Research article

Batch generated strongly nonlinear S-Boxes using enhanced quadratic maps

  • Received: 11 December 2024 Revised: 24 January 2025 Accepted: 20 February 2025 Published: 14 March 2025
  • MSC : 94A60, 68P25

  • One of the most crucial elements in the design of a block cipher is the substitution box or S-box. Its cipher strength directly impacts the cipher algorithm's security, and the block cipher algorithm requires a good S-box. According to the cryptanalysis result of the S-box construction in AES: (1) the number of irreducible polynomials can be increased to 30; (2) the affinity transformation constant c can be chosen from all elements if the existence of fixed points and reverse fixed points in an S-box is ignored; and (3) the S-box in AES is fixed, which poses possible security risks to the AES algorithm. The study above led us to build a non-degenerate 2D enhanced quadratic map (2D-EQM) with unpredictability and ergodicity. From there, we generated affine transformation constants and affine transformation matrices, which were then applied to seed S-boxes to create a batch of strongly nonlinear S-boxes. Finally, we assessed the performance of suggested S-boxes using six criteria. Security and statistical research showed that the suggested S-box batch generation procedure was practical and effective.

    Citation: Mohammad Mazyad Hazzazi, Farooq E Azam, Rashad Ali, Muhammad Kamran Jamil, Sameer Abdullah Nooh, Fahad Alblehai. Batch generated strongly nonlinear S-Boxes using enhanced quadratic maps[J]. AIMS Mathematics, 2025, 10(3): 5671-5695. doi: 10.3934/math.2025262

    Related Papers:

  • One of the most crucial elements in the design of a block cipher is the substitution box or S-box. Its cipher strength directly impacts the cipher algorithm's security, and the block cipher algorithm requires a good S-box. According to the cryptanalysis result of the S-box construction in AES: (1) the number of irreducible polynomials can be increased to 30; (2) the affinity transformation constant c can be chosen from all elements if the existence of fixed points and reverse fixed points in an S-box is ignored; and (3) the S-box in AES is fixed, which poses possible security risks to the AES algorithm. The study above led us to build a non-degenerate 2D enhanced quadratic map (2D-EQM) with unpredictability and ergodicity. From there, we generated affine transformation constants and affine transformation matrices, which were then applied to seed S-boxes to create a batch of strongly nonlinear S-boxes. Finally, we assessed the performance of suggested S-boxes using six criteria. Security and statistical research showed that the suggested S-box batch generation procedure was practical and effective.



