Literature DB >> 35634082

Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain.

Muhammad Fahad Khan1,2, Khalid Saleem1, Tariq Shah3, Mohammad Mazyad Hazzazi4, Ismail Bahkali5, Piyush Kumar Shukla6.   

Abstract

The protection of confidential information is a global issue, and block encryption algorithms are the most reliable option for securing data. The famous information theorist, Claude Shannon, has given two desirable characteristics that should exist in a strong cipher which are substitution and permutation in their fundamental research on "Communication Theory of Secrecy Systems." block ciphers strictly follow the substitution and permutation principle in an iterative manner to generate a ciphertext. The actual strength of the block ciphers against several attacks is entirely based on its substitution characteristic, which is gained by using the substitution box (S-box). In the current literature, algebraic structure-based and chaos-based techniques are highly used for the construction of S-boxes because both these techniques have favourable features for S-box construction but also various attacks of these techniques have been identified including SAT solver, linear and differential attacks, Gröbner-based attacks, XSL attacks, interpolation attacks, XL-based attacks, finite precision effect, chaotic systems degradation, predictability, weak randomness, chaotic discontinuity, and limited control parameters. The main objective of this research is to design a novel technique for the dynamic generation of S-boxes that are safe against the cryptanalysis techniques of algebraic structure-based and chaos-based approaches. True randomness has been universally recognized as the ideal method for cipher primitives design because true random numbers are unpredictable, irreversible, and unreproducible. The biggest challenge we faced during this research was how can we generate the true random numbers and how can true random numbers utilized for strengthening the S-box construction technique. The basic concept of the proposed technique is the extraction of true random bits from underwater acoustic waves and to design a novel technique for the dynamic generation of S-boxes using the chain of knight's tour. Rather than algebraic structure- and chaos-based techniques, our proposed technique depends on inevitable high-quality randomness which exists in underwater acoustics waves. The proposed method satisfies all standard evaluation tests of S-boxes construction and true random numbers generation. Two million bits have been analyzed using the NIST randomness test suite, and the results show that underwater sound waves are an impeccable entropy source for true randomness. Additionally, our dynamically generated S-boxes have better or equal strength, over the latest published S-boxes (2020 to 2021). According to our knowledge first time, this type of research has been conducted, in which natural randomness of underwater acoustic waves has been used for the construction of block cipher's substitution box.
Copyright © 2022 Muhammad Fahad Khan et al.

Entities:  

Mesh:

