• 
    

    
    

      99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

      A Mathematical Approach for Generating a Highly Non-Linear Substitution Box Using Quadratic Fractional Transformation

      2023-12-15 03:58:08AbidMahboobMuhammadAsifRanaMuhammadZulqarnainImranSaddiqueHijazAhmadandSamehAskar
      Computers Materials&Continua 2023年11期

      Abid Mahboob,Muhammad Asif,Rana Muhammad Zulqarnain,Imran Saddique,Hijaz Ahmad and Sameh Askar

      1Department of Mathematics,Division of Science and Technology,University of Education,Lahore,Pakistan 2Department of Mathematics,University of Management and Technology,Sialkot Campus,51310,Pakistan

      3School of Mathematical Sciences,Zhejiang Normal University,Jinhua,321004,China

      4Department of Mathematics,University of Management and Technology,Lahore,54770,Pakistan

      5Section of Mathematics,International Telematic University Uninettuno,Corso Vittorio Emanuele II,Roma,39-00186,Italy

      6Department of Statistics and Operations Research,College of Science,King Saud University,P.O.Box 2455,Riyadh,11451,Saudi Arabia

      ABSTRACT Nowadays,one of the most important difficulties is the protection and privacy of confidential data.To address these problems,numerous organizations rely on the use of cryptographic techniques to secure data from illegal activities and assaults.Modern cryptographic ciphers use the non-linear component of block cipher to ensure the robust encryption process and lawful decoding of plain data during the decryption phase.For the designing of a secure substitution box (S-box),non-linearity (NL) which is an algebraic property of the S-box has great importance.Consequently,the main focus of cryptographers is to achieve the S-box with a high value of non-linearity.In this suggested study,an algebraic approach for the construction of 16×16 S-boxes is provided which is based on the fractional transformation and finite field.This technique is only applicable for the even number exponent in the range(2-254)that are not multiples of 4.Firstly,we choose a quadratic fractional transformation,swap each missing element with repeating elements,and acquire the initial S-box.In the second stage,a special permutation of the symmetric group S256 is utilized to construct the final S-box,which has a higher NL score of 112.75 than the Advanced Encryption Standard(AES)S-box and a lower linear probability score of 0.1328.In addition,a tabular and graphical comparison of various algebraic features of the created S-box with many other S-boxes from the literature is provided which verifies that the created S-box has the ability and is good enough to withstand linear and differential attacks.From different analyses,it is ensured that the proposed S-boxes are better than as compared to the existing S-boxes.Further these S-boxes can be utilized in the security of the image data and the text data.

      KEYWORDS Block cipher;S-box;data security;fractional transformation

      1 Introduction

      The amount of data being exchanged has risen substantially as a result of recent technology advancements and its successful use in daily life.The confidential nature of data necessitates the development of tools and safeguards against misuse.Data from a user must be altered before transmission so that an attacker cannot understand it.Symmetric block ciphers have become among the most extensively utilized approaches for such purposes given their ease of implementation and able to give much-required encryption security[1,2].By utilizing a symmetric key and a varied number of several rounds,one common sort of block cipher converts an input block of data into a nonsensical output block via substitution and permutation techniques.On the input block of data,substitution,and permutation operations are typically performed in each cycle.A replacement process uses a substitution box(S-box)to swap out an input block with another output block[3].The most widely used symmetric block cipher is AES,as an illustration.

