An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges

The expansion of worldwide networking has created new possibilities for management, development, and presentation in the form of digital data. The uncomplicated accessibility to digital resources i.e., internet banking, electronic advertising, digital marketing, and libraries has resulted in grave s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2023-08, Vol.82 (19), p.29689-29712
Hauptverfasser: Waheed, Adil, Subhan, Fazli, Suud, Mazliham Mohd, Alam, Mansoor, Ahmad, Sohaib
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 29712
container_issue 19
container_start_page 29689
container_title Multimedia tools and applications
container_volume 82
creator Waheed, Adil
Subhan, Fazli
Suud, Mazliham Mohd
Alam, Mansoor
Ahmad, Sohaib
description The expansion of worldwide networking has created new possibilities for management, development, and presentation in the form of digital data. The uncomplicated accessibility to digital resources i.e., internet banking, electronic advertising, digital marketing, and libraries has resulted in grave security concerns. Consequently, rapid use of digital information and technology, security of digital transactions is a big concern. Although many data security solutions exist, still they need further improvement. In symmetric cryptography, the strength of a Substitution Box (S-box) assures the strength of block ciphers. S-box is a critical nonlinear element of cryptosystem that creates turmoil in transactions. This study aims to formulate a variety of methodologies to measure the effectiveness of an S-box against linear and differential algebraic attacks. These malicious attacks may disrupt and leak confidential information. Therefore, a comparative analysis is presented to understand the S-box construction methodologies, key characteristics of eminent S-boxes, major challenges, and their weak cryptographic properties. S-box is considered to be secure if it meets a number of criteria, i.e., maximum linear probability, bijection, nonlinearity, input/output XOR distribution, bit independence criterion, and strict avalanche criterion. These criteria are analyzed in detail to evaluate the performance, reliability, and effectiveness of S-box.
doi_str_mv 10.1007/s11042-023-14910-3
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2840672086</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2840672086</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-36e8c26de82a8c8f4cfa49f46a27bef2025cc0660f4b4b5ba67426cfa5071af23</originalsourceid><addsrcrecordid>eNp9kEtLAzEUhQdRsFb_gKuA20ZvHpNMl6X4goILdR0y6U07ZTppk2m1_95oBXeu7l1858D5iuKawS0D0HeJMZCcAheUyTEDKk6KASu1oFpzdpp_UQHVJbDz4iKlFQBTJZeDYjvpiO1se-gbZ1sScd_gBwmeuF2M2PXkldbhk8wxNYuOrLFfhnlow6LBNCIbjD7Ete0cEtzbdmf7JnTExabH2NhRbp6TtV2FSNzSti12C0yXxZm3bcKr3zss3h_u36ZPdPby-DydzKgTbNxTobByXM2x4rZylZfOWzn2Ulmua_QceOkcKAVe1rIua6u05CpDJWhmPRfD4ubYu4lhu8PUm1XYxTw1GV5JUJpDpTLFj5SLIaWI3mxis7bxYBiYb7XmqNZkteZHrRE5JI6hlOG8Kf5V_5P6As-afdI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2840672086</pqid></control><display><type>article</type><title>An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges</title><source>SpringerLink Journals</source><creator>Waheed, Adil ; Subhan, Fazli ; Suud, Mazliham Mohd ; Alam, Mansoor ; Ahmad, Sohaib</creator><creatorcontrib>Waheed, Adil ; Subhan, Fazli ; Suud, Mazliham Mohd ; Alam, Mansoor ; Ahmad, Sohaib</creatorcontrib><description>The expansion of worldwide networking has created new possibilities for management, development, and presentation in the form of digital data. The uncomplicated accessibility to digital resources i.e., internet banking, electronic advertising, digital marketing, and libraries has resulted in grave security concerns. Consequently, rapid use of digital information and technology, security of digital transactions is a big concern. Although many data security solutions exist, still they need further improvement. In symmetric cryptography, the strength of a Substitution Box (S-box) assures the strength of block ciphers. S-box is a critical nonlinear element of cryptosystem that creates turmoil in transactions. This study aims to formulate a variety of methodologies to measure the effectiveness of an S-box against linear and differential algebraic attacks. These malicious attacks may disrupt and leak confidential information. Therefore, a comparative analysis is presented to understand the S-box construction methodologies, key characteristics of eminent S-boxes, major challenges, and their weak cryptographic properties. S-box is considered to be secure if it meets a number of criteria, i.e., maximum linear probability, bijection, nonlinearity, input/output XOR distribution, bit independence criterion, and strict avalanche criterion. These criteria are analyzed in detail to evaluate the performance, reliability, and effectiveness of S-box.