Year:  2022        PMID: 35634082      PMCID: PMC9142301          DOI: 10.1155/2022/8338508

Source DB:  PubMed          Journal:  Comput Intell Neurosci


1. Introduction

Information security is the protection of secret data from illegal access, disclosure, inspection, destruction, disruption, and modification. The protection of confidential information is a global issue and block encryption algorithms are the most reliable option [1]. Block cipher is a branch of deterministic algorithm that works on the static length of bits, which is called block. Block cipher algorithms split the plaintext into various blocks of size k, to generate the same number of encrypted blocks of size n. Block ciphers encrypt one block at a time and the size of the output block is always equal to the input block and the transformation from input block to output block is done through the key whitening operation. Block cipher merged the confusion-diffusion primitives iteratively using a round function to generate an encrypted text. AES, DES, GOST, and BLOWFISH are the most prominent block ciphers of the industry that used the same strategy. For the block encryption algorithms such as AES, GOST, BLOWFISH, DES, and linear-differential attacks are the most powerful attacks [2-6]. In the differential attack, the basic purpose is to detect the sequential patterns from the encrypted text and for this purpose, the attacker tries to apply a specific set of inputs to trace the change in output. In the linear attack, the basic purpose is to find the linear relation among the plain text, cipher text with the corresponding keys. The responsibility to create a randomized relation among ciphertext and the key is on the confusion component; also, the confusion component is totally responsible to provide resistance against the linear and differential attacks [1-11]. Block cipher's confusion component is generally known as substitution (S-box) which transforms k input bits into m output bits through S:{0,1}⟶{0,1}, transforms vector z = [z, z, z … z0] into output vector k = [k, k, k,…, k0]. As S-box is the only nonlinear primitive of block cipher, so the block cipher strength depends on its design. Cipher designers used various approaches to construct good quality S-boxes. Chaos-based and algebraic structure-based techniques are highly used for the construction of S-boxes. Chaos-based and algebraic structure-based techniques have favourable features for S-box construction, but many cryptanalysis of these techniques have been identified in the current literature. These cryptanalysis are described in Section 3. Underwater acoustic is generated by a diverse nature of sound sources such as underwater volcanoes, snapping shrimp, reverberation, vibrating objects, breaking waves, marine life, man-made sources, rain, geological activities, scattering waves, reflection waves, random motion of water molecules, lightning strikes, ice cracking, earthquake, compression, and decompression of water molecules [12-22]. Due to these diverse natures of sound sources, inevitably high-quality randomness exists in the amplitude characteristic of the underwater acoustics, which was our main source of inspiration because true randomness has been universally recognized as the ideal primitive for cryptography. True random numbers (TRNs) are unpredictable, irreversible, and unreproducible that is why cipher researchers endorsed the true random number for cryptographic primitives design [23-30]. The main idea of this research paper is extraction of true random bits from underwater acoustic waves and to design a novel technique for the dynamic generation of cryptographic S-boxes using the chain of knight's tour. The main benefit of our approach is that the proposed technique depends on the natural randomness of underwater acoustic waves for the construction of S-boxes and that's why various existing chaos and algebraic structure-based attacks are bypassed for our proposed technique. The rest of the paper is arranged as follows. Section 2 presents our main contribution. Section 3 shows the potential cryptanalysis and attacks. Section 4 describes the proposed methodology for the dynamic generation of strong S-boxes. Section 5 presents results and discussion. Section 6 shows the conclusion. A novel technique is proposed based on combination selection, for the generation of true random numbers from the randomness which exists in the amplitude property of underwater acoustics. As an assessment, two million bits have been analyzed using the NIST randomness test suite, and results show that underwater acoustic waves are an impeccable entropy source for TRNG. Knight's tour-based, a novel technique is proposed, for the dynamic generation of S-boxes and as a result attacks of algebraic- and chaos-based techniques are not applicable and irrelevant for our proposed technique. According to our knowledge first time, this type of research has been conducted, in which natural randomness of underwater acoustic waves has been used for the construction of block cipher's substitution box.

3. Potential Attacks of Existing S-Box Designs

As we said before, chaos-based and algebraic structures-based techniques are widely used for the construction of Shannon's confusion primitive but many attacks of these techniques have been identified in the current literature including Gröbner-based attacks [2-8], SAT solver [9–11, 31–35], linear and differential attacks [36-50], XSL attacks [51-55], interpolation attacks [51, 56–58], XL-based attacks [59-61], finite precision effect [62-67], chaotic systems degradation [61–63, 68, 69], predictability [70, 71], weak randomness [62, 63, 65, 66, 72–77], chaotic discontinuity [65–67, 72, 73], and limited control parameters [78-81]. The main objective of this research is to design a novel technique for the dynamic generation of S-boxes that are safe against the attacks of algebraic structure-based and chaos-based techniques. Rather than algebraic structure- and chaos-based techniques, our proposed technique depends on inevitable high-quality randomness which exists in underwater acoustics waves. The basic concept of the proposed technique is the extraction of true random bits from underwater acoustic waves and to design a novel technique for the dynamic generation of S-boxes using the chain of knight's tour.

4. Proposed Methodology

The proposed method consists of two phases, the first phase is true random numbers generation based on underwater acoustics and the second phase is dynamic generation of S-boxes based on Knight's tour chain. Architecture diagram of the proposed system is depicted in Figure 1.
Figure 1

Architecture diagram of the proposed system.