    加载中


    [1] F. Artuger, Strong s-box construction approach based on Josephus's problem, Soft Comput., (2024), 1–13. https://doi.org/10.1007/s00500-024-09751-7 doi: 10.1007/s00500-024-09751-7
    [2] R. Ali, M. K. Jamil, A. S. Alali, J. Ali, G. Afzal, A robust S box design using cyclic groups and image encryption, IEEE Access, 11 (2023), 135880–135890. https://doi.org/10.1109/ACCESS.2023.3337443 doi: 10.1109/ACCESS.2023.3337443
    [3] C. Luo, Y. Wang, Y. Fu, P. Zhou, M. Wang, Constructing dynamic S-boxes based on chaos and irreducible polynomials for image encryption, Nonlinear Dynam., 11 (2024), 1–19. https://doi.org/10.1007/s11071-024-09353-w doi: 10.1007/s11071-024-09353-w
    [4] F. Artuger, F. Ozkaynak, A new chaotic system and its practical applications in substitution box and random number generator, Multimed. Tools Appl., 11 (2024), 1–15. https://doi.org/10.1007/s11042-024-19053-7 doi: 10.1007/s11042-024-19053-7
    [5] F. Artuger, A method for designing substitution boxes based on chaos with high nonlinearity, Wireless Pers. Commun., 11 (2024), 1–16. https://doi.org/10.1007/s11277-024-11104-4 doi: 10.1007/s11277-024-11104-4
    [6] A. Waheed, F. Subhan, M. M. Su'ud, M. M. Alam, Molding robust S-box design based on linear fractional transformation and multilayer Perceptron: Applications to multimedia security, Egypt. Inform. J., 26 (2024), 100480. https://doi.org/10.1016/j.eij.2024.100480 doi: 10.1016/j.eij.2024.100480
    [7] Y. Zhang, H. Bao, Z. Hua, H. Huang, Two-dimensional exponential chaotic system with hardware implementation, IEEE T. Ind. Electron., 70 (2022), 9346–9356. 10.1109/TIE.2022.3206747 doi: 10.1109/TIE.2022.3206747
    [8] Z. Hua, Y. Chen, H. Bao, Y. Zhou, Two-dimensional parametric polynomial chaotic system, IEEE T. Syst. Man, Cy-S., 52 (2021), 4402–4414. 10.1109/TSMC.2021.3096967 doi: 10.1109/TSMC.2021.3096967
    [9] H. Ning, G. Zhao, Z. Li, S. Gao, Y. Ma, Y. Dong, A novel method for constructing dynamic S-boxes based on a high-performance spatiotemporal chaotic system, Nonlinear Dynam., 112 (2024), 1487–1509. https://doi.org/10.1007/s11071-023-09125-y doi: 10.1007/s11071-023-09125-y
    [10] K. Kazlauskas, R. Smaliukas, G. Vaicekauskas, A novel method to design S-boxes based on key-dependent permutation schemes and their quality analysis, Int. J. Adv. Comput. Sc., 7 (2016), 93–99. https://epublications.vu.lt/object/elaba:16939446
    [11] P. Agarwal, A. Singh, A. Kilicman, Advanced encryption standard based on key-dependent S‐Box cube, Adv. Mech. Eng., 10 (2018), https://doi.org/10.1049/iet-ifs.2018.5043 doi: 10.1049/iet-ifs.2018.5043
    [12] A. Seghier, J. Li, D. Z. Sun, Development of key-dependent dynamic S-boxes with dynamic irreducible polynomial and affine constant, IET Inform. Secur., 13 (2019), 552–558. https://doi.org/10.1177/1687814018781638 doi: 10.1177/1687814018781638
    [13] S. Ibrahim, A. M. Abbas, Efficient key-dependent dynamic S-boxes based on permutated elliptic curves, Inform. Sciences, 558 (2021), 246–264. https://doi.org/10.1016/j.ins.2021.01.014 doi: 10.1016/j.ins.2021.01.014
    [14] I. Hussain, A. Anees, T. A. Al-Maadeed, M. T. Mustafa, Construction of s-box based on chaotic map and algebraic structures, Symmetry, 11 (2019), 351. https://doi.org/10.3390/sym11030351 doi: 10.3390/sym11030351
    [15] Y. Wang, Z. Zhang, L. Y. Zhang, J. Feng, J. Gao, P. Lei, A genetic algorithm for constructing bijective substitution boxes with high nonlinearity, Inform. Sciences, 523 (2020), 152–166. https://doi.org/10.1016/j.ins.2020.03.025 doi: 10.1016/j.ins.2020.03.025
    [16] D. Zhu, X. Tong, Z. Wang, M. Zhang, A novel lightweight block encryption algorithm based on the combined chaotic system, J. Inf. Secur. Appl., 69 (2022), 103289. https://doi.org/10.1016/j.jisa.2022.103289 doi: 10.1016/j.jisa.2022.103289
