Literature DB >> 33180847

A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field.

Nasir Siddiqui1, Fahim Yousaf1, Fiza Murtaza2, Muhammad Ehatisham-Ul-Haq3, M Usman Ashraf4, Ahmed M Alghamdi5, Ahmed S Alfakeeh6.   

Abstract

Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic algorithms offering security facilities for maintaining more cover-ups. A substitution-box (S-box) is the lone component in a cryptosystem that gives rise to a nonlinear mapping between inputs and outputs, thus providing confusion in data. An S-box that possesses high nonlinearity and low linear and differential probability is considered cryptographically secure. In this study, a new technique is presented to construct cryptographically strong 8×8 S-boxes by applying an adjacency matrix on the Galois field GF(28). The adjacency matrix is obtained corresponding to the coset diagram for the action of modular group [Formula: see text] on a projective line PL(F7) over a finite field F7. The strength of the proposed S-boxes is examined by common S-box tests, which validate their cryptographic strength. Moreover, we use the majority logic criterion to establish an image encryption application for the proposed S-boxes. The encryption results reveal the robustness and effectiveness of the proposed S-box design in image encryption applications.

Entities:  

Year:  2020        PMID: 33180847      PMCID: PMC7660566          DOI: 10.1371/journal.pone.0241890

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.240


1. Introduction

The significance of information security is expanding with time and the areas of communication and data transformation are becoming more and more complicated. It has now become very imperative to secure the transformation of essential data across insecure networks. The cryptographic algorithms provide the security and protection of the critical data and information getting transferred over insecure channels [1]. A block cipher is one of the most critical components of cryptography. Shannon [2] introduced the notion of modern cryptography in 1949. The block ciphers such as Data Encryption Standard (DES) [3] and Advanced Encryption Standard (AES) [4] rely on Shannon’s principle of confusion and diffusion [1, 5], where AES is the standard encryption technique approved by the National Institute of Standards and Technology (NIST). Confusion refers to the practice of making the correlation between the ciphertext and the key as intricate and complex as possible so that no one can understand the key by knowing the ciphertext. On the other hand, diffusion is the process of dissipating the influence of one plaintext bit on multiple ciphertext bits to obscure the statistical redundancies of the plaintext. Substitution-box (S-box) is the only dynamic component of the block ciphers that provides confusion through nonlinear mapping of inputs and outputs to adhere to the drill of encryption. The strength of an encryption method depends on the strength of the S-box [6, 7], which is evaluated using the NIST criteria. The nonlinearity of an S-box causes uncertainty in the output, which offers resistance against linear and differential cryptanalysis attacks [8]. An S-box design that yields high nonlinearity and low linear and differential probability is critical for a cryptosystem. Many researchers laid their potential to design secure and reliable S-boxes. Rijndael proposed an algebraic S-box, called AES S-box [4], which is an integral part of the AES algorithm. Cui et al. [9] designed an improved AES S-box called Affine-Power-Affine (APA). In APA, the algebraic expression complexity of the AES S-box is increased from 9 to 253 terms while keeping the complexity of inverse S-box the same, i.e., 255. In [10], the authors presented Gray S-box for AES, which is generated by the addition of binary Gray code transformation to the standard AES S-box. The authors in [11] presented an improved AES S-box in which they enhanced the complexity of AES S-box algebraic expression with terms increasing from 9 to 255 and algebraic degree invariable. The improved AES S-box is capable of resisting against differential cryptanalysis with high dependable security. The authors in [12] modified the affine transformation of the AES S-box to minimize the time complexity of AES. In [13], the authors proposed a new S-box based on fractional linear transformation on the Galois field GF(28), which can create confusion in the data. A few research studies [14-16] also put emphasis on using Cellular Automata (CA) for designing dynamic S-boxes and attained comparable cryptographic properties. In [17], the authors proposed two different S-boxes for AES by modifying the affine transformation matrices. In [18, 19], the authors proposed a variable and dynamic S-box mapping for AES using different irreducible polynomials. Thus, a different S-box is generated in each round of AES, which enhances the security of AES but only generates a limited number of S-boxes. The research works in [20-25] proposed key-dependent S-boxes based on secret keys for enhancing the security of AES. Algebraic properties like group and rings [13, 26, 27], cubic fractional transformation [28], and Elliptic curve [29] have also been utilized to strengthen the differential probability of an S-box. In [30], Gaussian distribution and linear fractional transformation are used to design an S-box. The authors applied the Box-Muller transform, polarization decision, and central limit algorithm for generating the S-box. In [31], the authors proposed a method that generates highly non-linear n×n S-boxes (where 3 ≤ n ≤ 7). The authors used heuristic optimization to obtain the best S-box. Hussain et al. [32] developed a new construction method of S8 S-boxes by using the action of the symmetric group S8 on AES S-box that gives 40320 new S-boxes with the same strength as AES S-box. In [33], the authors proposed a hybrid scheme based on chaotic map and affine transformation to generate multiple S-boxes using rotational matrices. The research work in [34] utilized a chaotic map along with algebraic groups to proposed another hybrid method for generating non-linear S-boxes. A. Razzaq et al. [35] presented a new scheme for S-box design, which is based on the coset graphs and symmetric groups. Their proposed S-boxes attain strong cryptographic properties. In [36], the authors proposed an S-box design method based on single expression algebra to reduce the computational complexity of S-box design. Many researchers have utilized S-boxes in image encryption applications as well [37-41]. In [42], the authors proposed a novel method for image encryption in the Fresnelet domain. The proposed algorithm is dependent on the Fresnelet transform-based image decomposition along with an algebraic S-box. In [43], Shah et al. endorsed a standard norm to evaluate the fundamental types of S-boxes and analyze their competency for image encryption applications. Xiangjun et al. [44] presented a novel technique for color image encryption, which is based on coupled-map lattices (CML) and a fractional-order chaotic system. In this study, we proposed a novel and efficient technique for designing 8×8 S-boxes based on the action of modular group on a projective line PL(F7) over a finite field F7. For this purpose, we draw a coset diagram for the action of on PL(F7) and form its adjacency matrix [45]. Then, we apply the adjacency matrix on Galois field GF(28) elements using a set of different transformations to obtain bijective S-boxes. We inspect the cryptographic strength of the proposed S-boxes based on the NIST criteria using algebraic analyses such as nonlinearity, strict avalanche criterion, bit independent criterion, differential approximation probability, and linear approximation probability. Moreover, we utilized the proposed S-boxes for image encryption and perform statistical analyses on plain and encrypted images based on majority logic criterion [43, 46]. The rest of the paper organization is as follows. Section 2 explains the proposed method for S-box construction. Section 3 provides a discussion and comparison of the cryptographic strength of the proposed S-boxes. Section 4 discusses the application of the proposed S-boxes in image encryption along with its results. Finally, Section 5 concludes the findings of this research paper.

