Skip to main content
Log in

An intelligent selection of lightweight multivalued cryptographic boolean function based on Multi-criteria decision making

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Confusion component is an integral part of any modern information confidentiality technique. The selection of nonlinear confusion component requires an intelligent mechanism. In this article, we used an intelligent multi-criteria decision making (MCDM) mechanism for the selection of an optimum nonlinear confusion component namely substitution box (S-box) using combined compromise solution (CoCoSo) technique. We have thoroughly investigated substitution permutation network (SP-network) based lightweight S-boxes against standard benchmarks cryptographic properties. The fundamental cryptographic aspects includes nonlinearity, strict avalanche criterion (SAC), bit independent criterion (BIC), linear approximation probability (LAP) and differential approximation probability (DAP) for SP-network based 4-bit S-boxes. With this intelligent MCDM based mechanism, we have suggested an efficient mechanism for best nonlinear confusion component for SP-network based S-box.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

The authors declare that data supporting the findings of this study are available within the article.

References

  1. Abughazalah N, Khan M, Munir N, Zafar A (2021) Optimum criterion for lightweight nonlinear confusion component with multi-criteria decision making. J Intell Fuzzy Syst 40(6):12399–12410

    Article  Google Scholar 

  2. Abughazalah, Nabilah, Mohsin Iqbal, Majid Khan, and Iqtadar Hussain (2023) "Novel Scheme for Robust Confusion Component Selection Based on Pythagorean Fuzzy Set." Comput Mater Continua 74(3)

  3. Abughazalah, Nabilah, Iqra Ishaque, Majid Khan, Ammar S. Alanazi, Iqtadar Hussain (2023) "Classification of Nonlinear Confusion Component Using Hybrid Multi-Criteria Decision Making." Intell Autom Soft Comput 36(2)

  4. Abughazalah, Nabilah, Majid Khan, and Mohsin Iqbal. "Hybrid multi-criteria decision-making technique for the selection of best cryptographic multivalued Boolean function." Complex & Intelligent Systems (2023): 1–14.

  5. Abughazalah N, Khan M, Yaqoob N, Munir N, Hussain I (2023) A new authentication scheme based on monogenic semigroup. J Intell Fuzzy Syst 44:1661–1671

    Article  Google Scholar 

  6. Zardari, Noorul Hassan, Kamal Ahmed, Sharif Moniruzzaman Shirazi, Zulkifli Bin Yusop (2015) Weighting methods and their effects on multi-criteria decision making model outcomes in water resources management. Springer

  7. Haider MI, Shah T, Ali A, Shah D, Khalid I (2023) An Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques. Math Comput Simul 209(2023):153–168

    Article  MathSciNet  Google Scholar 

  8. Tong Y, Shiwei Xu, Huang J, Wang B, Ren Z (2023) A new analysis of small S-boxes based on a new notion of algebraic immunity. J Inform Secur Appl 77:103574

    Google Scholar 

  9. Behera PK, Gangopadhyay S (2023) Evolving bijective S-Boxes using hybrid adaptive genetic algorithm with optimal cryptographic properties. J Ambient Intell Humanized Comput 14(3):1713–1730

    Article  Google Scholar 

  10. Brahim A, Hadj A, Ali Pacha N, Said HADJ (2023) A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes. Inform Secur J: A Global Perspective 32(2):59–75

    Google Scholar 

  11. Isa H, Junid SAAS, Z’aba MR, Endut R, Ammar SM, Ali N (2023) Enhancement of Non-Permutation Binomial Power Functions to Construct Cryptographically Strong S-Boxes. Mathematics 11(2):446

    Article  Google Scholar 

  12. Nitaj A, Susilo W, Tonien J (2024) Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property. Comput Stand Interfaces 87:103769

    Article  Google Scholar 

  13. Kuznetsov A, Frontoni E, Romeo L, Poluyanenko N, Kandiy S, Kuznetsova K, Beňová E (2023) Optimizing Hill Climbing Algorithm for S-Boxes Generation. Electronics 12(10):2338

    Article  Google Scholar 

  14. Jamal SS, Anees A, Ahmad M, Khan MF, Hussain I (2019) Construction of cryptographic S-boxes based on mobius transformation and chaotic tent-sine system. IEEE Access 7(2019):173273–173285

