A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S 8 and establish an effective procedure for gener...
Gespeichert in:
Veröffentlicht in: | Computational & applied mathematics 2023-03, Vol.42 (2), Article 80 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 2 |
container_start_page | |
container_title | Computational & applied mathematics |
container_volume | 42 |
creator | Hussain, Iqtadar Anees, Amir Al-Maadeed, Temadher Alassiry |
description | There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8
S
8
and establish an effective procedure for generating
S
8
semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards, namely bijectivity, non-linearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed
S
8
semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly. |
doi_str_mv | 10.1007/s40314-023-02208-x |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2776067854</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2776067854</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-edf227e7390cf67f5e71fcf91d63390f7cb5797a32da9fd8d82153046a12cc763</originalsourceid><addsrcrecordid>eNp9kE1LxDAQhoMouK7-AU8Bz9F8tE17XBa_YMGDeg7ZdFKztE1NWtn998at4M3DMDC8zzvwIHTN6C2jVN7FjAqWEcpFGk5Lsj9BC1ZSSaig_BQtOBclEQUV5-gixh2lQrIsWyBY4d5_QYuhN-EwjM73WLeND2786PAUXd_gbmpHN7SAI3TOOmhr_Eq2fg8Rb3WEGidmgNBNoz7y3uJ46DoYgzO4CX4aLtGZ1W2Eq9-9RO8P92_rJ7J5eXxerzbE8EqMBGrLuQQpKmpsIW0OklljK1YXIt2sNNtcVlILXuvK1mVdcpYLmhWacWNkIZboZu4dgv-cII5q56fQp5eKS1nQQpZ5llJ8TpngYwxg1RBcp8NBMap-dKpZp0o61VGn2idIzFBM4b6B8Ff9D_UNtkh6MA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2776067854</pqid></control><display><type>article</type><title>A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group</title><source>SpringerLink Journals</source><creator>Hussain, Iqtadar ; Anees, Amir ; Al-Maadeed, Temadher Alassiry</creator><creatorcontrib>Hussain, Iqtadar ; Anees, Amir ; Al-Maadeed, Temadher Alassiry</creatorcontrib><description>There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8
S
8
and establish an effective procedure for generating
S
8
semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards, namely bijectivity, non-linearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed
S
8
semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</description><identifier>ISSN: 2238-3603</identifier><identifier>EISSN: 1807-0302</identifier><identifier>DOI: 10.1007/s40314-023-02208-x</identifier><language>eng</language><publisher>Cham: Springer International Publishing</publisher><subject>Algorithms ; Applications of Mathematics ; Applied physics ; Boxes ; Chaos theory ; Computational mathematics ; Computational Mathematics and Numerical Analysis ; Criteria ; Group theory ; Mathematical Applications in Computer Science ; Mathematical Applications in the Physical Sciences ; Mathematics ; Mathematics and Statistics ; Permutations ; Pseudorandom sequences ; Substitutes</subject><ispartof>Computational & applied mathematics, 2023-03, Vol.42 (2), Article 80</ispartof><rights>The Author(s) 2023</rights><rights>The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-edf227e7390cf67f5e71fcf91d63390f7cb5797a32da9fd8d82153046a12cc763</citedby><cites>FETCH-LOGICAL-c293t-edf227e7390cf67f5e71fcf91d63390f7cb5797a32da9fd8d82153046a12cc763</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s40314-023-02208-x$$EPDF$$P50$$Gspringer$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s40314-023-02208-x$$EHTML$$P50$$Gspringer$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Hussain, Iqtadar</creatorcontrib><creatorcontrib>Anees, Amir</creatorcontrib><creatorcontrib>Al-Maadeed, Temadher Alassiry</creatorcontrib><title>A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group</title><title>Computational & applied mathematics</title><addtitle>Comp. Appl. Math</addtitle><description>There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8
S
8
and establish an effective procedure for generating
S
8
semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards, namely bijectivity, non-linearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed
S
8
semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</description><subject>Algorithms</subject><subject>Applications of Mathematics</subject><subject>Applied physics</subject><subject>Boxes</subject><subject>Chaos theory</subject><subject>Computational mathematics</subject><subject>Computational Mathematics and Numerical Analysis</subject><subject>Criteria</subject><subject>Group theory</subject><subject>Mathematical Applications in Computer Science</subject><subject>Mathematical Applications in the Physical Sciences</subject><subject>Mathematics</subject><subject>Mathematics and Statistics</subject><subject>Permutations</subject><subject>Pseudorandom sequences</subject><subject>Substitutes</subject><issn>2238-3603</issn><issn>1807-0302</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>C6C</sourceid><recordid>eNp9kE1LxDAQhoMouK7-AU8Bz9F8tE17XBa_YMGDeg7ZdFKztE1NWtn998at4M3DMDC8zzvwIHTN6C2jVN7FjAqWEcpFGk5Lsj9BC1ZSSaig_BQtOBclEQUV5-gixh2lQrIsWyBY4d5_QYuhN-EwjM73WLeND2786PAUXd_gbmpHN7SAI3TOOmhr_Eq2fg8Rb3WEGidmgNBNoz7y3uJ46DoYgzO4CX4aLtGZ1W2Eq9-9RO8P92_rJ7J5eXxerzbE8EqMBGrLuQQpKmpsIW0OklljK1YXIt2sNNtcVlILXuvK1mVdcpYLmhWacWNkIZboZu4dgv-cII5q56fQp5eKS1nQQpZ5llJ8TpngYwxg1RBcp8NBMap-dKpZp0o61VGn2idIzFBM4b6B8Ff9D_UNtkh6MA</recordid><startdate>20230301</startdate><enddate>20230301</enddate><creator>Hussain, Iqtadar</creator><creator>Anees, Amir</creator><creator>Al-Maadeed, Temadher Alassiry</creator><general>Springer International Publishing</general><general>Springer Nature B.V</general><scope>C6C</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20230301</creationdate><title>A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group</title><author>Hussain, Iqtadar ; Anees, Amir ; Al-Maadeed, Temadher Alassiry</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-edf227e7390cf67f5e71fcf91d63390f7cb5797a32da9fd8d82153046a12cc763</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Applications of Mathematics</topic><topic>Applied physics</topic><topic>Boxes</topic><topic>Chaos theory</topic><topic>Computational mathematics</topic><topic>Computational Mathematics and Numerical Analysis</topic><topic>Criteria</topic><topic>Group theory</topic><topic>Mathematical Applications in Computer Science</topic><topic>Mathematical Applications in the Physical Sciences</topic><topic>Mathematics</topic><topic>Mathematics and Statistics</topic><topic>Permutations</topic><topic>Pseudorandom sequences</topic><topic>Substitutes</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hussain, Iqtadar</creatorcontrib><creatorcontrib>Anees, Amir</creatorcontrib><creatorcontrib>Al-Maadeed, Temadher Alassiry</creatorcontrib><collection>Springer Nature OA/Free Journals</collection><collection>CrossRef</collection><jtitle>Computational & applied mathematics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hussain, Iqtadar</au><au>Anees, Amir</au><au>Al-Maadeed, Temadher Alassiry</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group</atitle><jtitle>Computational & applied mathematics</jtitle><stitle>Comp. Appl. Math</stitle><date>2023-03-01</date><risdate>2023</risdate><volume>42</volume><issue>2</issue><artnum>80</artnum><issn>2238-3603</issn><eissn>1807-0302</eissn><abstract>There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8
S
8
and establish an effective procedure for generating
S
8
semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards, namely bijectivity, non-linearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed
S
8
semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</abstract><cop>Cham</cop><pub>Springer International Publishing</pub><doi>10.1007/s40314-023-02208-x</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2238-3603 |
ispartof | Computational & applied mathematics, 2023-03, Vol.42 (2), Article 80 |
issn | 2238-3603 1807-0302 |
language | eng |
recordid | cdi_proquest_journals_2776067854 |
source | SpringerLink Journals |
subjects | Algorithms Applications of Mathematics Applied physics Boxes Chaos theory Computational mathematics Computational Mathematics and Numerical Analysis Criteria Group theory Mathematical Applications in Computer Science Mathematical Applications in the Physical Sciences Mathematics Mathematics and Statistics Permutations Pseudorandom sequences Substitutes |
title | A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T07%3A32%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20novel%20encryption%20algorithm%20using%20multiple%20semifield%20S-boxes%20based%20on%20permutation%20of%20symmetric%20group&rft.jtitle=Computational%20&%20applied%20mathematics&rft.au=Hussain,%20Iqtadar&rft.date=2023-03-01&rft.volume=42&rft.issue=2&rft.artnum=80&rft.issn=2238-3603&rft.eissn=1807-0302&rft_id=info:doi/10.1007/s40314-023-02208-x&rft_dat=%3Cproquest_cross%3E2776067854%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2776067854&rft_id=info:pmid/&rfr_iscdi=true |