IEEE Access | |
A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups | |
Musheer Ahmad1  Waqar Aslam2  Abdul Razaq3  Umer Shuaib4  Hanan Alolaiyan5  Muhammad Awais Yousaf6  Moatsum Alawida7  | |
[1] Department of Computer Engineering, Jamia Millia Islamia, New Delhi, India;Department of Computer Science and Information Technology, The Islamia University of Bahawalpur, Bahawalpur, Pakistan;Department of Mathematics, Division of Science and Technology, University of Education, Lahore, Pakistan;Department of Mathematics, Government College University Faisalabad, Faisalabad, Pakistan;Department of Mathematics, King Saud University, Riyadh, Saudi Arabia;Department of Mathematics, The Islamia University of Bahawalpur, Bahawalpur, Pakistan;School of Computer Sciences, Universiti Sains Malaysia, Minden, Malaysia; | |
关键词: Substitution-boxes; coset graphs; modular symmetric group; block ciphers; | |
DOI : 10.1109/ACCESS.2020.2989676 | |
来源: DOAJ |
【 摘 要 】
The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches. It is because they are solely responsible to decide the robustness of cryptosystem against linear and differential cryptanalyses. With an aim to fulfill the mentioned requirement of robustness, a novel group theoretic and graphical method is proposed to construct S-box with optimal features. Firstly, a strong S-box is generated with the help of orbits of coset graphs and the action of proposed powerful permutation of symmetric group S256. In addition, a specific group is designed the action of whose pairs of permutations has the ability to generate as many as 462422016 strong S-boxes. Few of such proposed S-boxes are reported and assessed against standard performance parameters to validate the effectiveness of proposed findings. The features of proposed S-boxes are compared with most of the recent S-boxes to validate the superior performance. Moreover, they are also applied for image encryption to demonstrate their suitability for multimedia security applications.
【 授权许可】
Unknown