4.1. True Random Numbers Generation Based on Underwater Acoustics

In this phase, first of all, long-term underwater acoustics recordings were acquired from the doi based dataset of the Australian Antarctic Data Centre (AADC) [82]. In the dataset, the average duration of each recording is sixty minutes. Out of thousands of long-term underwater acoustic recordings, we randomly selected the 96 long-term underwater acoustic recordings but proposed technique can take any multiple of 16 files as entropy sources. Secondly, these recordings are divided into blocks of size 16 and then, the amplitude difference of every 0.5 sec is calculated. Due to the diverse nature of sound sources, the difference of each amplitude with other amplitudes is random, and this was our main source of inspiration. Other characteristics of underwater sound like frequency and timber contain low-quality randomness that is why we chose the amplitude characteristic for this research. To calculate the amplitude differences, we used the combination selection strategy by using n!/r! (n–r)! . In our case, the value of the n is 16 and the value of r is 2. The entire step-by-step process of this phase from underwater acoustic files input to the random bits generation is represented in the flowchart of Figure 2. The amplitude differences calculation step is depicted in Figure 3, and here, long-term underwater acoustic recording represented as R1, R2,… R16. Two million bits have been analyzed using the NIST randomness test suite and shown in the Table 1, and results of the NIST tests show that underwater acoustics waves are an impeccable entropy source for true randomness. There are many random extractors based on hash functions, machine learning, chaos machine, physical unclonable functions, and probabilistic methods but among all these types of random extractors. Von Neumann random extractor is the simplest and fastest method that is why we chose Von Neumann random extractor as the postprocessing method.
Figure 2

Flowchart of TRNG-based underwater acoustics.

Figure 3

Computation of amplitude differences.

Table 1

Results of NIST randomness test suite.

Type of test P valueConclusion
01. Frequency test (monobit)0.8461758819031635Random
02. Frequency test within a block0.5166228701210154Random
03. Run test0.2609970420138874Random
04. Longest run of ones in a block0.34640251063536204Random
05. Binary matrix rank test0.09949346113140206Random
06. Discrete Fourier transform (spectral) test0.832838521091328Random
07. Nonoverlapping template matching test0.22184797295460632Random
08. Overlapping template matching test0.16413619193258017Random
09. Maurer's universal statistical test0.4051810932845413Random
10. Linear complexity test0.4394606534399792Random
11. Serial test:0.5703210920746249Random
0.5412977586951687Random
12. Approximate entropy test0.013704869478928823Random
13. Cummulative sums (forward) test0.9081561792752144Random
14. Cummulative sums (reverse) test0.7420961383854099Random
15. Random excursions test:StateChi squared P valueConclusion
−43.19405585363397030.6700965356355721Random
−38.3227043137254930.13932469392722086Random
−22.2153796498023080.8186113923928053Random
−110.3738562091503270.06530927491189864Random
+15.492810457516340.3587348843928551Random
+21.9786330993302670.8520935894148005Random
+30.8729035294117620.9721522155809542Random
+42.20307224930788650.8203920781040164Random
16. Random excursions variant test:StateCounts P valueConclusion
−9.017430.3503620748973999Random
−8.017910.22313138786599762Random
−7.018610.09700096546916874Random
−6.018370.09426256021374013Random
−5.017550.17515792247265105Random
−4.016750.3218141454622986Random
−3.015880.6391395377015844Random
−2.016050.43375610043914314Random
−1.015720.4476990724652935Random
+1.016010.19931513588782468Random
+2.016290.30147752489003166Random
+3.016090.523032983174088Random
+4.016090.589348273539888Random
+5.016620.426374068680618Random
+6.017830.1678955379041649Random
+7.018760.0827802734496795Random
+8.018690.1135773370125223Random
+9.018180.20668955769990105Random

