Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ IEEE Accessarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IEEE Access
Article . 2023 . Peer-reviewed
License: CC BY
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IEEE Access
Article . 2023
Data sources: DOAJ
https://dx.doi.org/10.60692/6q...
Other literature type . 2023
Data sources: Datacite
https://dx.doi.org/10.60692/cy...
Other literature type . 2023
Data sources: Datacite
versions View all 4 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Design of Nonlinear Component of Block Cipher Using Gravesian Octonion Integers

تصميم مكون غير خطي لشفرة الكتلة باستخدام الأعداد الصحيحة لأوكتونيون الجرافيزيان
Authors: Muhammad Irfan; Tariq Shah; Ghazanfar Farooq Siddiqui; Amjad Rehman; Tanzila Saba; Saeed Ali Bahaj;

Design of Nonlinear Component of Block Cipher Using Gravesian Octonion Integers

Abstract

Étant le seul composant non linéaire dans de nombreux cryptosystèmes, une S-box fait partie intégrante des techniques modernes de chiffrement symétrique qui crée un caractère aléatoire et augmente la confidentialité au stade de la substitution du chiffrement. La capacité à construire une S-box cryptographiquement forte dépend uniquement de son schéma de construction. L'objectif principal d'une S-box dans les normes de chiffrement est d'établir une confusion entre l'entrée de m bits dans la sortie de n bits (à la fois m, n >= 2). Cet article a proposé un moyen robuste de construire des S-box basées sur les entiers octonioniques de Graves. Nous divisons le papier en trois parties : premièrement, une technique complète de construction de S-box à l'aide d'une cartographie affine est décrite. Le travail présenté est développé de telle sorte que pour chaque entrée valide, il génère deux S-box. Deuxièmement, la force de la S-box nouvellement générée est évaluée en passant par une analyse de sécurité rigoureuse. Enfin, une comparaison approfondie de la méthode nouvellement développée avec certains schémas existants bien connus est effectuée. Nous avons principalement ciblé certaines S-box basées sur une courbe elliptique en comparaison en prenant les mêmes paramètres dans notre schéma. Les résultats et les performances de calcul l'analyse révèle que l'algorithme de proposition peut construire un grand nombre de boîtes S distinctes qui sont sécurisées cryptographiquement et créent une résistance élevée contre diverses attaques de cryptanalyse.

Al ser el único componente no lineal en muchos criptosistemas, una caja S es una parte integral de las técnicas modernas de cifrado simétrico que crea aleatoriedad y aumenta la confidencialidad en la etapa de sustitución del cifrado. La capacidad de construir una caja S criptográficamente fuerte depende únicamente de su esquema de construcción. El propósito principal de una caja S en los estándares de cifrado es establecer confusión entre la entrada de m bits en la salida de n bits (ambos m, n >= 2). Este artículo propuso una forma sólida de construir cajas S basada en los enteros de octonión Gravesiano. Dividimos el documento en tres partes: en primer lugar, se describe una técnica integral para construir una caja S utilizando mapeo afín. El trabajo presentado se desarrolla de tal manera que para cada entrada válida, genera dos cajas S. En segundo lugar, la fuerza de la caja S recién generada se evalúa pasando por un riguroso análisis de seguridad. Finalmente, se realiza una comparación exhaustiva del método recién desarrollado con algunos esquemas existentes bien conocidos. Nos enfocamos principalmente en algunas cajas S basadas en curvas elípticas en comparación tomando los mismos parámetros en nuestro esquema. Los resultados computacionales y el rendimiento revelan que el algoritmo propuesto puede construir una gran cantidad de cajas S distintas que están criptográficamente protegidas y crean una alta resistencia contra varios ataques de criptoanálisis.

Being the only nonlinear component in many cryptosystems, an S-box is an integral part of modern symmetric ciphering techniques that creates randomness and increases confidentiality at the substitution stage of the encryption.The ability to construct a cryptographically strong S-box solely depends on its construction scheme.The primary purpose of an S-box in encryption standards is to establish confusion between the m-bit input into the n-bit output (both m, n >= 2).This article proposed a robust way to construct S-boxes based on the Gravesian octonion integers.We chunk the paper into threefold: firstly, a comprehensive technique for constructing S-box using affine mapping is described.The presented work is developed in such a way that for every valid input, it generates two S-boxes.Secondly, the strength of the newly generated S-box is evaluated by passing through a rigorous security analysis.Finally, a thorough comparison of the newly developed method with some well-known existing schemes is conducted.We mainly targeted some elliptic curve-based S-boxes in comparison by taking the same parameters in our scheme.The computational results and performance analysis reveal that the propose algorithm can construct a large number of distinct S-boxes that are cryptographically secured and create high resistance against various cryptanalysis attacks.

كونه المكون غير الخطي الوحيد في العديد من أنظمة التشفير، يعد S - box جزءًا لا يتجزأ من تقنيات التشفير المتماثلة الحديثة التي تخلق العشوائية وتزيد من السرية في مرحلة الاستبدال من التشفير. تعتمد القدرة على بناء S - box قوي مشفرًا فقط على مخطط البناء الخاص به. الغرض الأساسي من S - box في معايير التشفير هو إنشاء التباس بين مدخلات m - bit في مخرجات n - bit (كلاهما m، n >= 2). اقترحت هذه المقالة طريقة قوية لبناء S - boxs بناءً على يتم تقسيم الورقة إلى ثلاثة أضعاف: أولاً، يتم وصف تقنية شاملة لبناء S - box باستخدام رسم الخرائط الأفقية. يتم تطوير العمل المقدم بطريقة تؤدي إلى إنشاء صندوقين S لكل مدخلات صالحة. ثانيًا، يتم تقييم قوة S - box التي تم إنشاؤها حديثًا من خلال المرور عبر تحليل أمني صارم. أخيرًا، يتم إجراء مقارنة شاملة للطريقة التي تم تطويرها حديثًا مع بعض المخططات الحالية المعروفة. لقد استهدفنا بشكل أساسي بعض صناديق S المستندة إلى المنحنى الإهليلجي مقارنةً بأخذ نفس المعلمات في مخططنا. النتائج الحسابية والأداء يكشف التحليل أن خوارزمية الاقتراح يمكنها بناء عدد كبير من صناديق S المميزة التي يتم تأمينها بشكل مشفر وخلق مقاومة عالية ضد هجمات تحليل التشفير المختلفة.

Keywords

substitution-box, Construct (python library), Component (thermodynamics), Encryption, Cryptanalysis of Block Ciphers and Hash Functions, Theoretical computer science, Artificial Intelligence, FOS: Mathematics, Block Ciphers, Block cipher, encryption, Cryptography and Error-Correcting Codes, Algebra over a field, Chaos-based Image Encryption Techniques, Arithmetic, Physics, Pure mathematics, Discrete mathematics, Computer science, Affine transformation, TK1-9971, Programming language, Algorithm, Operating system, Notation, Combinatorics, block ciphers, Gravesian octonion integers, Computer Science, Physical Sciences, Security, Cryptography, Thermodynamics, Electrical engineering. Electronics. Nuclear engineering, Computer Vision and Pattern Recognition, S-box, Mathematics, Block (permutation group theory)

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    3
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
3
Top 10%
Average
Average
gold