.’ Nonlinear Dyn 74(4):869–904
Gao, Sheng, Wenping Ma, Jiwei Zhu (2012) "Nonlinearity profile test for an S-box." In Future Wireless Networks and Information Systems 1 639–644. Springer Berlin Heidelberg
Mar PP, Latt KM (2008) New analysis methods on strict avalanche criterion of S-boxes. World Acad Sci Eng Technol 48(150–154):25
Sarfraz M, Hussain I, Ali F (2016) Construction of S-box based on Mobius transformation and increasing its confusion creating ability through invertible function. Int J Comput Sci Inform Secur 14(2):187
Abughazalah N, Latif A, Hafiz MW, Khan M, Alanazi AS, Hussain I (2023) Construction of multivalued cryptographic boolean function using recurrent neural network and its application in image encryption scheme. Artif Intell Rev 56(6):5403–5443
Yoe, C (2002) Trade-Off Analysis Planning and Procedures Guidebook, Report No. IWR 02-R-2, April 2002, U.S. Army Corps of Engineers Institute for Water Resources, Alexandria, V
Zhu Y, Tian D, Yan F (2020) Effectiveness of entropy weight method in decision-making. Math Probl Eng 2020:1–5
Li X, Wang K, Liu L, Xin J, Yang H, Gao C (2011) Application of the entropy weight and TOPSIS method in safety evaluation of coal mines. Procedia Eng 26:2085–2091
Opricovic S, Tzeng G-H (2004) Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS. Eur J Oper Res 156(2):445–455
Yazdani M, Zarate P, Zavadskas EK, Turskis Z (2019) A combined compromise solution (CoCoSo) method for multi-criteria decision-making problems. Manag Decis 57(9):2501–2519
Chakraborty S, Zavadskas EK (2014) Applications of WASPAS method in manufacturing decision making. Informatica 25(1):1–20
Chourabi Z, Khedher F, Babay A, Cheikhrouhou M (2019) Multi-criteria decision making in workforce choice using AHP, WSM and WPM. J Text Inst 110(7):1092–1101
Szaban M, Seredyński F (2008) Designing cryptographically strong S-boxes with the use of cellular automata. Annal Univ Mariae Curie-Sklodowska, Sectio AI-Informatica 8(2):27–41
Banik, Subhadeep, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo (2019) "GIFT-COFB v1. 0." Submission to the NIST Lightweight Cryptography project
Saarinen M-JO (2011) Cryptographic Analysis of All 4× 4-Bit S-Boxes. Sel Areas Cryptography 7118:118–133
Li H, Yang G, Ming J, Zhou Y, Jin C (2021) Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes. Cybersecurity 4:1–20
Bogdanov, Andrey, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew JB Robshaw, Yannick Seurin, and Charlotte Vikkelsoe (2007) "PRESENT: An ultra-lightweight block cipher." In Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International Workshop, Vienna, Austria, September 10–13, 2007. Proceedings 9 450–466. Springer Berlin Heidelberg
Acknowledgements
This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2023R87), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Funding
This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2023R87), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Conflicts of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Abughazalah, N., Hayat, M.M.A. & Khan, M. An intelligent selection of lightweight multivalued cryptographic boolean function based on Multi-criteria decision making. Multimed Tools Appl 83, 39389–39410 (2024). https://doi.org/10.1007/s11042-023-17145-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-17145-4