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-023-14910-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Computer Communication Networks ; Computer Science ; Criteria ; Cryptography ; Data Structures and Information Theory ; Digital data ; Effectiveness ; Electronic banking ; Encryption ; Information resources ; Internet resources ; Multimedia Information Systems ; Nonlinearity ; Performance evaluation ; Security ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2023-08, Vol.82 (19), p.29689-29712</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-36e8c26de82a8c8f4cfa49f46a27bef2025cc0660f4b4b5ba67426cfa5071af23</citedby><cites>FETCH-LOGICAL-c319t-36e8c26de82a8c8f4cfa49f46a27bef2025cc0660f4b4b5ba67426cfa5071af23</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-023-14910-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-023-14910-3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Waheed, Adil</creatorcontrib><creatorcontrib>Subhan, Fazli</creatorcontrib><creatorcontrib>Suud, Mazliham Mohd</creatorcontrib><creatorcontrib>Alam, Mansoor</creatorcontrib><creatorcontrib>Ahmad, Sohaib</creatorcontrib><title>An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>The expansion of worldwide networking has created new possibilities for management, development, and presentation in the form of digital data. The uncomplicated accessibility to digital resources i.e., internet banking, electronic advertising, digital marketing, and libraries has resulted in grave security concerns. Consequently, rapid use of digital information and technology, security of digital transactions is a big concern. Although many data security solutions exist, still they need further improvement. In symmetric cryptography, the strength of a Substitution Box (S-box) assures the strength of block ciphers. S-box is a critical nonlinear element of cryptosystem that creates turmoil in transactions. This study aims to formulate a variety of methodologies to measure the effectiveness of an S-box against linear and differential algebraic attacks. These malicious attacks may disrupt and leak confidential information. Therefore, a comparative analysis is presented to understand the S-box construction methodologies, key characteristics of eminent S-boxes, major challenges, and their weak cryptographic properties. S-box is considered to be secure if it meets a number of criteria, i.e., maximum linear probability, bijection, nonlinearity, input/output XOR distribution, bit independence criterion, and strict avalanche criterion. These criteria are analyzed in detail to evaluate the performance, reliability, and effectiveness of S-box.</description><subject>Algorithms</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Criteria</subject><subject>Cryptography</subject><subject>Data Structures and Information Theory</subject><subject>Digital data</subject><subject>Effectiveness</subject><subject>Electronic banking</subject><subject>Encryption</subject><subject>Information resources</subject><subject>Internet resources</subject><subject>Multimedia Information Systems</subject><subject>Nonlinearity</subject><subject>Performance evaluation</subject><subject>Security</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kEtLAzEUhQdRsFb_gKuA20ZvHpNMl6X4goILdR0y6U07ZTppk2m1_95oBXeu7l1858D5iuKawS0D0HeJMZCcAheUyTEDKk6KASu1oFpzdpp_UQHVJbDz4iKlFQBTJZeDYjvpiO1se-gbZ1sScd_gBwmeuF2M2PXkldbhk8wxNYuOrLFfhnlow6LBNCIbjD7Ete0cEtzbdmf7JnTExabH2NhRbp6TtV2FSNzSti12C0yXxZm3bcKr3zss3h_u36ZPdPby-DydzKgTbNxTobByXM2x4rZylZfOWzn2Ulmua_QceOkcKAVe1rIua6u05CpDJWhmPRfD4ubYu4lhu8PUm1XYxTw1GV5JUJpDpTLFj5SLIaWI3mxis7bxYBiYb7XmqNZkteZHrRE5JI6hlOG8Kf5V_5P6As-afdI</recordid><startdate>20230801</startdate><enddate>20230801</enddate><creator>Waheed, Adil</creator><creator>Subhan, Fazli</creator><creator>Suud, Mazliham