论文标题

一种基于对称组的置换的多个半场S-boxes的新型加密算法

A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group

论文作者

Hussain, Iqtadar, Anees, Amir, Al-Maadeed, Temadher Alassiry, Mustafa, M. T.

论文摘要

凭借互联网和高级通信的巨大好处,从数据安全角度来看,构成了严重的威胁。需要在每个软件和硬件平台上实现的安全加密算法。同样,在块对称加密算法中,取代盒是最重要的部分。在本文中,我们使用对称组的置换框在一组8 s_8上调查了半场替代框,并建立了一个有效的程序来生成具有相同代数属性的S_8半场替代框。此外,使用众所周知的标准(即非线性,严格的雪崩标准,位独立性标准,XOR表和差异不变性)对生成的替代盒进行强度分析。根据分析结果,可以证明生成的替换盒的加密强度与最著名的$ 8 \ times 8 $替换箱相当。作为应用程序,提出了一种可以使用任何形式的安全通信的加密算法。所呈现的算法主要基于(S-P)网络的香农思想,在该算法中,所提出的S_8 Semifield替换盒进行替换过程,并且置换操作是通过二进制循环转换盒转换数据来执行的。此外,提出的加密算法利用了两个不同的混沌图。为了确保这些混乱图的适当利用,我们在安全通信的背景下对其行为进行了深入的分析,并在提出的图像加密算法中应用了混乱图的伪随机序列。统计和仿真结果表明,我们的加密方案是可抵抗不同攻击的安全性,并且可以抵抗线性和差分密码分析。

With the tremendous benefits of internet and advanced communications, there is a serious threat from the data security perspective. There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. Also, in block symmetric encryption algorithms, substitution boxes are the most vital part. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S_8 and establish an effective procedure for generating S_8 semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards namely bijectivity, nonlinearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. Based on the analysis results, it is shown that the cryptographic strength of generated substitution boxes is on par with the best known $8\times 8$ substitution boxes. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of (S-P) network where the process of substitution is performed by the proposed S_8 semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. In order to ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly. The statistical and simulation results imply that our encryption scheme is secure against different attacks and can resist linear and differential cryptanalysis.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源