4.2. Dynamic Generation of S-Boxes Based on Knight's Tour Chain

The knight's tour is more than a 1400-year-old puzzle game whose objective is to discover the legal moves on the chessboard in the way that it explores every cell only once, and in our proposed methodology, we utilized the chain of 8 × 8 knight's tour for the generation of S-boxes. First of all, true random numbers are acquired and divided into blocks of 64 length size, and then, each 64 length block is converted into the 8 × 8 chessboard matrix. Based on the knight tour rules, we traversed each element of the chessboard matrix; however, only unique elements are considered for S-box elements, and a similar procedure is repeated for coming chessboards until the completion of required length of the S-box. Initial position of the first block of the knight's tour chain is calculated through r = TRNG [0] mod 8, c = TRNG [1] mod 8, and the initial positions of other knights' tour chains are dependent on the second last and the last element of the S-box, which are calculated through r = S-box [n − 1] mod 8, c = S-box [n] mod 8. The entire step-by-step process of this phase from true random numbers input to dynamic S-boxes generation is represented in the flowchart of Figure 4. This phase is depicted in the following Figure 5. The reverse S-box algorithm is shown in the following (Algorithm 1). From the dynamically generated S-boxes stream, we picked two S-boxes randomly as sample which are shown in Tables 2 and 3, and their reverse S-boxes are also shown in Tables 4 and 5, respectively. The maximum nonlinearity score of our sample S-boxes is higher or equal to the recently published S-boxes (from 2020 to 2021).
Figure 4

Flowchart of dynamic S-boxes generation based on knight's tour chain.

Figure 5

Dynamic generation of S-boxes based on knight's tour chain.

Algorithm 1

ReverseSbox (S-box).

Table 2

Substitution box 1.

1062205241124201049688240170911524686
197230174155761851753114210323912240113208228
78212182911085437027120662818912636232
138165234162432316023597489010198250645
387314153817120320621352521111459223863
1301861801231924251891968458143325982198
11222424764177178148184233200222107105195201187
1542361631092192541372102412042121393424824974
20225352472261912311420711817191193217144
169237135713130121953314199119146100166182
255722152091887799351162421887132102158152
1506221155164801621252251331831171795120560
6581521369223415417646244194015617239
5616122714793129671682212452513617214128167
61229221115394149151502164915937101277
26834413442231797568108173157140191181190
Table 3

Substitution box 2.

254240187111511551531001032011440721415863
180209138216927601862197521092512489519
12471101075821026203901681212506622650104
17646659361832451348621674423820716110
20299171652171678055128827520040182147174
1961561201921161361641884851521663362230137
1291026122354159345924619521317051253229
12612214024198772371794719130130118185224243
45362271491062396822118921915010813161154112
242172231781351311602311292443125517339233205
19889201821582491391812125316315712720864
10585142184145293717511112522241172327687
84354212349235249210191204194791339632
156967146190888311411191772341323874236
25232878222205743211225199419419714370
20673162562522821881115114171113148193247214
Table 4

Reverse S-box 1.

2044721358526223919312237227134146153194
5122017013363322653321824040433514923
921521241674623664207281982443824263201131
5723423218913067199179208147909319122417779
99192422142481963969161651272472016532246
18168942418937151719875814077212229151
856601661575917325710801072491153675
962913613168187138155411502783518345238
222213801481721852437321911848123252662491
1437615621110223017623117522811219205251174235
5420918211418049158223215144111392062501822
20010010118882254159186103218111116444255253
841412031098816951541051101287012119071137
30163119178122195221162233142341161216106197
9718413221031225172454710450551131457826
10120169522022171498125126618674129117160
Table 5

Reverse S-box 2.

1121519225187895258165973439614013208
626616331162242281461982443821226181122154
20792103193129182221157762351942315912849120
881964610926170101712432303610422999315
1755044210134209239331224122274190117227204
702477321419217756191213161402011995123630
2062511665720098847176132351392763184
14325124924884188124217824211319532185112173
7215212314922020555148859518167114216178238
1018021178252131138490614258117214102
15014124217186679169412010825014515679183
4821814711916168775317912523287136212121
8325320310680237160234759643920215924061
17417372321691072551645768246137229135186100
126233451302451119415118915821919722311860133
1115144127153541052542916643282241100155

5. Results and Evaluation

In the results and evaluation section, our proposed S-boxes are evaluated by standard S-box evaluation criteria which includes nonlinearity score, bit independence criterion, linear approximation probability, strict avalanche criterion, and differential approximation probability.

