A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher
In the symmetric key cryptography, the purpose of the substitution box is to generate confusion and hence improve the security of the whole cryptosystem. For this reason, many algebraic substitution boxes are constructed depending upon the associative algebras of Galois fields. In this paper, the po...
Saved in:
Published in | IEEE access Vol. 8; pp. 123492 - 123506 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 2169-3536 2169-3536 |
DOI | 10.1109/ACCESS.2020.3005087 |
Cover
Loading…
Abstract | In the symmetric key cryptography, the purpose of the substitution box is to generate confusion and hence improve the security of the whole cryptosystem. For this reason, many algebraic substitution boxes are constructed depending upon the associative algebras of Galois fields. In this paper, the power associative loop is used for the construction of substitution boxes. This novel structure comprises excellent features which include, the inverse of zero element, non-associativity and fewer constraints as compared to the cyclic group and Galois field. In comparison to existing substitution boxes, the substitution boxes based upon power associative loop are comparatively easy and the above-mentioned properties offer the number of structures to construct highly nonlinear substitution boxes. To obtain the number of substitution boxes, we further applied the symmetric group of order 16 on the proposed substitution box. The evaluation of proposed boxes with different algebraic and statistical analyses like nonlinearity test, strict avalanche criterion, bit independence criterion, linear approximation probability and differential approximation probability indicate the strength of proposed substitution boxes. Majority logic criterion results depict that proposed substitution boxes have better cryptographic strength to apply in different techniques of secure communication. |
---|---|
AbstractList | In the symmetric key cryptography, the purpose of the substitution box is to generate confusion and hence improve the security of the whole cryptosystem. For this reason, many algebraic substitution boxes are constructed depending upon the associative algebras of Galois fields. In this paper, the power associative loop is used for the construction of substitution boxes. This novel structure comprises excellent features which include, the inverse of zero element, non-associativity and fewer constraints as compared to the cyclic group and Galois field. In comparison to existing substitution boxes, the substitution boxes based upon power associative loop are comparatively easy and the above-mentioned properties offer the number of structures to construct highly nonlinear substitution boxes. To obtain the number of substitution boxes, we further applied the symmetric group of order 16 on the proposed substitution box. The evaluation of proposed boxes with different algebraic and statistical analyses like nonlinearity test, strict avalanche criterion, bit independence criterion, linear approximation probability and differential approximation probability indicate the strength of proposed substitution boxes. Majority logic criterion results depict that proposed substitution boxes have better cryptographic strength to apply in different techniques of secure communication. |