Mohd</creator><creator>Alam, Mansoor</creator><creator>Ahmad, Sohaib</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20230801</creationdate><title>An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges</title><author>Waheed, Adil ; Subhan, Fazli ; Suud, Mazliham Mohd ; Alam, Mansoor ; Ahmad, Sohaib</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-36e8c26de82a8c8f4cfa49f46a27bef2025cc0660f4b4b5ba67426cfa5071af23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Criteria</topic><topic>Cryptography</topic><topic>Data Structures and Information Theory</topic><topic>Digital data</topic><topic>Effectiveness</topic><topic>Electronic banking</topic><topic>Encryption</topic><topic>Information resources</topic><topic>Internet resources</topic><topic>Multimedia Information Systems</topic><topic>Nonlinearity</topic><topic>Performance evaluation</topic><topic>Security</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Waheed, Adil</creatorcontrib><creatorcontrib>Subhan, Fazli</creatorcontrib><creatorcontrib>Suud, Mazliham Mohd</creatorcontrib><creatorcontrib>Alam, Mansoor</creatorcontrib><creatorcontrib>Ahmad, Sohaib</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Waheed, Adil</au><au>Subhan, Fazli</au><au>Suud, Mazliham Mohd</au><au>Alam, Mansoor</au><au>Ahmad, Sohaib</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2023-08-01</date><risdate>2023</risdate><volume>82</volume><issue>19</issue><spage>29689</spage><epage>29712</epage><pages>29689-29712</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>The expansion of worldwide networking has created new possibilities for management, development, and presentation in the form of digital data. The uncomplicated accessibility to digital resources i.e., internet banking, electronic advertising, digital marketing, and libraries has resulted in grave security concerns. Consequently, rapid use of digital information and technology, security of digital transactions is a big concern. Although many data security solutions exist, still they need further improvement. In symmetric cryptography, the strength of a Substitution Box (S-box) assures the strength of block ciphers. S-box is a critical nonlinear element of cryptosystem that creates turmoil in transactions. This study aims to formulate a variety of methodologies to measure the effectiveness of an S-box against linear and differential algebraic attacks. These malicious attacks may disrupt and leak confidential information. Therefore, a comparative analysis is presented to understand the S-box construction methodologies, key characteristics of eminent S-boxes, major challenges, and their weak cryptographic properties. S-box is considered to be secure if it meets a number of criteria, i.e., maximum linear probability, bijection, nonlinearity, input/output XOR distribution, bit independence criterion, and strict avalanche criterion. These criteria are analyzed in detail to evaluate the performance, reliability, and effectiveness of S-box.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-023-14910-3</doi><tpages>24</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2023-08, Vol.82 (19), p.29689-29712
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2840672086
source SpringerLink Journals
subjects Algorithms
Computer Communication Networks
Computer Science
Criteria
Cryptography
Data Structures and Information Theory
Digital data
Effectiveness
Electronic banking
Encryption
Information resources
Internet resources
Multimedia Information Systems
Nonlinearity
Performance evaluation
Security
Special Purpose and Application-Based Systems
title An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T05%3A42%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20analytical%20review%20of%20current%20S-box%20design%20methodologies,%20performance%20evaluation%20criteria,%20and%20major%20challenges&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Waheed,%20Adil&rft.date=2023-08-01&rft.volume=82&rft.issue=19&rft.spage=29689&rft.epage=29712&rft.pages=29689-29712&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-023-14910-3&rft_dat=%3Cproquest_cross%3E2840672086%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2840672086&rft_id=info:pmid/&rfr_iscdi=true