2. Proposed method for S-box design

The proposed method for S-box construction is shown in Fig 1, which consists of four key steps. First, we perform an action of the modular group or projective special linear group on a projective line PL(F7) over a finite field F7 to yield a permutation group G. After that, we draw a coset diagram for the permutation group G obtained corresponding to the action of on PL(F7). Then, we generate an adjacency matrix corresponding to the obtained coset diagram. Finally, we use this adjacency matrix and apply an affine transformation on the Galois field elements followed by the addition of an 8-bit number to generate the final S-box.
Fig 1

Proposed methodology for S-box design.

The following sections briefly explain the key steps involved in the proposed S-box construction methodology.

2.1. Action of modular group on projective line PL(F7)

The modular group is a group comprises of all linear transformations , where a,b,c, and d are some integers satisfying the relation is generated by linear fractional transformations and , which satisfy the relations x2 = y3 = 1. Eq (1) gives the finite representation of the modular group . A projective line over a Galois field Fn adds an extra point ∞ to Fn and is represented by PL(Fn). Hence, a projective line PL(F7) over a field F7 contains eight points, which give rise to a coset diagram having eight vertices. Eq (2) defines a projective line PL(F7) over a finite field F7. The action of on PL(F7) yields a permutation group G, which is generated by and given below.

2.2. Generation of coset diagram for permutation group G

After generating the permutation group G, we first draw a coset diagram using permutations and . A coset diagram is a graphical way of representing the permutation action of a finitely-generated group [45]. Fig 2 shows the coset diagram obtained for the permutation group G. Since, and are of order 2 and 3 respectively, therefore, the generator is denoted by an edge and the generator is represented by a triangle. The vertices of the triangle are permuted counterclockwise and fixed points of are denoted by heavy dots in the coset diagram.
Fig 2

Coset diagram corresponding to the permutation group G.