Author | Jamal, Sajjad Shaukat Hussain, Iqtadar Hussain, Sadam Shah, Tariq |
Author_xml | – sequence: 1 givenname: Sadam orcidid: 0000-0001-6474-0452 surname: Hussain fullname: Hussain, Sadam email: sadamhussain@math.qau.edu.pk organization: Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan – sequence: 2 givenname: Sajjad Shaukat orcidid: 0000-0002-5852-1955 surname: Jamal fullname: Jamal, Sajjad Shaukat organization: Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia – sequence: 3 givenname: Tariq orcidid: 0000-0002-6587-1638 surname: Shah fullname: Shah, Tariq organization: Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan – sequence: 4 givenname: Iqtadar surname: Hussain fullname: Hussain, Iqtadar organization: Department of Mathematics, Statistics, and Physics, Qatar University, Doha, Qatar |
BookMark | eNp9UU1v1DAQtVCRaEt_QS-Wes7ir6wzxyVqodIKkBbOxnHG1NttHGxvEf-epCkIcWAuHr2Z9-bJ74ycDHFAQi45W3HO4M2mba93u5Vggq0kYzVr9AtyKvgaKlnL9clf_StykfOeTdVMUK1PydcN_RR_YKKbnKMLtoRHpNsYR7or6ejKMSH1MdFyh7SNQ34CQxxo9PRDHKptGNCmafQwTq6GkufB20N097QN4x2m1-Slt4eMF8_vOflyc_25fV9tP767bTfbyinWlApqhaoTXnLRaK2F1xo7KbwF2_W2kV0vwQrFAUStQTDw0vvO99xqDmzt5Dm5XXT7aPdmTOHBpp8m2mCegJi-GZtKcAc0DLTgIKVvrFM98g4krxU0jksmpwuT1tWiNab4_Yi5mH08pmGyb4Sq1VoJJeYtWLZcijkn9MaFYufPKcmGg-HMzPmYJR8z52Oe85m48h_ub8f_Z10urICIfxjARQ2cy1_tipwK |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_56809_icujtas_1150309 crossref_primary_10_1016_j_vlsi_2024_102279 crossref_primary_10_1109_ACCESS_2022_3218062 crossref_primary_10_1038_s41598_023_47607_6 crossref_primary_10_32604_cmc_2023_040629 crossref_primary_10_3390_math10132172 crossref_primary_10_1016_j_asej_2024_103193 crossref_primary_10_1109_ACCESS_2022_3218643 crossref_primary_10_1007_s11277_021_08597_8 crossref_primary_10_1109_ACCESS_2021_3086717 crossref_primary_10_1007_s40314_023_02215_y crossref_primary_10_1109_ACCESS_2024_3409387 crossref_primary_10_1007_s11277_020_07841_x crossref_primary_10_3233_JIFS_211176 crossref_primary_10_1016_j_compeleceng_2024_109196 crossref_primary_10_1016_j_heliyon_2023_e16514 crossref_primary_10_1109_ACCESS_2021_3095618 crossref_primary_10_1109_ACCESS_2020_3016401 crossref_primary_10_1007_s11042_022_14064_8 crossref_primary_10_1016_j_jksuci_2024_102159 crossref_primary_10_1109_ACCESS_2021_3077194 crossref_primary_10_1109_ACCESS_2023_3261568 crossref_primary_10_32604_cmc_2022_022224 crossref_primary_10_1007_s11554_024_01416_w crossref_primary_10_32604_cmc_2023_040371 crossref_primary_10_1007_s11042_022_11898_0 crossref_primary_10_1016_j_vlsi_2023_06_004 crossref_primary_10_1109_ACCESS_2021_3092512 crossref_primary_10_32604_cmc_2022_028765 crossref_primary_10_1109_ACCESS_2021_3113338 crossref_primary_10_1007_s11042_023_15965_y crossref_primary_10_1007_s11042_021_10697_3 crossref_primary_10_1109_ACCESS_2021_3093247 crossref_primary_10_1109_ACCESS_2024_3354170 |
