2017
DOI: 10.1063/1.4978264
|View full text |Cite
|
Sign up to set email alerts
|

An algorithm for the construction of substitution box for block ciphers based on projective general linear group

Abstract: The aim of this work is to synthesize 8*8 substitution boxes (S-boxes) for block ciphers. The confusion creating potential of an S-box depends on its construction technique. In the first step, we have applied the algebraic action of the projective general linear group PGL(2,GF(28)) on Galois field GF(28). In step 2 we have used the permutations of the symmetric group S256 to construct new kind of S-boxes. To explain the proposed extension scheme, we have given an example and constructed one new S-box. The stre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 43 publications
(25 citation statements)
references
References 22 publications
0
23
0
Order By: Relevance
“…I. Hussain [15] uses Galois Field and symmetric group for the construction of S-boxes. Similarly, A. Altaleb [16] uses the action of a projective general linear group on Galois Field GF (2 8 ) and also uses symmetric group S256 for the construction of varieties of S-boxes. M. Hussain in [17] uses an artificial bee colony and chaotic map to construct an S-box.…”
Section: A Related Workmentioning
confidence: 99%
“…I. Hussain [15] uses Galois Field and symmetric group for the construction of S-boxes. Similarly, A. Altaleb [16] uses the action of a projective general linear group on Galois Field GF (2 8 ) and also uses symmetric group S256 for the construction of varieties of S-boxes. M. Hussain in [17] uses an artificial bee colony and chaotic map to construct an S-box.…”
Section: A Related Workmentioning
confidence: 99%
“…Many other researchers have designed S-Boxes using several techniques and concepts like graph isomorphism [45], coset diagrams [46], linear fractional transformation [47][48][49][50], etc. Ciphers based on S-box are highly dependent on the security features of the used S-box.…”
Section: Related Workmentioning
confidence: 99%
“…Many researchers have designed S-Boxes that are cryptographically strong using such mappings. One such mapping is linear fractional transformation (LFT), which was exhaustively explored for the construction of the S-boxes [ 49 , 50 , 51 , 52 ]. However, the process of generating these S-Boxes using LFT is very complicated and time consuming.…”
Section: Proposed Substitution Boxmentioning
confidence: 99%
“…The authors analyzed the strength of their S-Box against cryptographic properties, like SAC, BIC, NL, LP, DP, etc. The authors in [ 50 , 51 , 52 ] proposed efficient algorithms to design good S-Boxes based on LFT and the projective general linear group on Galois field, respectively. The proposed S-Boxes showed good performances when compared with other existing S-Boxes.…”
Section: Introductionmentioning
confidence: 99%