2.3. Adjacency matrix generation for coset diagram

Next, we generate an adjacency matrix M from the coset diagram for the action of the on PL(F7). The adjacency matrix for a directed graph G = (V,E), where V is the set of vertices and E is the set of edges, has a value 1 in its (i,j)th position if there exists an edge from vi to vj, where v1,v2,…,vn is an arbitrary listing of the vertices of the directed graph [47]. If we consider M = [mij] as the adjacency matrix for the directed graph, then mij is defined as given below in Eq (3). In the coset diagram shown in Fig 2, the vertices are labeled as 0,1,2,3,4,5,6, and ∞. It can be seen from the figure that there exists an edge from 0 to ∞, therefore in the adjacency matrix, the entry of the 1st row and 8th column is taken as 1 and all the remaining entries are set equal to zero in the 1st row. Similarly, in the 2nd row of the adjacency matrix, the 1st and 7th elements are 1 because there exists an edge from 1 to 0 and 1 to 6. All other entries are equal to zero in this row. In the same way, by filling up the remaining entries in the matrix, we form an adjacency matrix M as given below. This adjacency matrix M is used in the later stage to generate the proposed S-boxes.

2.4. Affine mapping of Galois field using adjacency matrix

By applying the obtained adjacency matrix M on Galois field GF(28), the obtained results are not distinctive. As the S-box elements must be unique, hence to attain the unique outcomes, we apply a transformation T on GF(28). In this aspect, we propose a set of transformations Tk, which is applied on the Galois field GF(28) elements to generate multiple S-boxes, as shown in Eq (4). where, tn represent the element of the Galois field GF(28) in 8-bit binary form with n = 0,1,2,…,255, Tk represents a set of eight different transformations with k = 1,2,…,8, and I represents eight different sets of integer(s) given as: I1 = {1,2,3,…,128}, I2 = {2,4,6,…,128}, I3 = {4,8,12,…,128}, I4 = {8,16,24,…,128}, I5 = {16,32,48,…,128}, I6 = {32,64,96,128}, I7 = {64,128}, and I8 = {128}. For k = 8, we get T8(t) = Mt+t(mod 256) from Eq (4). Similarly, taking k = 7 provides us T7(t) = Mt+t+t(mod 256). Table 1 shows the process of generating the S-box elements using transformation T8 (i.e., for k = 8). Likewise, other transformations (i.e., T1 to T7) can be applied on the Galois field GF(28) elements to generate more S-boxes. T7(t) = Mt+t+t(mod 256). Tables 2–9 present the proposed S-boxes generated as a result of applying transformations T1 to T8 on the Galois field GF(28) elements, respectively, using the proposed scheme.
Table 1

Generation of the proposed S-box elements based on a transformation T8.

tnϵGF(28)T8(tn) = Mtn+tn+128(mod 256)S-box output
t0 = (0)d = [0 0 0 0 0 0 0 0]tT8(t0) = Mt0+t0+128(mod 256)[1 1 0 1 1 0 0 0]t = (27)d
t1 = (1)d = [1 0 0 0 0 0 0 0]tT8(t1) = Mt1+t1+128(mod 256)[0 0 1 0 1 1 1 1]t = (244)d
t2 = (2)d = [0 1 0 0 0 0 0 0]tT8(t2) = Mt2+t2+128(mod 256)[0 0 0 1 1 1 1 1]t = (248)d
...
...
...
t254 = (254)d = [0 1 1 1 1 1 1 1]tT8(t254) = Mt254+t254+128(mod 256)[1 1 1 1 1 1 1 1]t = (255)d
t255 = (255)d = [1 1 1 1 1 1 1 1]tT8(t255) = Mt255+t255+128(mod 256)[0 1 1 1 1 1 1 1]t = (254)d
Table 2

Proposed S-box (S1) in 16 × 16 matrix form—Generated with T1.