Cites_doi | 10.1007/s11071-020-05503-y 10.1016/S0024-3795(98)10163-5 10.1155/2012/173931 10.1109/COMMNET.2019.8742391 10.1007/s13319-017-0125-z 10.1007/s11071-017-3409-1 10.3390/e21100958 10.1007/s11045-019-00689-w 10.1007/s11277-019-06474-z 10.3390/cryptography3010006 10.5560/zna.2013-0021 10.1007/s11277-020-07052-4 10.1109/NTICT.2017.7976119 10.1063/1.4978264 10.1007/s11235-011-9461-0 10.3233/JIFS-190137 10.1007/s11277-018-5787-1 10.5121/ijnsa.2011.3214 10.1007/s00521-012-0870-0 10.1007/s11042-018-6250-8 10.1109/ECBI.2009.15 10.1109/ACCESS.2018.2805847 10.1007/s11071-013-1011-8 10.1016/j.optcom.2009.02.044 10.1016/j.cnsns.2013.07.016 10.1140/epjp/s13360-020-00187-0 10.1109/TIT.1979.1056063 10.1002/j.1538-7305.1949.tb00928.x 10.1109/ACCESS.2019.2938513 10.1016/j.camwa.2012.05.017 10.1016/j.cjph.2018.04.013 10.1016/j.jalgebra.2006.01.034 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2020.3005087 |
DatabaseName | IEEE Xplore (IEEE) IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Directory of Open Access Journals (DOAJ) |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 123506 |
ExternalDocumentID | oai_doaj_org_article_09721933f8ac4de1b9315498c1303199 10_1109_ACCESS_2020_3005087 9125911 |
Genre | orig-research |
GrantInformation_xml | – fundername: Deanship of Scientific Research at King Khalid University for funding this work through research groups program grantid: R.G.P. 1/234/41 funderid: 10.13039/501100007446 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-954e4b2f31287772f77eb32fa9abda83bd39a241992579209f3ffbfd1a71906c3 |
IEDL.DBID | RIE |
ISSN | 2169-3536 |
IngestDate | Wed Aug 27 01:30:10 EDT 2025 Mon Jun 30 06:19:45 EDT 2025 Thu Apr 24 22:50:41 EDT 2025 Tue Jul 01 02:55:33 EDT 2025 Wed Aug 27 02:32:50 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://creativecommons.org/licenses/by/4.0/legalcode |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-954e4b2f31287772f77eb32fa9abda83bd39a241992579209f3ffbfd1a71906c3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-6474-0452 0000-0002-5852-1955 0000-0002-6587-1638 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9125911 |
PQID | 2454642429 |
PQPubID | 4845423 |
PageCount | 15 |
ParticipantIDs | ieee_primary_9125911 doaj_primary_oai_doaj_org_article_09721933f8ac4de1b9315498c1303199 proquest_journals_2454642429 crossref_primary_10_1109_ACCESS_2020_3005087 crossref_citationtrail_10_1109_ACCESS_2020_3005087 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20200000 2020-00-00 20200101 2020-01-01 |
PublicationDateYYYYMMDD | 2020-01-01 |
PublicationDate_xml | – year: 2020 text: 20200000 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2020 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref34 ref12 ref37 ref15 ref36 ref14 ref31 biham (ref5) 2012 ref30 ref33 ref11 ref32 ref10 ref2 ali (ref13) 2008; 16 ref17 ref16 ref19 ref18 shah (ref38) 2011; 6 daemen (ref4) 2013 ref24 ref23 ref26 ref25 ref20 ref22 ref28 ref27 ref29 ref8 al-saidi (ref1) 2012 ref7 ref9 ref3 ref6 biham (ref21) 1992 |