    [17] Z. Hua, J. Li, Y. Chen, Sh Yi, Design and application of an S-box using complete Latin square, Nonlinear Dynam., 104 (2021), 807–825. https://doi.org/10.1007/s11071-021-06308-3 doi: 10.1007/s11071-021-06308-3
    [18] S. BiBi, M. Abbas, M. Y. Misro, G. Hu, A novel approach of hybrid trigonometric Bézier curve to the modeling of symmetric revolutionary curves and symmetric rotation surfaces, IEEE Access, 7 (2019), 165779–165792. https://doi.org/ 10.1109/ACCESS.2019.2953496 doi: 10.1109/ACCESS.2019.2953496
    [19] Y. Si, H. Liu, Y. Chen, Constructing keyed strong S-Box using an enhanced quadratic map, Int. J. Bifurcat. Chaos, 31 (2021), 2150146. https://doi.org/10.1142/S0218127421501467 doi: 10.1142/S0218127421501467
    [20] A. Belazi, A. A. Abd El-Latif, A simple yet efficient S-box method based on a chaotic sine map, Optik, 130 (2017), 1438–1444. https://doi.org/10.1016/j.ijleo.2016.11.152 doi: 10.1016/j.ijleo.2016.11.152
    [21] S. S. Jamal, M. U. Khan, T. Shah, A watermarking technique with chaotic fractional S-box transformation, Wireless Pers. Commun., 90 (2016), 2033–2049. https://doi.org/10.1007/s11277-016-3436-0 doi: 10.1007/s11277-016-3436-0
    [22] F. Firdousi, S. I. Batool, M. Amin, A novel construction scheme for nonlinear components based on quantum map, Int. J. Theor. Phys., 58 (2019), 3871–3898. https://doi.org/10.1007/s10773-019-04254-w doi: 10.1007/s10773-019-04254-w
    [23] Alamsyah, A. Bejo, T. B. Adji, The replacement of irreducible polynomial and affine mapping for the construction of a strong S-box, Nonlinear Dynam., 93 (2018), 2105–2118. https://doi.org/10.1007/s11071-018-4310-2 doi: 10.1007/s11071-018-4310-2
    [24] M. Zhao, H. Liu, Y. Niu, Batch generating keyed strong S-Boxes with high nonlinearity using the 2D hyper chaotic map, Integration, 92 (2023), 91–98. https://doi.org/10.1016/j.vlsi.2023.05.006 doi: 10.1016/j.vlsi.2023.05.006
    [25] W. Alexan, M. Elkandoz, M. Mashaly, E. Azab, A. Aboshousha, Color image encryption through chaos and kaa map, Symmetry, 11 (2023), 11541–11554. https://doi.org/10.1109/ACCESS.2023.3242311 doi: 10.1109/ACCESS.2023.3242311
    [26] M. Lavanya, K. J. A. Sundar, S. Saravanan, Simplified Image Encryption Algorithm (SIEA) to enhance image security in cloud storage, Multimed. Tools Appl., 83 (2024), 1–33. https://doi.org/10.1007/s11042-023-17969-0 doi: 10.1007/s11042-023-17969-0
    [27] G. Yi, Z. Cao, An algorithm of image encryption based on AES, Rossler hyperchaotic modeling, Mobile Netw. Appl., (2023), 1–9. https://doi.org/10.1007/s11036-023-02216-5 doi: 10.1007/s11036-023-02216-5
    [28] Z. Lin, H. Liu, Constructing a non-degeneracy 3D hyperchaotic map and application in image encryption, Multimed. Tools Appl., 83 (2024), 1–20. https://doi.org/10.1007/s11042-024-18741-8 doi: 10.1007/s11042-024-18741-8
    [29] J. Ali, M. K. Jamil, A. S. Alali, R. Ali, A medical image encryption scheme based on Mobius transformation and Galois field, Heliyon, 10 (2024), https://doi.org/10.1016/j.heliyon.2023.e23652 doi: 10.1016/j.heliyon.2023.e23652
    [30] A. Kadeer, Y. Tuersun, H. Liu, Constructing keyed strong S-Box with optimized nonlinearity using nondegenerate 2D hyper chaotic map, Phys. Scripta, 99 (2024), 125281. 10.1088/1402-4896/ad91ed doi: 10.1088/1402-4896/ad91ed
    [31] R. Liu, H. Liu, M. Zhao, Cryptanalysis and construction of keyed strong S-Box based on random affine transformation matrix and 2D hyper chaotic map, Expert Syst. Appl., 252 (2024), 124238. https://doi.org/10.1016/j.eswa.2024.124238 doi: 10.1016/j.eswa.2024.124238
    [32] Y. Ma, Y. Tian, L. Zhang, P. Zuo, Two-dimensional hyperchaotic effect coupled mapping lattice and its application in dynamic S-box generation, Nonlinear Dynam., 112 (2024), 17445–17476. https://doi.org/10.1007/s11071-024-09907-y doi: 10.1007/s11071-024-09907-y
