A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field.
Autor: | Siddiqui N; Department of Basic Sciences, University of Engineering and Technology (UET), Taxila, Punjab, Pakistan., Yousaf F; Department of Basic Sciences, University of Engineering and Technology (UET), Taxila, Punjab, Pakistan., Murtaza F; Sino-Pak Center for Artificial Intelligence, Pak-Austria Fachhochschule: Institute of Applied Sciences and Technology, Haripur, Khyber Pakthunkhwa (KPK), Pakistan., Ehatisham-Ul-Haq M; Department of Computer Engineering, University of Engineering and Technology (UET), Taxila, Punjab, Pakistan., Ashraf MU; Department of Computer Science, University of Management and Technology (UMT), Lahore (Sialkot), Punjab, Pakistan., Alghamdi AM; Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia., Alfakeeh AS; Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia. |
---|---|
Jazyk: | angličtina |
Zdroj: | PloS one [PLoS One] 2020 Nov 12; Vol. 15 (11), pp. e0241890. Date of Electronic Publication: 2020 Nov 12 (Print Publication: 2020). |
DOI: | 10.1371/journal.pone.0241890 |
Abstrakt: | Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic algorithms offering security facilities for maintaining more cover-ups. A substitution-box (S-box) is the lone component in a cryptosystem that gives rise to a nonlinear mapping between inputs and outputs, thus providing confusion in data. An S-box that possesses high nonlinearity and low linear and differential probability is considered cryptographically secure. In this study, a new technique is presented to construct cryptographically strong 8×8 S-boxes by applying an adjacency matrix on the Galois field GF(28). The adjacency matrix is obtained corresponding to the coset diagram for the action of modular group [Formula: see text] on a projective line PL(F7) over a finite field F7. The strength of the proposed S-boxes is examined by common S-box tests, which validate their cryptographic strength. Moreover, we use the majority logic criterion to establish an image encryption application for the proposed S-boxes. The encryption results reveal the robustness and effectiveness of the proposed S-box design in image encryption applications. Competing Interests: The authors have declared that no competing interests exist. |
Databáze: | MEDLINE |
Externí odkaz: | |
Nepřihlášeným uživatelům se plný text nezobrazuje | K zobrazení výsledku je třeba se přihlásit. |