A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field.

Autor: Siddiqui N; Department of Basic Sciences, University of Engineering and Technology (UET), Taxila, Punjab, Pakistan., Yousaf F; Department of Basic Sciences, University of Engineering and Technology (UET), Taxila, Punjab, Pakistan., Murtaza F; Sino-Pak Center for Artificial Intelligence, Pak-Austria Fachhochschule: Institute of Applied Sciences and Technology, Haripur, Khyber Pakthunkhwa (KPK), Pakistan., Ehatisham-Ul-Haq M; Department of Computer Engineering, University of Engineering and Technology (UET), Taxila, Punjab, Pakistan., Ashraf MU; Department of Computer Science, University of Management and Technology (UMT), Lahore (Sialkot), Punjab, Pakistan., Alghamdi AM; Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia., Alfakeeh AS; Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia.
Jazyk: angličtina
Zdroj: PloS one [PLoS One] 2020 Nov 12; Vol. 15 (11), pp. e0241890. Date of Electronic Publication: 2020 Nov 12 (Print Publication: 2020).
DOI: 10.1371/journal.pone.0241890
Abstrakt: Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic algorithms offering security facilities for maintaining more cover-ups. A substitution-box (S-box) is the lone component in a cryptosystem that gives rise to a nonlinear mapping between inputs and outputs, thus providing confusion in data. An S-box that possesses high nonlinearity and low linear and differential probability is considered cryptographically secure. In this study, a new technique is presented to construct cryptographically strong 8×8 S-boxes by applying an adjacency matrix on the Galois field GF(28). The adjacency matrix is obtained corresponding to the coset diagram for the action of modular group [Formula: see text] on a projective line PL(F7) over a finite field F7. The strength of the proposed S-boxes is examined by common S-box tests, which validate their cryptographic strength. Moreover, we use the majority logic criterion to establish an image encryption application for the proposed S-boxes. The encryption results reveal the robustness and effectiveness of the proposed S-box design in image encryption applications.
Competing Interests: The authors have declared that no competing interests exist.
Databáze: MEDLINE
Nepřihlášeným uživatelům se plný text nezobrazuje