•  
  •  
 

Abstract

This article presents a fairly reliable algorithm for generating an S-box using a trigonometric function in the parameters of the genetic algorithm. S-boxes are essential components of modern cryptography and are used for permutation operations in various block cipher algorithms. The efficiency of the algorithm was demonstrated by various experimental experiments, which showed that the created S-box is sufficiently resistant to linear and differential cryptanalysis attacks. During the experimental analysis, the proposed S-box showed good results in various criteria, where the average level of nonlinearity was 105, the criterion of strict avalanche efficiency was 0.4941, the probability of linear convergence was 0.1328, and the probability of differential convergence was 10/256. Based on the obtained results, the effectiveness of the algorithm shows that the S-box is sufficiently stable for linear and differential cryptanalysis, which is illustrated by tables and graphs. It is worth noting that experimental experiments make it possible to create S-boxes with excellent cryptographic properties of this algorithm, such as high nonlinearity and differential probability of convergence and a fairly linear probability of convergence. Future improvements to this algorithm may make it applicable to various block ciphers and greatly improve the security of block ciphers.

First Page

69

Last Page

75

References

  1. Feistel, H., Notz, W.A., Smith, J.L. (1975). Some cryptographic techniques for machine-to-machine data communications. in Proceedings of the IEEE, 63(11), 1545-1554. doi: 10.1109/PROC.1975.10005.
  2. Biryukov, A. (2005). Substitution–Permutation (SP) Network. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA.
  3. Abdurakhimov, B., Boykuziev, I., Khudoykulov, Z., Allanov, O. (2021). Application of the algebraic cryptanalysis method to the Kuznyechik encryption algorithm. IEEE International Conference on Science and Communications technologies Applications, Trends and Opportunities (ICISCT 2021). 1-4.
  4. Zhang, W., Pasalic, E. (2014). Highly nonlinear balanced S-boxes with good differential properties. IEEE Trans. Inf. Theory, 60 (12), 7970-7979.
  5. Yong, W., Kwok-Wo W., Changbing L., Yang L. (2012). A novel method to design S-box based on chaotic map and genetic algorithm. Physics Letters A, 376(6-7), 827-833, https://doi.org/10.1016/j.physleta.2012.01.009.
  6. Yong, W., Zhiqiang, Zh., Leo, Yu Zh., Jun, F., Jerry, G., Peng, L. (2020). A genetic algorithm for constructing bijective substitution boxes with high nonlinearity. Information Sciences, 523, 152-166, https://doi.org/10.1016/j.ins.2020.03.025.
  7. Zhu, D., Xiaojun, T., Miao, Zh., Zhu, W. (2020). A New S-Box Generation Method and Advanced Design Based on Combined Chaotic System. Symmetry 12, 12(2087). https://doi.org/10.3390/sym12122087.
  8. Zahid, H. (2021). Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications. IEEE Access, 9, 98460-98475. doi: 10.1109/ACCESS.2021.3095618.
  9. Kim, G., Kim, H., Heo, Y., Jeon, Y., Kim, J. (2021). Generating Cryptographic S-Boxes Using the Reinforcement Learning. IEEE Access, 9, 83092-83104. doi: 10.1109/ACCESS.2021.3085861.
  10. Ahmad, M., Malik, M. (2016). Design of chaotic neural network based method for cryptographic substitution box. 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 864-868. doi: 10.1109/ICEEOT.2016.7754809.
  11. Jakimoski, G., Kocarev, L. (2001). Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Transaction on Circuits Systems, 48(2), 163-169.
  12. Webster, A.F., Tavares, S.E. (1986). On the design of S-boxes. Advances in Cryptology-CRYPTO’1885 Proceedings, Lecture Notes in Computer Science, 218, 523-534.
  13. Matsui, M. (1994). Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (eds) Advances in Cryptology — EUROCRYPT ’93. EUROCRYPT 1993. Lecture Notes in Computer Science, vol 765. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48285-7_33

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.