0123456789ABCDEF
00244165892214721057118616318448303949
11649421114321918771007246181231132252174154
221688200113151651999224102215671999189220
396138226177821791359108812306332501908
4104352479751311531453726155928522216120
52319652531208250180202872819851139109106
624895272993170133581667812417622115721090
72182512351752073466117172091351072112127253
8841612135412516815061204228414624798152173
92421911212332122321698022923821740255126225171
A22368140561025421601881597129115118128144
B19470771851162437411213015991363317811038
C246411141921621721455214249627614811193203
D241134864460206141239240202375718315623647
E531811422458310369158101167122457313643
F2013195641231971196234227137111182149205254
Table 9

Proposed S-box (S8) in 16 × 16 matrix form—generated with T8.

0123456789ABCDEF
02724424889133147931051241861661842103022149
12359421814366187207100135461723112725221154
22488104113153657591551023767169985220
35213823177250179315928812026310950518
42003521679199131151145215262249218922219120
522619696513208821802308710819819013932106
616595029217022581637871176391574890
72112511641757342191171812097210717412132253
811615354103168245611672281581461369845173
91951912012331192321238013723823440205126182171
A114682465614251621606215214129193118148144
B8670241185141243601122371592403623617818338
C14041223192421721055972491887612811115203
D7713419444742061162399120130571101563347
E2131884142150831256941012041221527324743
F1213242641691972126217227229111225149255254
The subscript d represents a number in decimal form, whereas the superscript t donates the transpose of a vector.

3. Performance analysis of proposed S-boxes

In this section, we validate the cryptographic strength of the proposed S-boxes (presented as S1-S8 in Tables 2–9, respectively) by commonly used parameters, which include: nonlinearity [48], bit independence criterion (BIC) [13, 49], strict avalanche criterion (SAC) [49], linear and differential approximation probabilities [50]. The nonlinearity of an n-variable Boolean function represents the minimum distance of the reference function from the set of all n-variable affine functions. Mathematically, the relationship between the nonlinearity of an n-variable Boolean function and the Walsh Hadamard transform of that function is defined as [48]. For GF(28), the optimal value of nonlinearity is 120. The BIC quantifies the independence between the avalanche variables. To test this criterion, the variables are compared pairwise to extract knowledge about the independence of these variables. The input bits are complemented individually, and the output vectors are analyzed for independence. The SAC depends upon the variation of the input outcomes and output bits. An S-box satisfies the SAC only if changing a single input bit yields a change in half of the output bits. An ideal S-box has the SAC value equal to one-half, i.e., 0.5 [49]. The linear approximation probability (LAP) identifies the probability of bias for a given S-box, whereas the differential approximation probability (DAP) measures the differential uniformity of an S-box [50]. The mathematical description of the LAP and DAP are given in Eqs (5) and (6) respectively. where, Γx and Γy are input and output masks respectively, x is the set of all probable input values and is the number of S-box elements. where, Δx represents input differential, Δy is output differential, X is the set of all probable inputs, and 2n is the number of its elements. As the research on S-box construction is becoming increasingly vital, numerous researchers have designed tools for testing S-box performance [51-53], which are based on the NIST criteria. These tools provide ease to the researchers in testing and verifying the S-box parameters. For validating the proposed S-boxes in our paper, we utilized the S-box testing tool presented by the authors in [51]. Table 10 summarizes the numerical values of the performance metrics obtained for the proposed S-boxes and compares these results with those obtained for some well-known S-boxes.
Table 10

Numerical results of the S-box testing parameters obtained for our proposals in comparison with the existing S-boxes.

