2019
DOI: 10.1109/access.2019.2893176
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Cryptographic Substitution Box Design Using Gaussian Distribution

Abstract: In this paper, a novel method is being proposed to construct a substitution box or Boolean function for block ciphers using Gaussian distribution and linear fractional transform. The substitution box is constructed by employing a linear fractional transform based on Box-Muller transform, polarization decision, and central limit algorithm. The cryptographic strength of the proposed S-boxes is evaluated with standardized tests such as linear approximation probability, unified averaged changed intensity, bit inde… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
49
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 62 publications
(50 citation statements)
references
References 48 publications
0
49
0
1
Order By: Relevance
“…Consequently, dynamic S-boxes harden a cipher against potential brute-force attacks by increasing the key space [10]. In order to measure the strength of an S-box, researchers compare their S-box performance against available benchmark including Nonlinearity (NL), Linear Approximation Probability (LAP), Differential Approximation Probability (DAP), Strict Avalanche Criterion (SAC) and Bit Independence Criterion (BIC) [2,7,[10][11][12][13][14][15][16][17]. Efficient methods for S-box construction, such as [7,11,14], generate a single or a limited number of static S-boxes.…”
Section: A S-box Based Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Consequently, dynamic S-boxes harden a cipher against potential brute-force attacks by increasing the key space [10]. In order to measure the strength of an S-box, researchers compare their S-box performance against available benchmark including Nonlinearity (NL), Linear Approximation Probability (LAP), Differential Approximation Probability (DAP), Strict Avalanche Criterion (SAC) and Bit Independence Criterion (BIC) [2,7,[10][11][12][13][14][15][16][17]. Efficient methods for S-box construction, such as [7,11,14], generate a single or a limited number of static S-boxes.…”
Section: A S-box Based Encryptionmentioning
confidence: 99%
“…Efficient methods for S-box construction, such as [7,11,14], generate a single or a limited number of static S-boxes. To address this limitation, several dynamic S-box construction methods have been developed such as [1] [2,10,12,13,16].…”
Section: A S-box Based Encryptionmentioning
confidence: 99%
“…The assessment of the S-box defines its further application in various cryptographic schemes and multimedia security [28]- [30]. For this purpose, different theoretic and statistical performance measures are being utilized to evaluate the strength of S-boxes [31].…”
Section: Substitution Boxes Analysismentioning
confidence: 99%
“…Most of these S-boxes give DP value of 10/256. In [32], an S-box is designed using Gaussian distribution and linear fractional transformation by applying the Box-Muller transform, polarization decision, and central limit algorithm. The research work in [33] proposed a way of generating highly non-linear n × n S-boxes for 3 ≤ n ≤ 7.…”
Section: Introductionmentioning
confidence: 99%