      S-box is a Vectorial Boolean function that is defined mathematically as,φ:which maps theuinput bit into thevoutput bit.As a crucial part of modern block ciphers,an Sbox creates a randomized cipher text from the input plaintext.The single nonlinear component of contemporary block ciphers is the S-box,which provides a complicated link between the plaintext and the cipher text.The algebraic and statistical features of the S-box,such as non-linearity,Bit Independent Criterion (BIC),Strict Avalanche Criterion (SAC),Differential Uniformity (DU),and Linear Approximation Probability (LAP) are used to assess its validity.Numerous methods and technologies are used throughout literature to create securely powerful Substitution-boxes.A method to create robust and resistant S-boxes that can help in the modification of block cryptosystems was proposed by Dragomir et al.[4].The authors of[5]proposed a novel S-box constructed system using group theory ideas.Reference [6] Describes a unique genetic approach for evolving S-boxes with high non-linearity scores.Artu?ger et al.[7] present a new technique for improving the performance of Chaos-Based S-boxes.They have implemented their system on a large number of S-boxes.In [8],an efficient algebraic approach for evolving S-boxes with reasonable strength is presented.Particle Swarm Optimization was used by Musheer et al.[9] to generate a robust S-box.In [10],an efficient S-box with essentially optimum characteristics was created.For this,the authors used a methodical group theoretical method.Javeed et al.[11]created an S-box with outstanding cryptographic features using a freshly created chaotic map and the suitable S256component.In [12],Khan et al.created an S-box utilizing (Difference Distribution Table) DDT and a chaotic logistic map.In contrast to previously established S-boxes based on chaos,it was a significant effort to generate an S-box that had an extremely low value of differential approximation probability.To construct an S-box that has excellent cryptographic features,Ahmad et al.[13] suggested a unique approach that utilizes artificial bee colony optimization and chaotic maps.A unique method to build safe S-boxes using the fractional-order chaotic Chen scheme was put out by ?zkaynak et al.[14].To ensure the accuracy of Chen scheme’s numerical findings,they used the predictor-corrector approach.It is a straightforward approach for creating an S-box using Chen’s fractional-order chaotic Chen scheme.By utilizing Lorenz equations,Khan et al.[15]established a novel S-box method of construction.To develop a robust Sbox,Ahmad et al.looked at the traveling salesman problem and piecewise linear chaotic map [16].Five strong S-boxes were created by Ullah et al.[17] using a chaotic map and a linear fractional transformation (LFT).Different techniques are utilized for the construction of S-boxes and other techniques to solve different model issues[18-29].

      This article is a continuation of the work done by Mahboob et al.[30] to create an S-box using a Quantic Fractional Transformation and finite field.They used the mappingQ(x)=to construct a reliable S-box in their research,although it was only effective for odd values of m in the range of(0-255),and the authors also demonstrated that this mapping is bijective for odd values of m but there is no construction of S-boxes is available in literature which uses the fractional transformationwhenm∈{2+4n|0 ≤n≤63}since the proposed mapping is not bijective in this fashion.We provide a unique approach for the creation of S-boxes utilizing this fractional transformation and usem=2 for an example to create a specimen S-box in this paper.By changing the value of m,we may create several S-boxes.The following is the main contribution of our study in this paper:

      1.An innovative and simple fractional transformation is defined for the construction of S-boxes.By altering their parameters,a large number of S-boxes can be constructed using this technique.

      2.We use the Quadratic Fractional Transformation(QFT)as an illustration to create a specimen S-box by maintaining the value ofm=2.

      3.To boost the unpredictability of the first S-box,suitable permutations of the symmetric group were utilized,and the suggested S-box was constructed whose average nonlinearity is 112.75 which is greater than AES S-box.

      4.Additionally,visual and tabular comparisons of various algebraic analyses,including NL,BIC,DU,SAC,and LAP of the proposed S-box,were used,and a comparison of these results with the other S-boxes established in literature is presented to demonstrate that the suggested S-box is capable of withstanding linear and differential attacks.

      The remainder of the paper is arranged as follows:Section 2 delves into the algebraic structure of the S-box’s construction.In Section 3,the constructed S-box is examined through its security analysis,and its results are compared with those of other S-boxes.In Section 4,we illustrate the discussion of our results and discuss our findings.Finally,Section 5 concludes the study.

      2 Mathematical Structure

      Step 1:To begin,let us define a fractional transformation,Q: Z257→Z257as[30]:

      whereα∈Z257-{0},β∈Z257,&m∈{2+4n|0 ≤n≤63}.

      This Eq.(1)is taken from[30].

      Given that a bijective 16×16 S-box is essentially any rearrangement of the numbers(0-255).The Prime Field Z257is frequently used to ensure that all outputs remain within this range.Due to this,we restrict the parametersαandβ.These parameters allow for the creation of a vast number of S-boxes because each adjustment to one of the parameters results in the creation of a new S-box that differs from the previous ones.

      Here we choosem=2,α=57 &β=24 to generate a specimen substitution box,then the quadratic fractional transformation(QFT)becomes:

      After that,put all the elements from Z257into Eq.(2)and then write the outputs in a set W obtained from the quadratic fractional transformation after solving undermod257.

      W={Q(z)|z∈Z257}

      Since it is to be noted that the set W may include the number 256 but never have 0 we deducted 1 from each element of the set W to maintain the range(0-255).