S-boxNonlinearitySACBICLAPDAP
ProposedS1112.00.4951112.00.06250.0156
S2112.00.4951112.00.06250.0156
S3112.00.4970112.00.06250.0156
S4112.00.5000112.00.06250.0156
S5112.00.4995112.00.06250.0156
S6112.00.4953112.00.06250.0156
S7112.00.4960112.00.06250.0156
S8112.00.4953112.00.06250.0156
AES [4]112.00.5058112.00.06250.0156
APA [9]112.00.4987112.00.06250.0156
Gray [10]112.00.505111.460.06640.0156
Zahid et al. [28]107.00.497103.50.15600.0390
Farwa et al. [41]103.50.5065103.30.13280.0468
Aboytes et al. [16]112.00.4998112.00.06250.0156
Khan et al. [30]111.00.5036110.00.07810.0234
Hayat et al. [29]100.00.5007104.10.03900.1250
By investigating the results presented in Table 10, it can be stated that the proposed S-boxes achieve high nonlinearity and BIC value (i.e., 112), which is the maximum possible value achieved with any of the existing S-boxes till now. The proposed S-boxes also satisfy the SAC test by achieving a near-optimal value of 0.5. Furthermore, the maximum value of linear and differential approximation probability for all the proposed S-boxes is 0.0625 and 0.0156 respectively, which is better than or comparable to those obtained for existing S-boxes as shown in Table 10. Overall, the proposed S-boxes yield a high nonlinearity and low linear and differential probability values, thus offering strong resistance against linear and differential cryptanalysis. As a result, we conclude that the proposed S-boxes possess strong algebraic and cryptographic properties, thus capable of demonstrating effective performance in different security applications. The proposed S-box design provides an additional advantage over the standard AES S-box in the sense that it can generate multiple S-boxes using the single adjacency matrix. If the affine matrix is changed adhering to the defined criteria in our proposed method, a new set of S-boxes can be generated with the same cryptographic strength as AES S-box. In this aspect, the additional cost of generating the affine matrix is trivial, thus the overall complexity per S-box generation tends to be insignificant. As a result, it can be stated that the proposed S-box design method is computationally feasible and the obtained S-boxes are cryptographically strong as the AES S-box.

4. Application of proposed S-box in image encryption

As an application of the proposed S-boxes, we perform image encryption using proposed S-boxes and assess their strength and robustness in image encryption based on the majority logic criterion (MLC) [43, 46]. We take a standard 8-bit Baboon image of size 512 × 512 as a plain gray-level image and encrypt this image independently using AES S-box and the proposed S-boxes (i.e., S2, S5, and S7). For this purpose, we substitute every pixel value in the image with the corresponding value in the S-box, which scrambles the visual information in the image and provides image encryption. We perform one round encryption on plain Lena image and carry out some statistical analyses on plain and encrypted images. These analyses include entropy, energy, correlation, contrast, and homogeneity analysis [46]. Table 11 provides a brief description of these statistical parameters, which are computed using a gray-level co-occurrence matrix (GLCM) [46]. The numerical results of these parameters are provided in Table 12.
Table 11

Statistical analysis parameters with description and formulae.

Statistical AnalysisyDescriptionFormulae
EntropyMeasures the randomness in an image and provides information about the image texture/gray levelH=k=0np(rk)log2p(rk)
EnergyQuantifies the energy in an image by using GLCME=abp2(a,b)
CorrelationEvaluates the independence between the plain and encrypted imagesK=a,b(aμa)(bμb)p(a,b)σaσb
ContrastDetermines the diffusion on an image and identifies the objects in an imageC=ab(ab)2p(a,b)
HomogeneityDetermines the characteristics of the distribution exhibited by the elements in the GLCM with respect to the GLCM diagonalH=abp(a,b)1|ab|

* p(a,b) is the number of GLCMs.

Table 12

Comparison of statistical analysis parameters obtained for plain and encrypted Baboon images.

Statistical AnalysisPlain ImageEncrypted Baboon Image with different S-boxes
AESS2S5S7S8
Entropy7.3587.3587.3587.3587.3587.358
Energy0.0890.0160.0160.0160.0160.016
Correlation0.8300.0140.0180.0110.0060.026
Contrast0.61710.509.80810.059.8639.849
Homogeneity0.7870.4000.4060.4010.4070.402
* p(a,b) is the number of GLCMs. It can be observed from Table 12 that the proposed S-box (i.e., S2, S5, S7, and S8) provides effective image encryption results and the obtained parameters are mostly comparable to the AES S-box. The entropy value obtained for the encrypted images using the proposed S-boxes is 7.358, which is near to the ideal value of 8. As the entropy measures the randomness in an image, hence, the nonlinear substitution of input and output elements in the image amplifies its randomness. The energy measure value of the plain Baboon image is 0.089. After encrypting this plain image with the proposed S-boxes, we achieve an energy value of 0.016, which is comparable to the AES S-box energy value. The smaller energy measure indicates the efficient performance of the proposed S-boxes in image encryption. To show the linear independence between the plain and encrypted images, we find out the correlation coefficient between both images. A coefficient value near 0 represents no or weak linear correlation between both images. In the case of image encryption with the proposed S-boxes, the correlation between the plain image and its encrypted form is 0.018, 0.011, 0.006, and 0.026 using S2, S5, S7, and S8 S-boxes, respectively, as shown in Table 12. These statistics represent that there is a weak linear correlation among the input and output pixel values. Hence, the proposed S-boxes provide good encryption properties such as confusion and diffusion. Moreover, the proposed S-boxes achieve a high contrast value (more than 9.8). A constant image has a contrast value of 0. Generally, a high value of contrast means more randomness in the image. Due to the nonlinearity of mapping, the objects in the image are distorted entirely after applying the S-box. That is why the high value of contrast in the encrypted image shows strong encryption. Finally, we perform the homogeneity analysis to measure the closeness of the distributed elements of GLCM to its diagonal. Table 12 also displays the results of this statistical analysis, where the proposed S-boxes achieve an acceptable homogeneity value, which results in the favor of having better encryption. So, overall, the image encryption results obtained for the proposed S-boxes are comparable to the state-of-the-art results as shown in Table 12. Fig 3 provides a visual demonstration of encrypted images using different S-boxes. It can be observed from the figure that the proposed S-boxes effectively hide the visual information contained in the plain image, which indicates their excellent performance in image encryption. Therefore, we conclude that the proposed S-box design can be successfully utilized for image encryption applications.
Fig 3

