A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group

There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S 8 and establish an effective procedure for gener...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computational & applied mathematics 2023-03, Vol.42 (2), Article 80
Hauptverfasser: Hussain, Iqtadar, Anees, Amir, Al-Maadeed, Temadher Alassiry
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 2
container_start_page
container_title Computational & applied mathematics
container_volume 42
creator Hussain, Iqtadar
Anees, Amir
Al-Maadeed, Temadher Alassiry
description There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S 8 and establish an effective procedure for generating S 8 semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards, namely bijectivity, non-linearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S 8 semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.
doi_str_mv 10.1007/s40314-023-02208-x
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2776067854</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2776067854</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-edf227e7390cf67f5e71fcf91d63390f7cb5797a32da9fd8d82153046a12cc763</originalsourceid><addsrcrecordid>eNp9kE1LxDAQhoMouK7-AU8Bz9F8tE17XBa_YMGDeg7ZdFKztE1NWtn998at4M3DMDC8zzvwIHTN6C2jVN7FjAqWEcpFGk5Lsj9BC1ZSSaig_BQtOBclEQUV5-gixh2lQrIsWyBY4d5_QYuhN-EwjM73WLeND2786PAUXd_gbmpHN7SAI3TOOmhr_Eq2fg8Rb3WEGidmgNBNoz7y3uJ46DoYgzO4CX4aLtGZ1W2Eq9-9RO8P92_rJ7J5eXxerzbE8EqMBGrLuQQpKmpsIW0OklljK1YXIt2sNNtcVlILXuvK1mVdcpYLmhWacWNkIZboZu4dgv-cII5q56fQp5eKS1nQQpZ5llJ8TpngYwxg1RBcp8NBMap-dKpZp0o61VGn2idIzFBM4b6B8Ff9D_UNtkh6MA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2776067854</pqid></control><display><type>article</type><title>A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group</title><source>SpringerLink Journals</source><creator>Hussain, Iqtadar ; Anees, Amir ; Al-Maadeed, Temadher Alassiry</creator><creatorcontrib>Hussain, Iqtadar ; Anees, Amir ; Al-Maadeed, Temadher Alassiry</creatorcontrib><description>There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S 8 and establish an effective procedure for generating S 8 semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards, namely bijectivity, non-linearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S 8 semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</description><identifier>ISSN: 2238-3603</identifier><identifier>EISSN: 1807-0302</identifier><identifier>DOI: 10.1007/s40314-023-02208-x</identifier><language>eng</language><publisher>Cham: Springer International Publishing</publisher><subject>Algorithms ; Applications of Mathematics ; Applied physics ; Boxes ; Chaos theory ; Computational mathematics ; Computational Mathematics and Numerical Analysis ; Criteria ; Group theory ; Mathematical Applications in Computer Science ; Mathematical Applications in the Physical Sciences ; Mathematics ; Mathematics and Statistics ; Permutations ; Pseudorandom sequences ; Substitutes</subject><ispartof>Computational &amp; applied mathematics, 2023-03, Vol.42 (2), Article 80</ispartof><rights>The Author(s) 2023</rights><rights>The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-edf227e7390cf67f5e71fcf91d63390f7cb5797a32da9fd8d82153046a12cc763</citedby><cites>FETCH-LOGICAL-c293t-edf227e7390cf67f5e71fcf91d63390f7cb5797a32da9fd8d82153046a12cc763</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s40314-023-02208-x$$EPDF$$P50$$Gspringer$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s40314-023-02208-x$$EHTML$$P50$$Gspringer$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Hussain, Iqtadar</creatorcontrib><creatorcontrib>Anees, Amir</creatorcontrib><creatorcontrib>Al-Maadeed, Temadher Alassiry</creatorcontrib><title>A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group</title><title>Computational &amp; applied mathematics</title><addtitle>Comp. Appl. Math</addtitle><description>There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S 8 and establish an effective procedure for generating S 8 semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards, namely bijectivity, non-linearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S 8 semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</description><subject>Algorithms</subject><subject>Applications of Mathematics</subject><subject>Applied physics</subject><subject>Boxes</subject><subject>Chaos theory</subject><subject>Computational mathematics</subject><subject>Computational Mathematics and Numerical