5.1. Nonlinearity

Among all cryptographic properties, nonlinearity is the most important one. The main purpose of S-box is to gain nonlinear change from secret message to the ciphered message. For a strong encryption scheme, the mapping between input and output in an S-box must be nonlinear. The nonlinearity of the cryptographic algorithm is represented by the nonlinearity score. Nonlinearity is defined as the smallest difference of the Boolean function to the bunch of affine functions. The nonlinearity score determine the total number of bits altered to get the closest affine function in the Boolean truth table. It calculates the distance between the set of all affine functions and Boolean function. When the initial distance is obtained, the nearest affine function is achieved by inverting the bit values in the truth table of the Boolean function. By using walsh spectrum, the nonlinearity of the Boolean function is computed through [46]: S ( (φ is defined aswhere φ is a n-bit vector and φ ∈ GF(2).x.φ represents the bit-wise dot product of x and φ: S-box having high nonlinearity creates difficult for attacker to perform linear cryptanalysis. The maximum nonlinearity scores of our proposed Sbox-1 and Sbox-2 are 110 and 110, respectively, which is higher or equal to the recently published S-boxes. Detailed comparative analysis is shown in Table 6.
Table 6

Nonlinearity of state-of-the-art S-boxes.

Recently published S-boxesMaximum nonlinearity achieved
[83], 2021−108
[85], 2021−110
[87], 2021−108
[89], 2020−108
[91], 2020−110
[93], 2020−108
[95], 2020−108
[97], 2020−108
[99], 2020−104
[99], 2020−108
[98], 2020−106
[101], 2020−108
[102], 2020−110
[104], 2021−108
[105], 2021−110
[84], 2021−110
[86], 2021−110
[88], 2021−108
[90], 2021−110
[92], 2020−102
[94], 2020−107
[96], 2020−104
[98], 2020−106
[100], 2020−105
[101], 2020−106
[95], 2020−108
[93], 2020−108
[103], 2020−108
[104], 2021−108
[106], 2021−108

5.2. Strict Avalanche Criteria (SAC)

Strict avalanche criteria is the another crucial property for evaluating and according to SAC, if a single input bit is altered, all output bits will shift with probability of 1/2. SAC examined the effects of avalanche affects in encryption scheme. The modification at the input series induces a significant change in output series. SAC computes the number of output bits altered caused by inverting a single bit of input. To make the system more reliable, the output vector needed to be deviate with half probability, when one bit of input is inverted. Dependency matrix is determined to evaluate the SAC property. For an S-box that satisfies SAC property, all values were close to the ideal value of 0.5 in its dependence matrix. Dependency matrix offsets computed through equation (4) [46]. The SAC results of S-box-1 and S-box-2 are shown in Tables 7 and 8 and scores of our S-box-1 and S-box-2 are 0.495 and 0.50, respectively, which are the ideal scores for the secure S-boxes.wheree=[θr, 1θr, 2…θr, n],T is the transpose of matrix θ=0, r ≠ w or. θ= 1,  r=w.
Table 7

SAC results of S-box-1.

0.5000000.5625000.4687500.4531250.5000000.4218750.4531250.500000
0.4375000.5156250.4687500.4687500.5156250.5000000.5468750.437500
0.4687500.5468750.4843750.5156250.5000000.5312500.5468750.500000
0.4531250.5000000.5000000.5000000.4843750.4531250.5156250.546875
0.4687500.5625000.5000000.5000000.4843750.4375000.4843750.500000
0.4062500.5468750.5937500.4843750.4531250.3906250.5312500.500000
0.4375000.4843750.5781250.4531250.5156250.5468750.4375000.484375
0.5468750.5156250.5312500.5000000.5625000.4375000.5156250.515625
Table 8

SAC results of S-box-2.

0.5312500.5468750.5468750.4687500.4218750.4375000.5468750.500000
0.5468750.5312500.4062500.4843750.5625000.4687500.4843750.453125
0.5156250.4843750.5000000.5781250.6406250.5156250.5468750.437500
0.5625000.4687500.4531250.4375000.5000000.5468750.5468750.546875
0.5937500.5468750.5312500.5937500.5000000.5000000.4687500.531250
0.5000000.4687500.5312500.5312500.4375000.4843750.4843750.484375
0.4843750.4218750.5468750.4843750.4375000.5156250.5156250.546875
0.5000000.4531250.5781250.4687500.5625000.5312500.5625000.421875

5.3. BIT Independent Criterion (BIC)

BIC requires that all avalanche variables for a given set of avalanche vectors must be pair-wise independent. By modifying the input bits, BIC is used to study the behaviour of the output bits. When the output bits behave independent of one another, the S-box holds the BIC property. If any single input bit i is inverted, BIC states that output bits j and k will alter independently. This will enhance the effectiveness of confusion function. The coefficient of correlation is used to determine the independence among pair of avalanche variables. High bit independence is required to make system design incomprehensible. The bit independence of the jth and kth bits of B is [46]: in Tables 9 and 10, we can see that our randomly picked S-box-1 and S-box-2 fully fill the BIT independent criterion.
Table 9

BIC independent matrix of S-box-1.

0.4804690.4843750.4648440.5097660.5078120.5175780.521484
0.4804690.5117190.5136720.4843750.4863280.4765620.494141
0.4843750.5117190.4980470.5078120.4941410.5039060.486328
0.4648440.5136720.4980470.4941410.5058590.5019530.496094
0.5097660.4843750.5078120.4941410.5097660.4804690.470703
0.5078120.4863280.4941410.5058590.5097660.4941410.498047
0.5175780.4765620.5039060.5019530.4804690.4941410.509766
0.5214840.4941410.4863280.4960940.4707030.4980470.509766
Table 10

BIC independent matrix of S-box-2.

0.5019530.4980470.5019530.4882810.5292970.4863280.484375
0.5019530.5000000.5019530.4843750.5136720.4667970.509766
0.4980470.5000000.5078120.5273440.4746090.5078120.486328
0.5019530.5019530.5078120.5195310.5214840.4941410.511719
0.4882810.4843750.5273440.5195310.5234380.5156250.521484
0.5292970.5136720.4746090.5214840.5234380.4785160.503906
0.4863280.4667970.5078120.4941410.5156250.4785160.519531
0.4843750.5097660.4863280.5117190.5214840.5039060.519531
S-box function (h) is described as: h: {0, 1} ⟶{0, 1} BIC parameter for the S-box function is expressed as The change in output bits is a crucial parameter in determining the cipher's strength. When the changes in output bits contrast with the input bit sequence shows sufficient independence, the mapping technique will be difficult to understand.

5.4. Linear Approximation Probability (LP)

LP is the cryptographic property which measures the resistance of S-box against the linear attacks. LP analysis intends to measure the maximum imbalance of the event. LP is measured by determining the total number of coincident input bits with the output bits. The input bits uniformity must be identical to the output bits. Each input bit is individually evaluated, and its results are tested in the output bits. γ1 and γ2 masks are selected randomly to determine the mask of all output and input values. The mathematical expression of determining linear approximation probability is as follows [46]: the maximum LP of S-box-1 and S-box-2 is 0.125, which is also satisfies LP criteria.where γ1 and γ2  represents the input and output mask in the above expression. Linear approximation probability is calculated by using these masks. X represents the set of all possible inputs and 2n is the total number of elements in the set. S-box with low LP value is robust enough against different linear approximation attacks.

5.5. Differential Approximation Probability (DP)

The resistance of S-box to the differential attacks is assessed through the DP. DP is the probability of particular change in output bits caused by the change in input bits. An S-box must possess differential uniformity which means that each input differential is connected to the specific output differential. The XOR values of all output must have equal probability to the XOR values of all input. The differential uniformity is measured by given expression [46]:where X represents the set of all possible input values and 2n is the total number of elements in set. The maximum differential probability value a system could achieve is 4/256. The lowest value of DP means the high security of the S-box against differential approximation attacks. In Tables 11 and 12, we can see that our randomly picked S-box-1 and S-box-2 fully fill the DP criterion.
Table 11

DP of S-box-1.

0.000000.023430.031250.031250.023430.023430.023430.023430.031250.023430.023430.023430.023430.023430.023430.03125
0.031250.031250.023430.031250.023430.023430.023430.031250.023430.023430.031250.023430.023430.023430.031250.03125
0.031250.031250.023430.023430.031250.023430.031250.0390620.023430.023430.023430.023430.023430.023430.023430.03125
0.023430.031250.023430.023430.031250.023430.023430.023430.023430.023430.023430.023430.023430.023430.023430.03906
0.023430.023430.031250.023430.031250.031250.031250.023430.023430.023430.031250.031250.031250.023430.023430.02343
0.031250.023430.023430.023430.023430.023430.023430.023430.023430.031250.031250.031250.023430.031250.031250.03125
0.023430.031250.031250.023430.023430.023430.023430.031250.023430.023430.023430.023430.023430.031250.023430.02343
0.023430.031250.023430.031250.015620.031250.023430.023430.023430.023430.023430.023430.023430.015620.023430.02343
0.031250.023430.023430.023430.031250.023430.031250.015620.023430.023430.023430.031250.039060.031250.023430.03125
0.031250.023430.023430.031250.031250.023430.031250.023430.031250.023430.023430.023430.023430.023430.023430.02343
0.023430.023430.023430.023430.031250.023430.023430.031250.023430.023430.023430.023430.023430.023430.023430.02343
0.023430.031250.023430.023430.023430.023430.023430.023430.023430.023430.031250.023430.023430.023430.023430.02343
0.023430.023430.023430.031250.023430.023430.031250.031250.023430.031250.031250.023430.023430.023430.023430.03125
0.015620.023430.023430.023430.031250.023430.031250.023430.023430.039060.031250.023430.023430.031250.031250.02343
0.023430.023430.023430.031250.023430.023430.023430.023430.031250.023430.023430.031250.023430.039060.023430.02343
0.023430.023430.023430.023430.023430.023430.023430.023430.031250.023430.031250.015620.023430.023430.015620.02343
Table 12

DP of S-box-2.

0.000000.023430.023430.031250.023430.0156250.023430.031250.039060.023430.031250.023430.031250.023430.023430.02343
0.023430.023430.023430.023430.031250.023430.023430.023430.031250.023430.023430.023430.031250.0156250.023430.02343
0.023430.023430.023430.023430.023430.031250.023430.023430.023430.031250.023430.031250.023430.023430.023430.02343
0.023430.023430.031250.023430.023430.031250.023430.031250.023430.023430.031250.031250.031250.023430.023430.02343
0.031250.023430.023430.039060.031250.031250.023430.023430.023430.023430.023430.023430.023430.023430.023430.02343
0.031250.023430.023430.031250.023430.023430.023430.031250.023430.031250.031250.031250.039060.023430.031250.02343
0.023430.023430.023430.023430.031250.031250.031250.023430.023430.023430.023430.023430.031250.031250.023430.02343
0.023430.023430.023430.023430.031250.023430.023430.031250.031250.031250.023430.023430.031250.031250.031250.03125
0.023430.023430.031250.031250.031250.031250.039060.023430.031250.023430.023430.023430.031250.023430.023430.02343
0.023430.023430.023430.023430.023430.031250.023430.023430.023430.023430.031250.023430.031250.023430.023430.02343
0.023430.031250.023430.023430.023430.023430.023430.023430.023430.023430.031250.023430.031250.023430.0156250.03125
0.023430.023430.023430.023430.023430.023430.023430.023430.023430.023430.023430.023430.031250.023430.023430.02343
0.023430.023430.023430.031250.031250.023430.023430.031250.031250.023430.031250.023430.023430.031250.023430.02343
0.023430.031250.023430.031250.023430.023430.023430.023430.031250.023430.031250.023430.023430.023430.023430.02343
0.023430.031250.023430.023430.023430.031250.023430.031250.031250.039060.023430.023430.023430.0156250.0156250.03125
0.023430.023430.023430.023430.039060.023430.031250.031250.031250.031250.023430.023430.023430.031250.023430.03906

6. Conclusion

The protection of confidential information is a global issue, and block encryption algorithms are the most reliable option. The actual strength of the block encryption algorithms against several attacks is entirely dependent on S-boxes. Currently in the literature, algebraic structure-based and chaos-based techniques are highly used for the construction of S-boxes because both these techniques have favourable features for S-box construction, but many attacks of these techniques have been identified. In this paper, we purposed a novel technique for the dynamic generation of S-boxes that is safe against the existing attacks of algebraic structure-based and chaos-based techniques. True randomness has been universally recognized as the ideal method for security primitive because true random numbers are unpredictable, irreversible, and unreproducible. Rather than algebraic structure- and chaos-based techniques, our proposed technique depends on inevitable high-quality randomness which exists in underwater acoustics waves. According to our knowledge first time, this type of research has been conducted, in which natural randomness of underwater acoustic waves and knight's tour problem has been used for the generation of block cipher's substitution box. The proposed method satisfies all standard evaluation tests of S-boxes construction and true random numbers generation. Additionally, our dynamically generated S-boxes have better or equal strength, over the latest published S-boxes (2020 to 2021). In the future, we will extend this research for automatic key generation and optimization using knight's tour.
  9 in total

1.  Dynamic Parameter-Control Chaotic System.

Authors:  Zhongyun Hua; Yicong Zhou
Journal:  IEEE Trans Cybern       Date:  2015-12-17       Impact factor: 11.448

2.  Increases in deep ocean ambient noise in the Northeast Pacific west of San Nicolas Island, California.

Authors:  Mark A McDonald; John A Hildebrand; Sean M Wiggins
Journal:  J Acoust Soc Am       Date:  2006-08       Impact factor: 1.840

3.  Sperm whale clicks: directionality and source level revisited.

Authors:  B Møhl; M Wahlberg; P T Madsen; L A Miller; A Surlykke
Journal:  J Acoust Soc Am       Date:  2000-01       Impact factor: 1.840

4.  Thermodynamics of random number generation.

Authors:  Cina Aghamohammadi; James P Crutchfield
Journal:  Phys Rev E       Date:  2017-06-30       Impact factor: 2.529

5.  Random numbers certified by Bell's theorem.

Authors:  S Pironio; A Acín; S Massar; A Boyer de la Giroday; D N Matsukevich; P Maunz; S Olmschenk; D Hayes; L Luo; T A Manning; C Monroe
Journal:  Nature       Date:  2010-04-15       Impact factor: 49.962

6.  Sounds, source levels, and associated behavior of humpback whales, southeast Alaska.

Authors:  P O Thompson; W C Cummings; S J Ha
Journal:  J Acoust Soc Am       Date:  1986-09       Impact factor: 1.840

7.  Extracting random numbers from quantum tunnelling through a single diode.

Authors:  Ramón Bernardo-Gavito; Ibrahim Ethem Bagci; Jonathan Roberts; James Sexton; Benjamin Astbury; Hamzah Shokeir; Thomas McGrath; Yasir J Noori; Christopher S Woodhead; Mohamed Missous; Utz Roedig; Robert J Young
Journal:  Sci Rep       Date:  2017-12-19       Impact factor: 4.379

8.  Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications.

Authors:  Ahmed A Abd El-Latif; Bassem Abd-El-Atty; Mohamed Amin; Abdullah M Iliyasu
Journal:  Sci Rep       Date:  2020-02-06       Impact factor: 4.379

9.  Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging.

Authors:  Muhammad Fahad Khan; Khalid Saleem; Mohammed Ali Alshara; Shariq Bashir
Journal:  Sci Rep       Date:  2021-07-12       Impact factor: 4.379

  9 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.