      Finally,to keep the S-box bijective,we put all missing numbers from(0-255)in ascending order in set{u1,u2,...,un}and duplicated numbers from(0-255)in descending order in set{v1,v2,...,vn}and replace everyujbyvjforj=1,2,...,n.

      Table 1 explains the above method for eradicating the sequence{0,1,2,3,...,255}.After destroying the initial sequence of numbers {0,1,2,...,255},we retrieved our initial S-box 16 × 16 matrix present in Table 2,whose average nonlinearity is 103.25.

      Table 1: Initial S-box construction based on quadratic fractional transformation

      Table 2: Initial S-box

      Step 2: To improve the random nature of our constructed S-box,we utilized a permutation of symmetric groupS256(shown in Table 3)to modify the location of the S-box’s elements and generated a proposed S-box(shown in Table 4)with a mean non-linearity value of 112.75.

      Table 3: Permutation of S256

      Table 4: Proposed S-box

      3 Security Analysis

      In this part,we assess the cryptographic performance of recommended S-box(provided in Table 4)to generally recognized traditional S-box performance criteria.Five essential evaluations are utilized to assess the resilience of the S-box:nonlinearity,linear approximation probability,bit independence criterion,differential approximation probability,and strict avalanche criterion.We achieve fantastic results,which shows the high quality of the planned design.

      3.1 Nonlinearity(NL)

      This is a critical factor for determining the efficacy of S-box in contrast to linear and differential cryptanalysis.Pieprzyk and Finkelstein introduced this test in 1988 [31].The nonlinearity ofZ2,whereψis a Boolean function ofnvariables is defined as the minimum distance amongψand the set of affine transformationsAn.

      Accordingly,the NL score is 0 when all affine transformations are linear.Forn×nS-box,the highest value of NL is,Thus,the ideal value of NL overGF(28)is 120 in AES.The high NL value of the S-box is a crucial component for creating a good cryptosystem.The recommended S-box has a minimum value of nonlinearity is 112,the maximum value of nonlinearity is 114,and the mean value of nonlinearity is 112.75.Table 5 displayed the NL scores for 8 Boolean functions,and Fig.1 contrasts the mean NL number of the final S-box with those of numerous other S-boxes.

      Table 5: Nonlinearity score of proposed S-box

      Fig.1 shows the comparison of non-linearity of our purposed S-box and existing S-boxes.The non-linearity is the very important and main component to check the strength of S-box.So,from Fig.1,it is ensured that our S-box have average non-linearity 112.75 which is higher than other existing S-boxes.

      Figure 1:Analysis of mean NL score of suggested S-box with various S-boxes

      3.2 Strict Avalanche Criterion(SAC)

      In[32],Webster et al.suggested this essential algebraic criterion of S-box.SAC shows that output bits changed byof probability or 50%if a single bit changes in the input result.S-box is considered strong against cryptanalyst attacks whose SAC value is 0.5.The SAC criterion is conducted by using a dependency matrix.The SAC value of the suggested S-box is present in Table 6,which is close to the ideal value of SAC.

      Table 6: SAC values

      3.3 Bit Independence Criterion(BIC)

      This is another relevant criterion for measuring the strength of the S-box,which is defined as the two output bits changing independently when any single input is modified.Webster et al.[32]presented BIC as an effective criterion in symmetric cryptosystems.Table 7 shows the BIC Non-linearity values of the proposed S-box.

      Table 7: BIC nonlinearity values

      Table 8 provide the BIC-SAC values for the final S-box.

      Table 8: BIC SAC values

      Table 9 and Fig.2 provide a comparison of the BIC NL and BIC SAC values of the proposed S-box with existing S-boxes.

      Table 9: Analysis between SAC and BIC-NL scores of suggested S-box and other S-boxes

      Figure 2:Analysis among BIC-SAC values of proposed S-box with other S-boxes

      3.4 Differential Uniformity(DU)

      Biham et al.[48] devised this test.To overcome differential assaults,a low value of differential uniformity (DU) is proposed,and S-box is deemed more secure.Eq.(4) provides a mathematical formula for calculating the DU.

      whereM={0,1,2,...,255},ΔsandΔrdenote output and input differentials respectively,ψis a Boolean function and the symbol ⊕represents the XOR operation.Table 10 depicts the suggested S-box’s differential distribution table.The maximum DU score of the suggested S-box is 12 and the differential probability(DP)value is 0.0468.This low DP score demonstrated that the S-box is highly resistant to differential assaults.Table 11 compares DU with several S-boxes,and Fig.3 depicts a graphical comparison of the suggested S-box’s DP values with those of previously developed S-boxes in the literature.

      Table 11: Analysis between DU and LAP scores of recommended S-boxes with some other S-boxes

      Figure 3:Pie chart of DP values of recommended S-box with some other S-boxes

      3.5 Linear Approximation Probability(LAP)

      LAP criterion is used to check the strength and resistance of the S-box to linear assaults.In[49],Matsui provided this algebraic feature of S-box.The S-box is considered more secure whenever the value of LAP is smaller.A mathematical formula to calculate LAP is:

      whereλpandλqdenote the input and output mask,respectively,2nis the total number of elements of the S-box andψrepresents the Boolean functions.The LAP value of the created S-box is 0.13281.Table 11 indicates the comparison among the LAP scores of the suggested S-box and various other S-boxes.

      4 Results and Discussion

      Researchers’major emphasis for the creation of powerful substitution boxes is a significant nonlinearity score.Our S-box has a mean nonlinearity of 112.75,which is higher than the AES Sbox as well as the other S-boxes from the literature shown in Table 6.

      1.The S-box creators’ultimate goal is to obtain the ideal SAC value of 0.5.Our S-box has a SAC score of 0.4973,which is close to 0.5 when contrasted to other S-boxes in Table 10.We can claim that our S-box is impervious to cryptanalysis.

      2.The proposed S-box BIC NL and BIC SAC scores are 103.64 and 0.501,respectively.Table 9 and Fig.2 provide a comparison of the values of BIC NL and BIC SAC.

      3.Low DP S-boxes are resilient to different types of attacks.The DP score of the created S-box in Fig.3 is 0.0468,which is lower than the DP numbers of many other S-boxes.

      4.The recommended S-box’s LAP value is 0.13281.This low value implies that the proposed Sbox is resistant to linear assaults.Table 11 compares the LAP value of created S-box to that of other S-boxes.

      5 Conclusion

      In this study an algebraic strategy for generating the substitution boxes was introduced.This methodology depends on fractional transformation and finite field.We designed a general form of transformation and choose quadratic fraction transformation as an example to generate an S-box.The nonlinearity of the proposed S-box after applying the permutations ofS256is 112.75 which is higher than AES S-box.The other algebraic properties of the S-box are good enough to stand against linear and differential approaches.The comparison between the algebraic and statistical properties of our S-box with many other S-boxes from the literature indicates that the recommended S-box withstands cryptanalysis attacks and can be used further to improve a security.Although a static prototype Sbox is created in this study,it will be feasible to create dynamic S-boxes in the future by utilizing the suggested mathematical methodology,which will enable the creation of a robust and effective cryptosystem that will safeguard sensitive and private data.

      6 Limitation

      This study develops a fractional transformation for creating substitution boxes that are applied to even values ofmwhenm={2,6,10,...,254} and we simply swap each missing element with a repeating element to keep the S-box bijective.If m is a multiple of 4,it is impossible to construct an S-box and it is impossible to maintain the bijectivity of the S-box because elements repeat more than once.

      Acknowledgement:The authors would like to thanks for supporting the funding of this paper under the “Research Supporting Project Number (RSP2023R167),King Saud University,Riyadh,Saudi Arabia”.

      Funding Statement:The authors received the funding for this study from King Saud University,Riyadh,Saudi Arabia under the research supporting project Number RSP 2023R167.Sameh Askar received this grant from King Saud University.

      Conflicts of Interest:The authors declares that they have no conflicts of interest to report regarding the present study.

      西和县| 桦川县| 双柏县| 故城县| 宝山区| 遂溪县| 西乡县| 汉沽区| 桦南县| 靖州| 区。| 南木林县| 砚山县| 横山县| 芜湖市| 荥阳市| 曲靖市| 远安县| 惠水县| 富顺县| 万盛区| 阳西县| 鹿泉市| 察哈| 兴仁县| 新蔡县| 惠来县| 石屏县| 监利县| 兰考县| 泗阳县| 永宁县| 平潭县| 迁西县| 朝阳区| 江门市| 巴东县| 太湖县| 临夏市| 阳城县| 郯城县|