Analysis</subject><subject>Criteria</subject><subject>Group theory</subject><subject>Mathematical Applications in Computer Science</subject><subject>Mathematical Applications in the Physical Sciences</subject><subject>Mathematics</subject><subject>Mathematics and Statistics</subject><subject>Permutations</subject><subject>Pseudorandom sequences</subject><subject>Substitutes</subject><issn>2238-3603</issn><issn>1807-0302</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>C6C</sourceid><recordid>eNp9kE1LxDAQhoMouK7-AU8Bz9F8tE17XBa_YMGDeg7ZdFKztE1NWtn998at4M3DMDC8zzvwIHTN6C2jVN7FjAqWEcpFGk5Lsj9BC1ZSSaig_BQtOBclEQUV5-gixh2lQrIsWyBY4d5_QYuhN-EwjM73WLeND2786PAUXd_gbmpHN7SAI3TOOmhr_Eq2fg8Rb3WEGidmgNBNoz7y3uJ46DoYgzO4CX4aLtGZ1W2Eq9-9RO8P92_rJ7J5eXxerzbE8EqMBGrLuQQpKmpsIW0OklljK1YXIt2sNNtcVlILXuvK1mVdcpYLmhWacWNkIZboZu4dgv-cII5q56fQp5eKS1nQQpZ5llJ8TpngYwxg1RBcp8NBMap-dKpZp0o61VGn2idIzFBM4b6B8Ff9D_UNtkh6MA</recordid><startdate>20230301</startdate><enddate>20230301</enddate><creator>Hussain, Iqtadar</creator><creator>Anees, Amir</creator><creator>Al-Maadeed, Temadher Alassiry</creator><general>Springer International Publishing</general><general>Springer Nature B.V</general><scope>C6C</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20230301</creationdate><title>A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group</title><author>Hussain, Iqtadar ; Anees, Amir ; Al-Maadeed, Temadher Alassiry</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-edf227e7390cf67f5e71fcf91d63390f7cb5797a32da9fd8d82153046a12cc763</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Applications of Mathematics</topic><topic>Applied physics</topic><topic>Boxes</topic><topic>Chaos theory</topic><topic>Computational mathematics</topic><topic>Computational Mathematics and Numerical Analysis</topic><topic>Criteria</topic><topic>Group theory</topic><topic>Mathematical Applications in Computer Science</topic><topic>Mathematical Applications in the Physical Sciences</topic><topic>Mathematics</topic><topic>Mathematics and Statistics</topic><topic>Permutations</topic><topic>Pseudorandom sequences</topic><topic>Substitutes</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hussain, Iqtadar</creatorcontrib><creatorcontrib>Anees, Amir</creatorcontrib><creatorcontrib>Al-Maadeed, Temadher Alassiry</creatorcontrib><collection>Springer Nature OA/Free Journals</collection><collection>CrossRef</collection><jtitle>Computational &amp; applied mathematics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hussain, Iqtadar</au><au>Anees, Amir</au><au>Al-Maadeed, Temadher Alassiry</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group</atitle><jtitle>Computational &amp; applied mathematics</jtitle><stitle>Comp. Appl. Math</stitle><date>2023-03-01</date><risdate>2023</risdate><volume>42</volume><issue>2</issue><artnum>80</artnum><issn>2238-3603</issn><eissn>1807-0302</eissn><abstract>There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S 8 and establish an effective procedure for generating S 8 semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards, namely bijectivity, non-linearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S 8 semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</abstract><cop>Cham</cop><pub>Springer International Publishing</pub><doi>10.1007/s40314-023-02208-x</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2238-3603
ispartof Computational & applied mathematics, 2023-03, Vol.42 (2), Article 80
issn 2238-3603
1807-0302
language eng
recordid cdi_proquest_journals_2776067854
source SpringerLink Journals
subjects Algorithms
Applications of Mathematics
Applied physics
Boxes
Chaos theory
Computational mathematics
Computational Mathematics and Numerical Analysis
Criteria
Group theory
Mathematical Applications in Computer Science
Mathematical Applications in the Physical Sciences
Mathematics
Mathematics and Statistics
Permutations
Pseudorandom sequences
Substitutes
title A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T07%3A32%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20novel%20encryption%20algorithm%20using%20multiple%20semifield%20S-boxes%20based%20on%20permutation%20of%20symmetric%20group&rft.jtitle=Computational%20&%20applied%20mathematics&rft.au=Hussain,%20Iqtadar&rft.date=2023-03-01&rft.volume=42&rft.issue=2&rft.artnum=80&rft.issn=2238-3603&rft.eissn=1807-0302&rft_id=info:doi/10.1007/s40314-023-02208-x&rft_dat=%3Cproquest_cross%3E2776067854%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2776067854&rft_id=info:pmid/&rfr_iscdi=true