    [33] M. M. Hazzazi, Gulraiz, R. Ali, M. K. Jamil, S. A. Nooh, F. Alblehai, Cryptanalysis of hyperchaotic S-box generation and image encryption, AIMS Math., 9 (2024), 36116–36139. 10.3934/math.20241714 doi: 10.3934/math.20241714
    [34] N. Abughazalah, L. Said, M. Khan, Construction of optimum multivalued cryptographic Boolean function using artificial bee colony optimization and multi-criterion decision-making, Soft Comput., 28 (2024), 5213–5223. https://doi.org/10.1007/s00500-023-09267-6 doi: 10.1007/s00500-023-09267-6
    [35] C. Luo, Y. Wang, Y. Fu, P. Zhou, M. Wang, Constructing dynamic S-boxes based on chaos and irreducible polynomials for image encryption, Nonlinear Dynam., 112 (2024), 6695–6713. https://doi.org/10.1007/s11071-024-09353-w doi: 10.1007/s11071-024-09353-w
    [36] A. S. Alali, R. Ali, M. K. Jamil, J. Ali, Gulraiz, Dynamic S-Box construction using Mordell Elliptic Curves over Galois Field and its applications in image encryption, Mathematics, 12 (2024), 587. https://doi.org/10.3390/math12040587 doi: 10.3390/math12040587
    [37] J. Ali, M. K. Jamil, R. Ali, Gulraiz, Extended fractional transformation based S-box and applications in medical image encryption, Multimed. Tools Appl., (2025), 1–17. https://doi.org/10.1007/s11042-024-20575-3 doi: 10.1007/s11042-024-20575-3
    [38] M. Shadab, M. S. Jawed, M. Sajid, Substitution box construction using transfer-function assisted metaheuristic and booster algorithm: A hybrid approach, Secur. Privacy, 8 (2024), e462. https://doi.org/10.1002/spy2.462 doi: 10.1002/spy2.462
    [39] M. A. Tootkaboni, M. B. Savadkouhi, S-Boxes design based on the Lu-Chen system and their application in image encryption, Soft Comput., 28 (2024), 12119–12140. https://doi.org/10.1007/s00500-024-09912-8 doi: 10.1007/s00500-024-09912-8
    [40] F. Artuğer, F. Özkaynak, A method for generation of substitution box based on random selection, Egypt. Inform. J., 23 (2022), 127–135. https://doi.org/10.1016/j.eij.2021.08.002 doi: 10.1016/j.eij.2021.08.002
    [41] G. Murtaza, N. A. Azam, U. Hayat, Designing an efficient and highly dynamic substitution-box generator for block ciphers based on finite elliptic curves, Secur. Commun. Netw., 2021 (2021), 3367521. https://doi.org/10.1155/2021/3367521 doi: 10.1155/2021/3367521
    [42] M. M. Hazzazi, M. Sajjad, Z. Bassfar, T. Shah, A. Albakri, Nonlinear components of a block cipher over eisenstein integers, CMC-Comput. Mater. Con., 77 (2023), 3659–3675. https://doi.org/10.32604/cmc.2023.039013 doi: 10.32604/cmc.2023.039013
    [43] B. Alabdullah, A. Banga, N. Iqbal, A. Ikram, H. Diab, Advancing cryptographic security with a new delannoy-derived chaotic S-box, IEEE Access, 12 (2024). https://doi.org/10.1109/ACCESS.2024.3410668 doi: 10.1109/ACCESS.2024.3410668
    [44] I. Martinez-Diaz, R. Ali, M. K. Jamil, On the search for supersingular elliptic curves and their applications, Mathematics, 13 (2025), 188. https://doi.org/10.3390/math13020188 doi: 10.3390/math13020188
    [45] R. S. Ali, O. Z. Akif, S. A. Jassim, A. K. Farhan, E. M. El-Kenawy, A. Ibrahim, et al., Enhancement of the CAST Block Algorithm based on novel S-Box for image encryption, Sensors, 22 (2022), 8527. https://doi.org/10.3390/s22218527 doi: 10.3390/s22218527
    [46] R. Ali, J. Ali, P. Ping, M. K. Jamil, A novel S-box generator using Frobenius automorphism and its applications in image encryption, Nonlinear Dynam., 112 (2024), 19463–19486. https://doi.org/10.1007/s11071-024-10003-4 doi: 10.1007/s11071-024-10003-4
  • Reader Comments
  • © 2025 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(31) PDF downloads(6) Cited by(0)

Article outline

Figures and Tables

Figures(12)  /  Tables(8)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog