Cargando…

A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field

Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic algorithms offering security facilities for maintaining more cover-ups. A substitution-box (S-box) is the lone component in a...

Descripción completa

Detalles Bibliográficos
Autores principales: Siddiqui, Nasir, Yousaf, Fahim, Murtaza, Fiza, Ehatisham-ul-Haq, Muhammad, Ashraf, M. Usman, Alghamdi, Ahmed M., Alfakeeh, Ahmed S.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7660566/
https://www.ncbi.nlm.nih.gov/pubmed/33180847
http://dx.doi.org/10.1371/journal.pone.0241890
_version_ 1783609031852556288
author Siddiqui, Nasir
Yousaf, Fahim
Murtaza, Fiza
Ehatisham-ul-Haq, Muhammad
Ashraf, M. Usman
Alghamdi, Ahmed M.
Alfakeeh, Ahmed S.
author_facet Siddiqui, Nasir
Yousaf, Fahim
Murtaza, Fiza
Ehatisham-ul-Haq, Muhammad
Ashraf, M. Usman
Alghamdi, Ahmed M.
Alfakeeh, Ahmed S.
author_sort Siddiqui, Nasir
collection PubMed
description Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic algorithms offering security facilities for maintaining more cover-ups. A substitution-box (S-box) is the lone component in a cryptosystem that gives rise to a nonlinear mapping between inputs and outputs, thus providing confusion in data. An S-box that possesses high nonlinearity and low linear and differential probability is considered cryptographically secure. In this study, a new technique is presented to construct cryptographically strong 8×8 S-boxes by applying an adjacency matrix on the Galois field GF(2(8)). The adjacency matrix is obtained corresponding to the coset diagram for the action of modular group [Image: see text] on a projective line PL(F(7)) over a finite field F(7). The strength of the proposed S-boxes is examined by common S-box tests, which validate their cryptographic strength. Moreover, we use the majority logic criterion to establish an image encryption application for the proposed S-boxes. The encryption results reveal the robustness and effectiveness of the proposed S-box design in image encryption applications.
format Online
Article
Text
id pubmed-7660566
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-76605662020-11-18 A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field Siddiqui, Nasir Yousaf, Fahim Murtaza, Fiza Ehatisham-ul-Haq, Muhammad Ashraf, M. Usman Alghamdi, Ahmed M. Alfakeeh, Ahmed S. PLoS One Research Article Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic algorithms offering security facilities for maintaining more cover-ups. A substitution-box (S-box) is the lone component in a cryptosystem that gives rise to a nonlinear mapping between inputs and outputs, thus providing confusion in data. An S-box that possesses high nonlinearity and low linear and differential probability is considered cryptographically secure. In this study, a new technique is presented to construct cryptographically strong 8×8 S-boxes by applying an adjacency matrix on the Galois field GF(2(8)). The adjacency matrix is obtained corresponding to the coset diagram for the action of modular group [Image: see text] on a projective line PL(F(7)) over a finite field F(7). The strength of the proposed S-boxes is examined by common S-box tests, which validate their cryptographic strength. Moreover, we use the majority logic criterion to establish an image encryption application for the proposed S-boxes. The encryption results reveal the robustness and effectiveness of the proposed S-box design in image encryption applications. Public Library of Science 2020-11-12 /pmc/articles/PMC7660566/ /pubmed/33180847 http://dx.doi.org/10.1371/journal.pone.0241890 Text en © 2020 Siddiqui et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Siddiqui, Nasir
Yousaf, Fahim
Murtaza, Fiza
Ehatisham-ul-Haq, Muhammad
Ashraf, M. Usman
Alghamdi, Ahmed M.
Alfakeeh, Ahmed S.
A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field
title A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field
title_full A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field
title_fullStr A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field
title_full_unstemmed A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field
title_short A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field
title_sort highly nonlinear substitution-box (s-box) design using action of modular group on a projective line over a finite field
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7660566/
https://www.ncbi.nlm.nih.gov/pubmed/33180847
http://dx.doi.org/10.1371/journal.pone.0241890
work_keys_str_mv AT siddiquinasir ahighlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT yousaffahim ahighlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT murtazafiza ahighlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT ehatishamulhaqmuhammad ahighlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT ashrafmusman ahighlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT alghamdiahmedm ahighlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT alfakeehahmeds ahighlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT siddiquinasir highlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT yousaffahim highlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT murtazafiza highlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT ehatishamulhaqmuhammad highlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT ashrafmusman highlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT alghamdiahmedm highlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield
AT alfakeehahmeds highlynonlinearsubstitutionboxsboxdesignusingactionofmodulargrouponaprojectivelineoverafinitefield