    Article  Google Scholar 

  15. Hussain I, Shah T (2013) ‘Literature survey on nonlinear components and chaotic nonlinear components of block ciphers.’ Nonlinear Dyn 74(4):869–904

    Article  MathSciNet  Google Scholar 

  16. Gao, Sheng, Wenping Ma, Jiwei Zhu (2012) "Nonlinearity profile test for an S-box." In Future Wireless Networks and Information Systems 1 639–644. Springer Berlin Heidelberg

  17. Mar PP, Latt KM (2008) New analysis methods on strict avalanche criterion of S-boxes. World Acad Sci Eng Technol 48(150–154):25

    Google Scholar 

  18. Sarfraz M, Hussain I, Ali F (2016) Construction of S-box based on Mobius transformation and increasing its confusion creating ability through invertible function. Int J Comput Sci Inform Secur 14(2):187

    Google Scholar 

  19. Abughazalah N, Latif A, Hafiz MW, Khan M, Alanazi AS, Hussain I (2023) Construction of multivalued cryptographic boolean function using recurrent neural network and its application in image encryption scheme. Artif Intell Rev 56(6):5403–5443

    Article  Google Scholar 

  20. Yoe, C (2002) Trade-Off Analysis Planning and Procedures Guidebook, Report No. IWR 02-R-2, April 2002, U.S. Army Corps of Engineers Institute for Water Resources, Alexandria, V

  21. Zhu Y, Tian D, Yan F (2020) Effectiveness of entropy weight method in decision-making. Math Probl Eng 2020:1–5

    Google Scholar 

  22. Li X, Wang K, Liu L, Xin J, Yang H, Gao C (2011) Application of the entropy weight and TOPSIS method in safety evaluation of coal mines. Procedia Eng 26:2085–2091

    Article  Google Scholar 

  23. Opricovic S, Tzeng G-H (2004) Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS. Eur J Oper Res 156(2):445–455

    Article  Google Scholar 

  24. Yazdani M, Zarate P, Zavadskas EK, Turskis Z (2019) A combined compromise solution (CoCoSo) method for multi-criteria decision-making problems. Manag Decis 57(9):2501–2519

    Article  Google Scholar 

  25. Chakraborty S, Zavadskas EK (2014) Applications of WASPAS method in manufacturing decision making. Informatica 25(1):1–20

    Article  Google Scholar 

  26. Chourabi Z, Khedher F, Babay A, Cheikhrouhou M (2019) Multi-criteria decision making in workforce choice using AHP, WSM and WPM. J Text Inst 110(7):1092–1101

    Article  Google Scholar 

  27. Szaban M, Seredyński F (2008) Designing cryptographically strong S-boxes with the use of cellular automata. Annal Univ Mariae Curie-Sklodowska, Sectio AI-Informatica 8(2):27–41

    Google Scholar 

  28. Banik, Subhadeep, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo (2019) "GIFT-COFB v1. 0." Submission to the NIST Lightweight Cryptography project

  29. Saarinen M-JO (2011) Cryptographic Analysis of All 4× 4-Bit S-Boxes. Sel Areas Cryptography 7118:118–133

    Article  MathSciNet  Google Scholar 

  30. Li H, Yang G, Ming J, Zhou Y, Jin C (2021) Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes. Cybersecurity 4:1–20

    Article  Google Scholar 

  31. Bogdanov, Andrey, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew JB Robshaw, Yannick Seurin, and Charlotte Vikkelsoe (2007) "PRESENT: An ultra-lightweight block cipher." In Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International Workshop, Vienna, Austria, September 10–13, 2007. Proceedings 9 450–466. Springer Berlin Heidelberg

Download references

Acknowledgements

This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2023R87), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Funding

This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2023R87), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abughazalah, N., Hayat, M.M.A. & Khan, M. An intelligent selection of lightweight multivalued cryptographic boolean function based on Multi-criteria decision making. Multimed Tools Appl 83, 39389–39410 (2024). https://doi.org/10.1007/s11042-023-17145-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17145-4

Keywords