References_xml | – start-page: 587 year: 2012 ident: ref1 article-title: Finite and infinite field cryptography analysis and applications publication-title: Proc Int Conf Appl Math Pharmaceutical Sci – start-page: 487 year: 1992 ident: ref21 article-title: Differential cryptanalysis of the full 16-round DES publication-title: Proc Annu Int Cryptol Conf – ident: ref34 doi: 10.1007/s11071-020-05503-y – ident: ref10 doi: 10.1016/S0024-3795(98)10163-5 – ident: ref22 doi: 10.1155/2012/173931 – ident: ref32 doi: 10.1109/COMMNET.2019.8742391 – ident: ref8 doi: 10.1007/s13319-017-0125-z – year: 2013 ident: ref4 publication-title: The Design of Rijndael AES-The Advanced Encryption Standard – ident: ref6 doi: 10.1007/s11071-017-3409-1 – ident: ref28 doi: 10.3390/e21100958 – ident: ref31 doi: 10.1007/s11045-019-00689-w – ident: ref14 doi: 10.1007/s11277-019-06474-z – ident: ref19 doi: 10.3390/cryptography3010006 – ident: ref7 doi: 10.5560/zna.2013-0021 – ident: ref35 doi: 10.1007/s11277-020-07052-4 – ident: ref27 doi: 10.1109/NTICT.2017.7976119 – volume: 6 start-page: 4110 year: 2011 ident: ref38 article-title: Statistical analysis of S-box in image encryption applications based on majority logic criterion publication-title: Int J Phys Sci – ident: ref16 doi: 10.1063/1.4978264 – year: 2012 ident: ref5 publication-title: Differential Cryptanalysis of the Data Encryption Standard – ident: ref25 doi: 10.1007/s11235-011-9461-0 – ident: ref30 doi: 10.3233/JIFS-190137 – ident: ref17 doi: 10.1007/s11277-018-5787-1 – ident: ref23 doi: 10.5121/ijnsa.2011.3214 – ident: ref11 doi: 10.1007/s00521-012-0870-0 – ident: ref18 doi: 10.1007/s11042-018-6250-8 – ident: ref20 doi: 10.1109/ECBI.2009.15 – ident: ref37 doi: 10.1109/ACCESS.2018.2805847 – ident: ref2 doi: 10.1007/s11071-013-1011-8 – ident: ref24 doi: 10.1016/j.optcom.2009.02.044 – ident: ref26 doi: 10.1016/j.cnsns.2013.07.016 – ident: ref33 doi: 10.1140/epjp/s13360-020-00187-0 – ident: ref9 doi: 10.1109/TIT.1979.1056063 – ident: ref3 doi: 10.1002/j.1538-7305.1949.tb00928.x – ident: ref29 doi: 10.1109/ACCESS.2019.2938513 – ident: ref15 doi: 10.1016/j.camwa.2012.05.017 – ident: ref36 doi: 10.1016/j.cjph.2018.04.013 – volume: 16 start-page: 13 year: 2008 ident: ref13 article-title: Counting loops with the inverse property publication-title: Quasigroups Rel Struct – ident: ref12 doi: 10.1016/j.jalgebra.2006.01.034 |
SSID | ssj0000816957 |
Score | 2.373167 |
Snippet | In the symmetric key cryptography, the purpose of the substitution box is to generate confusion and hence improve the security of the whole cryptosystem. For... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 123492 |
SubjectTerms | Algebra Algorithms Approximation Associativity Boxes Ciphers Construction Criteria Cryptography Encryption Fields (mathematics) Group theory Image encryption Mathematical analysis non-associativity Nonlinearity power associative loop S-boxes Statistical analysis Substitutes |