Image encryption using the proposed S-box design.

(a) Plain Baboon color image, (b) Plain Baboon gray-scale image, (c) Encrypted Baboon image using AES S-box, (d) Encrypted Baboon image using proposed S-box (S2), (e) Encrypted Baboon image using proposed S-box (S5), and (f) Encrypted Baboon image using proposed S-box (S7).

Image encryption using the proposed S-box design.

(a) Plain Baboon color image, (b) Plain Baboon gray-scale image, (c) Encrypted Baboon image using AES S-box, (d) Encrypted Baboon image using proposed S-box (S2), (e) Encrypted Baboon image using proposed S-box (S5), and (f) Encrypted Baboon image using proposed S-box (S7).

5. Conclusions

In this paper, we present a novel matrix-based approach for the construction of highly nonlinear S-boxes. For this purpose, we first construct an adjacency matrix of size 8×8 corresponding to the coset diagram obtained for the action of projective special linear group on a projective line PL(F7) over a finite field F7. Afterward, we apply this adjacency matrix on the Galois field GF(28) using a set of algebraic transformations to generate the final 8×8 S-boxes. We analyze the algebraic strength of the proposed S-boxes with common S-box tests, which validate their cryptographic strength. Furthermore, we also utilize the proposed S-boxes for image encryption and use statistical analyses to investigate the performance of our proposed S-boxes, which demonstrate the effectiveness of the proposed S-box design in image encryption applications. In the future, the proposed scheme can be expanded to generate n×n S-boxes using different action groups and adjacecy matrices of size n×n.
Table 3

Proposed S-box (S2) in 16 × 16 matrix form—Generated with T2.

0123456789ABCDEF
027142182482104373221839313369101166124122
1524413423109471565120631250239202022857
21351112271766619720714921127254321823564
3155762493715355172751185162034110424192
46821620056118191891441991602515121512915224
51911642112331261321741717802322191814023872
615910823036243821311219038178322261857096
72287116314616822261391739848165541610
8842448921324730491521051501251471844204186
919413817777335081105974116179639113081
A2294623121721218710016915422525525214312124294
B188102679710659422201281159911314022388
C791142463512019314822216213114514214269262
D1751952012512532051821212334117119234209107137
E1982372408718014160208183139106236241196586
F176167158785810324517045157901365395291
Table 4

Proposed S-box (S3) in 16 × 16 matrix form—Generated with T3.

0123456789ABCDEF
0029165951331479310571176163782103022149
1164175211251661872071007210718120912725221154
22167920035153657592249221526169985220
396522619625017931591081982308710950518
41041132488199131151145376715510218922219120
52317752138132088218020263288119013932106
6248892724421702258166184124186391574890
721814323594734219117172311354617412132253
884142213181031682456120412241011369845173
924264121311923212380229111217227205126182171
A2231921404114251621601887697249193118148144
B19444771341412436011213057912023617818338
C2465611468421721055214129621512811115203
D241185867074206116239240362371591101563347
E5354116115083125691581461672281527324743
F201233195191169197212623440137238225149255254
Table 5

Proposed S-box (S4) in 16 × 16 matrix form—Generated with T4.

0123456789ABCDEF
002916595225821701241861661842103022149
1164175211251219117734135461723112725221154
221679200351511451991311551023767169985220
3965226196821801320828812026310950518
4104113248875915365215262249218922219120
5231775213831592501792308710819819013932106
62488927244931051331471637871176391574890
721814323594207100661871812097210717412132253
8841422131812569150831672281581461369845173
9242641213212616919713723823440205126182171
A223192140411055421726215214129193118148144
B1944477134116239742062371592403623617818338
C24656114681621601425972491887612811115203
D2411858670601121412439120130571101563347
E535411612456110316841012041221527324743
F20123319519112380119232217227229111225149255254
Table 6

Proposed S-box (S5) in 16 × 16 matrix form—Generated with T5.

0123456789ABCDEF
002916595225821707117616378489039157
12359421814366187207100135461723112725221154
22167920035151145199131224922152619120189222
35213823177250179315928812026310950518
41041132488759153653767155102852201699
522619696513208821802308710819819013932106
62488927244931051331471661841241862214921030
72112511641757342191171812097210717412132253
88414221318125691508320412241012474315273
91951912012331192321238013723823440205126182171
A22319214041105542172188769724911520312811
B8670241185141243601122371592403623617818338
C246561146816216014252141296215148144193118
D7713419444742061162399120130571101563347
E53541161245611031681581461672284517313698
F1213242641691972126217227229111225149255254
Table 7

Proposed S-box (S6) in 16 × 16 matrix form—Generated with T6.

0123456789ABCDEF
02714254165210431733983932216810116671228
152441852261094738190206318224320202108159
2722382271721923219720717117412725423321123564
322415249371512517275144189162035620024192
468216104411181985111991605515321512976155
519116421831261322114978066618140111135
6572823036239250131125115617832231347096
712212416314669133261221739848248181610
88424495532473015745105150103581844167176
9194138196241335013918359741411806391237198
A1371072312171191171001691218225525225120124294
B6292679714145942222148115993524622388
C79114140113120193128220162131651021426102188
D1751951211432532052251541233418721223420946229
E811302408717911660208110810623677177586
F18620415878147125245170152499013621389291
Table 8

Proposed S-box (S7) in 16 × 16 matrix form—Generated with T7.

0123456789ABCDEF
018248016173221489813369612124122146163
1134239670156513217825023911213285736230
2227177223819720721923212725417117423564233211
324937224151727515125162031441892419256200
410441682168511118195515319916076155215129
521831911642114912613266678011113518140
620220159108312062438247109190384452226185
71661012287193831682243210391731422716554
889213129491521369012514717024520418678158
9177778658110236106116179208601308187240
A2312171371071001691191172552521218224294251201
B6797629294214145115992221482238835246
C14011379114128220120193651016213110218821426
D1211431751952251542532051872121233446229234209
E916319823774591801415033183139138194241196
F4184176167150105581033024745157244845395
  4 in total

1.  A new color image encryption scheme using CML and a fractional-order chaotic system.

Authors:  Xiangjun Wu; Yang Li; Jürgen Kurths
Journal:  PLoS One       Date:  2015-03-31       Impact factor: 3.240

2.  A highly nonlinear S-box based on a fractional linear transformation.

Authors:  Shabieh Farwa; Tariq Shah; Lubna Idrees
Journal:  Springerplus       Date:  2016-09-26

3.  Joint image compression and encryption based on sparse Bayesian learning and bit-level 3D Arnold cat maps.

Authors:  Xinsheng Li; Taiyong Li; Jiang Wu; Zhilong Xie; Jiayi Shi
Journal:  PLoS One       Date:  2019-11-18       Impact factor: 3.240

4.  A novel encryption scheme for high-contrast image data in the Fresnelet domain.

Authors:  Nargis Bibi; Shabieh Farwa; Nazeer Muhammad; Adnan Jahngir; Muhammad Usman
Journal:  PLoS One       Date:  2018-04-02       Impact factor: 3.240

  4 in total
  1 in total

1.  A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map.

Authors:  Asim Ali; Muhammad Asif Khan; Ramesh Kumar Ayyasamy; Muhammad Wasif
Journal:  PeerJ Comput Sci       Date:  2022-05-11
  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.