SummonAdditionalLinks | – databaseName: Directory of Open Access Journals (DOAJ) dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1RS8MwEA6yJ30QdYrVKXnw0bK1TdbkcSuOIToEHewtNmkPRFmHTn-_d2lXBoK--FbSNG3uLnf3leQ7xq4AdZw7UYZaRSIUIGO8AheCKCVgfJAqoYPC97PhdC5uF3KxVeqL9oTV9MC14PqeXgZRNygcsigjqxNiFVOOnG-k_dE9jHlbYMr7YBUNtUwbmqFooPujLMMZISCMEacS6wltotsKRZ6xvymx8sMv-2AzOWD7TZbIR_XXHbKdcnnE9ra4A7vsecQfqMIZbwX8VfK7qlrxR08J-_leckxIOSZ4nKpybnhieQV8Vi1DBKFo5Jz8QbWk3RR0Y4yh7ZVnL8Q1cMzmk5unbBo25RJCJwZqHWopSmFjSDDkpJg0Q5oiUo4h17ktcpXYItE5BmytcZlqFBokABaKKE8xKxi65IR1lvjGU8YHDpsjBTHhLVfEuZTOSpvjgrUQgQpYvJGccQ2XOJW0eDMeUwy0qcVtSNymEXfArtuHVjWVxu_dx6SStivxYPsGtA7TWIf5yzoC1iWFtoNozOfQvQest1Gwadbsh4mFFIjGMECf_cerz9kuTaf-XdNjHVRzeYEJzNpeelv9BpfX5to priority: 102 providerName: Directory of Open Access Journals |
Title | A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher |
URI | https://ieeexplore.ieee.org/document/9125911 https://www.proquest.com/docview/2454642429 https://doaj.org/article/09721933f8ac4de1b9315498c1303199 |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT9wwEB0Bp_YAbWnFthT50CNZEn-Q-LisilBVUCVA4ubGjkeqQBsEuz3w6zvjeCPUVlVvVuIktp7Hb8ax3wB8QsK4DToWtql0odFIKmEoUEeDxA-mUXxQ-Pzi-Oxaf7kxNxtwOJ6FiTGmzWdxysX0L7_rw4qXyo4ssbHlg7ybFLgNZ7XG9RROIGFNnYWFqtIezeZz6gOFgJIiU9Y54W1zz8gnafTnpCp_zMSJXk534HzdsGFXye10tfTT8PSbZuP_tvwVbGc_U8yGgfEaNuLiDbx8pj64C99n4hvnSBMjRD-j-Nr39-IyicquHqIgl1aQiyg4r-daaVb0KC76RUFhLJmJ4BmlX_B-DL5xQuR4K-Y_WK3gLVyffr6anxU54UIRdNksC2t01F6iItKqye3GuqZYW2JrW9-1jfKdsi1RvrVk6FaWFhWix65qa_IrjoN6B1sL-uIeiDLQ5apByRFb6GRrTPDGt2TyHitsJiDXSLiQ1cg5KcadS1FJad0An2P4XIZvAofjQ_eDGMe_q58wxGNVVtJOFwgalw3TJfkiqxQ2NGS7WHmrWLWuCUzu1NMJ7DKc40sykhPYXw8Yl63-0UltNMVzRPHv__7UB3jBDRyWcPZhi4CLH8mpWfqDtBhwkMb0L8os8v4 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT9wwEB0hONAeCpRW3RaKDz2SJfEHiY_LCrTA7qpSQeLmxo4tIaoNand76K_vjOONUFuh3iInThw9T96MM34D8CkgxrWTPtNVITMZFMej4LIgvQrID6oStFF4Nj-d3MqrO3W3Acf9XhjvfUw-80M6jP_ym9ataKnsRCMba9rIu4W8r4put1a_okIlJLQqk7RQkeuT0XiMb4FBIMfYlJROKHHuCf1Elf5UVuWvb3EkmIsdmK2H1uWVPAxXSzt0v_5Qbfzfse_Cq-RpslE3NfZgwy9ew8sn-oP78HXEPlOVNNaD9NOzads-si9RVnb13TN0ahk6iYwqe661Zlkb2LxdZBjIoqEw-qa0C8rIoBNnSI8PbHxPegVv4Pbi_GY8yVLJhczJvFpmWkkvLQ8CaatExzuUJUbbPNS6tk1dCdsIXSPpa42mrnmugwjBhqaoS_QsTp14C5sLfOI7YLnD5qIKnGI21_BaKWeVrdHobShCNQC-RsK4pEdOZTG-mRiX5Np08BmCzyT4BnDcd3rs5Diev_yMIO4vJS3t2IDQmGSaJgoYaSFChZO28YXVgnTrKkf0jm86gH2Cs79JQnIAB-sJY5Ld_zBcKokRHZL8-3_3OoLtyc1saqaX8-sP8IIG2y3oHMAmgugP0cVZ2o9xZv8G4LT1Ug |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Power+Associative+Loop+Structure+for+the+Construction+of+Non-Linear+Components+of+Block+Cipher&rft.jtitle=IEEE+access&rft.au=Hussain%2C+Sadam&rft.au=Jamal%2C+Sajjad+Shaukat&rft.au=Shah%2C+Tariq&rft.au=Hussain%2C+Iqtadar&rft.date=2020&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=8&rft.spage=123492&rft.epage=123506&rft_id=info:doi/10.1109%2FACCESS.2020.3005087&rft.externalDocID=9125911 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |