A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher

In the symmetric key cryptography, the purpose of the substitution box is to generate confusion and hence improve the security of the whole cryptosystem. For this reason, many algebraic substitution boxes are constructed depending upon the associative algebras of Galois fields. In this paper, the po...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 8; pp. 123492 - 123506
Main Authors Hussain, Sadam, Jamal, Sajjad Shaukat, Shah, Tariq, Hussain, Iqtadar
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2169-3536
2169-3536
DOI10.1109/ACCESS.2020.3005087

Cover

Loading…
Abstract In the symmetric key cryptography, the purpose of the substitution box is to generate confusion and hence improve the security of the whole cryptosystem. For this reason, many algebraic substitution boxes are constructed depending upon the associative algebras of Galois fields. In this paper, the power associative loop is used for the construction of substitution boxes. This novel structure comprises excellent features which include, the inverse of zero element, non-associativity and fewer constraints as compared to the cyclic group and Galois field. In comparison to existing substitution boxes, the substitution boxes based upon power associative loop are comparatively easy and the above-mentioned properties offer the number of structures to construct highly nonlinear substitution boxes. To obtain the number of substitution boxes, we further applied the symmetric group of order 16 on the proposed substitution box. The evaluation of proposed boxes with different algebraic and statistical analyses like nonlinearity test, strict avalanche criterion, bit independence criterion, linear approximation probability and differential approximation probability indicate the strength of proposed substitution boxes. Majority logic criterion results depict that proposed substitution boxes have better cryptographic strength to apply in different techniques of secure communication.
AbstractList In the symmetric key cryptography, the purpose of the substitution box is to generate confusion and hence improve the security of the whole cryptosystem. For this reason, many algebraic substitution boxes are constructed depending upon the associative algebras of Galois fields. In this paper, the power associative loop is used for the construction of substitution boxes. This novel structure comprises excellent features which include, the inverse of zero element, non-associativity and fewer constraints as compared to the cyclic group and Galois field. In comparison to existing substitution boxes, the substitution boxes based upon power associative loop are comparatively easy and the above-mentioned properties offer the number of structures to construct highly nonlinear substitution boxes. To obtain the number of substitution boxes, we further applied the symmetric group of order 16 on the proposed substitution box. The evaluation of proposed boxes with different algebraic and statistical analyses like nonlinearity test, strict avalanche criterion, bit independence criterion, linear approximation probability and differential approximation probability indicate the strength of proposed substitution boxes. Majority logic criterion results depict that proposed substitution boxes have better cryptographic strength to apply in different techniques of secure communication.
Author Jamal, Sajjad Shaukat
Hussain, Iqtadar
Hussain, Sadam
Shah, Tariq
Author_xml – sequence: 1
  givenname: Sadam
  orcidid: 0000-0001-6474-0452
  surname: Hussain
  fullname: Hussain, Sadam
  email: sadamhussain@math.qau.edu.pk
  organization: Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan
– sequence: 2
  givenname: Sajjad Shaukat
  orcidid: 0000-0002-5852-1955
  surname: Jamal
  fullname: Jamal, Sajjad Shaukat
  organization: Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia
– sequence: 3
  givenname: Tariq
  orcidid: 0000-0002-6587-1638
  surname: Shah
  fullname: Shah, Tariq
  organization: Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan
– sequence: 4
  givenname: Iqtadar
  surname: Hussain
  fullname: Hussain, Iqtadar
  organization: Department of Mathematics, Statistics, and Physics, Qatar University, Doha, Qatar
BookMark eNp9UU1v1DAQtVCRaEt_QS-Wes7ir6wzxyVqodIKkBbOxnHG1NttHGxvEf-epCkIcWAuHr2Z9-bJ74ycDHFAQi45W3HO4M2mba93u5Vggq0kYzVr9AtyKvgaKlnL9clf_StykfOeTdVMUK1PydcN_RR_YKKbnKMLtoRHpNsYR7or6ejKMSH1MdFyh7SNQ34CQxxo9PRDHKptGNCmafQwTq6GkufB20N097QN4x2m1-Slt4eMF8_vOflyc_25fV9tP767bTfbyinWlApqhaoTXnLRaK2F1xo7KbwF2_W2kV0vwQrFAUStQTDw0vvO99xqDmzt5Dm5XXT7aPdmTOHBpp8m2mCegJi-GZtKcAc0DLTgIKVvrFM98g4krxU0jksmpwuT1tWiNab4_Yi5mH08pmGyb4Sq1VoJJeYtWLZcijkn9MaFYufPKcmGg-HMzPmYJR8z52Oe85m48h_ub8f_Z10urICIfxjARQ2cy1_tipwK
CODEN IAECCG
CitedBy_id crossref_primary_10_56809_icujtas_1150309
crossref_primary_10_1016_j_vlsi_2024_102279
crossref_primary_10_1109_ACCESS_2022_3218062
crossref_primary_10_1038_s41598_023_47607_6
crossref_primary_10_32604_cmc_2023_040629
crossref_primary_10_3390_math10132172
crossref_primary_10_1016_j_asej_2024_103193
crossref_primary_10_1109_ACCESS_2022_3218643
crossref_primary_10_1007_s11277_021_08597_8
crossref_primary_10_1109_ACCESS_2021_3086717
crossref_primary_10_1007_s40314_023_02215_y
crossref_primary_10_1109_ACCESS_2024_3409387
crossref_primary_10_1007_s11277_020_07841_x
crossref_primary_10_3233_JIFS_211176
crossref_primary_10_1016_j_compeleceng_2024_109196
crossref_primary_10_1016_j_heliyon_2023_e16514
crossref_primary_10_1109_ACCESS_2021_3095618
crossref_primary_10_1109_ACCESS_2020_3016401
crossref_primary_10_1007_s11042_022_14064_8
crossref_primary_10_1016_j_jksuci_2024_102159
crossref_primary_10_1109_ACCESS_2021_3077194
crossref_primary_10_1109_ACCESS_2023_3261568
crossref_primary_10_32604_cmc_2022_022224
crossref_primary_10_1007_s11554_024_01416_w
crossref_primary_10_32604_cmc_2023_040371
crossref_primary_10_1007_s11042_022_11898_0
crossref_primary_10_1016_j_vlsi_2023_06_004
crossref_primary_10_1109_ACCESS_2021_3092512
crossref_primary_10_32604_cmc_2022_028765
crossref_primary_10_1109_ACCESS_2021_3113338
crossref_primary_10_1007_s11042_023_15965_y
crossref_primary_10_1007_s11042_021_10697_3
crossref_primary_10_1109_ACCESS_2021_3093247
crossref_primary_10_1109_ACCESS_2024_3354170
Cites_doi 10.1007/s11071-020-05503-y
10.1016/S0024-3795(98)10163-5
10.1155/2012/173931
10.1109/COMMNET.2019.8742391
10.1007/s13319-017-0125-z
10.1007/s11071-017-3409-1
10.3390/e21100958
10.1007/s11045-019-00689-w
10.1007/s11277-019-06474-z
10.3390/cryptography3010006
10.5560/zna.2013-0021
10.1007/s11277-020-07052-4
10.1109/NTICT.2017.7976119
10.1063/1.4978264
10.1007/s11235-011-9461-0
10.3233/JIFS-190137
10.1007/s11277-018-5787-1
10.5121/ijnsa.2011.3214
10.1007/s00521-012-0870-0
10.1007/s11042-018-6250-8
10.1109/ECBI.2009.15
10.1109/ACCESS.2018.2805847
10.1007/s11071-013-1011-8
10.1016/j.optcom.2009.02.044
10.1016/j.cnsns.2013.07.016
10.1140/epjp/s13360-020-00187-0
10.1109/TIT.1979.1056063
10.1002/j.1538-7305.1949.tb00928.x
10.1109/ACCESS.2019.2938513
10.1016/j.camwa.2012.05.017
10.1016/j.cjph.2018.04.013
10.1016/j.jalgebra.2006.01.034
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2020.3005087
DatabaseName IEEE Xplore (IEEE)
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Directory of Open Access Journals (DOAJ)
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Materials Research Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 123506
ExternalDocumentID oai_doaj_org_article_09721933f8ac4de1b9315498c1303199
10_1109_ACCESS_2020_3005087
9125911
Genre orig-research
GrantInformation_xml – fundername: Deanship of Scientific Research at King Khalid University for funding this work through research groups program
  grantid: R.G.P. 1/234/41
  funderid: 10.13039/501100007446
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-954e4b2f31287772f77eb32fa9abda83bd39a241992579209f3ffbfd1a71906c3
IEDL.DBID RIE
ISSN 2169-3536
IngestDate Wed Aug 27 01:30:10 EDT 2025
Mon Jun 30 06:19:45 EDT 2025
Thu Apr 24 22:50:41 EDT 2025
Tue Jul 01 02:55:33 EDT 2025
Wed Aug 27 02:32:50 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-954e4b2f31287772f77eb32fa9abda83bd39a241992579209f3ffbfd1a71906c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-6474-0452
0000-0002-5852-1955
0000-0002-6587-1638
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9125911
PQID 2454642429
PQPubID 4845423
PageCount 15
ParticipantIDs ieee_primary_9125911
doaj_primary_oai_doaj_org_article_09721933f8ac4de1b9315498c1303199
proquest_journals_2454642429
crossref_primary_10_1109_ACCESS_2020_3005087
crossref_citationtrail_10_1109_ACCESS_2020_3005087
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20200000
2020-00-00
20200101
2020-01-01
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – year: 2020
  text: 20200000
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2020
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref34
ref12
ref37
ref15
ref36
ref14
ref31
biham (ref5) 2012
ref30
ref33
ref11
ref32
ref10
ref2
ali (ref13) 2008; 16
ref17
ref16
ref19
ref18
shah (ref38) 2011; 6
daemen (ref4) 2013
ref24
ref23
ref26
ref25
ref20
ref22
ref28
ref27
ref29
ref8
al-saidi (ref1) 2012
ref7
ref9
ref3
ref6
biham (ref21) 1992
References_xml – start-page: 587
  year: 2012
  ident: ref1
  article-title: Finite and infinite field cryptography analysis and applications
  publication-title: Proc Int Conf Appl Math Pharmaceutical Sci
– start-page: 487
  year: 1992
  ident: ref21
  article-title: Differential cryptanalysis of the full 16-round DES
  publication-title: Proc Annu Int Cryptol Conf
– ident: ref34
  doi: 10.1007/s11071-020-05503-y
– ident: ref10
  doi: 10.1016/S0024-3795(98)10163-5
– ident: ref22
  doi: 10.1155/2012/173931
– ident: ref32
  doi: 10.1109/COMMNET.2019.8742391
– ident: ref8
  doi: 10.1007/s13319-017-0125-z
– year: 2013
  ident: ref4
  publication-title: The Design of Rijndael AES-The Advanced Encryption Standard
– ident: ref6
  doi: 10.1007/s11071-017-3409-1
– ident: ref28
  doi: 10.3390/e21100958
– ident: ref31
  doi: 10.1007/s11045-019-00689-w
– ident: ref14
  doi: 10.1007/s11277-019-06474-z
– ident: ref19
  doi: 10.3390/cryptography3010006
– ident: ref7
  doi: 10.5560/zna.2013-0021
– ident: ref35
  doi: 10.1007/s11277-020-07052-4
– ident: ref27
  doi: 10.1109/NTICT.2017.7976119
– volume: 6
  start-page: 4110
  year: 2011
  ident: ref38
  article-title: Statistical analysis of S-box in image encryption applications based on majority logic criterion
  publication-title: Int J Phys Sci
– ident: ref16
  doi: 10.1063/1.4978264
– year: 2012
  ident: ref5
  publication-title: Differential Cryptanalysis of the Data Encryption Standard
– ident: ref25
  doi: 10.1007/s11235-011-9461-0
– ident: ref30
  doi: 10.3233/JIFS-190137
– ident: ref17
  doi: 10.1007/s11277-018-5787-1
– ident: ref23
  doi: 10.5121/ijnsa.2011.3214
– ident: ref11
  doi: 10.1007/s00521-012-0870-0
– ident: ref18
  doi: 10.1007/s11042-018-6250-8
– ident: ref20
  doi: 10.1109/ECBI.2009.15
– ident: ref37
  doi: 10.1109/ACCESS.2018.2805847
– ident: ref2
  doi: 10.1007/s11071-013-1011-8
– ident: ref24
  doi: 10.1016/j.optcom.2009.02.044
– ident: ref26
  doi: 10.1016/j.cnsns.2013.07.016
– ident: ref33
  doi: 10.1140/epjp/s13360-020-00187-0
– ident: ref9
  doi: 10.1109/TIT.1979.1056063
– ident: ref3
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– ident: ref29
  doi: 10.1109/ACCESS.2019.2938513
– ident: ref15
  doi: 10.1016/j.camwa.2012.05.017
– ident: ref36
  doi: 10.1016/j.cjph.2018.04.013
– volume: 16
  start-page: 13
  year: 2008
  ident: ref13
  article-title: Counting loops with the inverse property
  publication-title: Quasigroups Rel Struct
– ident: ref12
  doi: 10.1016/j.jalgebra.2006.01.034
SSID ssj0000816957
Score 2.373167
Snippet In the symmetric key cryptography, the purpose of the substitution box is to generate confusion and hence improve the security of the whole cryptosystem. For...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 123492
SubjectTerms Algebra
Algorithms
Approximation
Associativity
Boxes
Ciphers
Construction
Criteria
Cryptography
Encryption
Fields (mathematics)
Group theory
Image encryption
Mathematical analysis
non-associativity
Nonlinearity
power associative loop
S-boxes
Statistical analysis
Substitutes
SummonAdditionalLinks – databaseName: Directory of Open Access Journals (DOAJ)
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1RS8MwEA6yJ30QdYrVKXnw0bK1TdbkcSuOIToEHewtNmkPRFmHTn-_d2lXBoK--FbSNG3uLnf3leQ7xq4AdZw7UYZaRSIUIGO8AheCKCVgfJAqoYPC97PhdC5uF3KxVeqL9oTV9MC14PqeXgZRNygcsigjqxNiFVOOnG-k_dE9jHlbYMr7YBUNtUwbmqFooPujLMMZISCMEacS6wltotsKRZ6xvymx8sMv-2AzOWD7TZbIR_XXHbKdcnnE9ra4A7vsecQfqMIZbwX8VfK7qlrxR08J-_leckxIOSZ4nKpybnhieQV8Vi1DBKFo5Jz8QbWk3RR0Y4yh7ZVnL8Q1cMzmk5unbBo25RJCJwZqHWopSmFjSDDkpJg0Q5oiUo4h17ktcpXYItE5BmytcZlqFBokABaKKE8xKxi65IR1lvjGU8YHDpsjBTHhLVfEuZTOSpvjgrUQgQpYvJGccQ2XOJW0eDMeUwy0qcVtSNymEXfArtuHVjWVxu_dx6SStivxYPsGtA7TWIf5yzoC1iWFtoNozOfQvQest1Gwadbsh4mFFIjGMECf_cerz9kuTaf-XdNjHVRzeYEJzNpeelv9BpfX5to
  priority: 102
  providerName: Directory of Open Access Journals
Title A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher
URI https://ieeexplore.ieee.org/document/9125911
https://www.proquest.com/docview/2454642429
https://doaj.org/article/09721933f8ac4de1b9315498c1303199
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT9wwEB0Bp_YAbWnFthT50CNZEn-Q-LisilBVUCVA4ubGjkeqQBsEuz3w6zvjeCPUVlVvVuIktp7Hb8ax3wB8QsK4DToWtql0odFIKmEoUEeDxA-mUXxQ-Pzi-Oxaf7kxNxtwOJ6FiTGmzWdxysX0L7_rw4qXyo4ssbHlg7ybFLgNZ7XG9RROIGFNnYWFqtIezeZz6gOFgJIiU9Y54W1zz8gnafTnpCp_zMSJXk534HzdsGFXye10tfTT8PSbZuP_tvwVbGc_U8yGgfEaNuLiDbx8pj64C99n4hvnSBMjRD-j-Nr39-IyicquHqIgl1aQiyg4r-daaVb0KC76RUFhLJmJ4BmlX_B-DL5xQuR4K-Y_WK3gLVyffr6anxU54UIRdNksC2t01F6iItKqye3GuqZYW2JrW9-1jfKdsi1RvrVk6FaWFhWix65qa_IrjoN6B1sL-uIeiDLQ5apByRFb6GRrTPDGt2TyHitsJiDXSLiQ1cg5KcadS1FJad0An2P4XIZvAofjQ_eDGMe_q58wxGNVVtJOFwgalw3TJfkiqxQ2NGS7WHmrWLWuCUzu1NMJ7DKc40sykhPYXw8Yl63-0UltNMVzRPHv__7UB3jBDRyWcPZhi4CLH8mpWfqDtBhwkMb0L8os8v4
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT9wwEB0hONAeCpRW3RaKDz2SJfEHiY_LCrTA7qpSQeLmxo4tIaoNand76K_vjOONUFuh3iInThw9T96MM34D8CkgxrWTPtNVITMZFMej4LIgvQrID6oStFF4Nj-d3MqrO3W3Acf9XhjvfUw-80M6jP_ym9ataKnsRCMba9rIu4W8r4put1a_okIlJLQqk7RQkeuT0XiMb4FBIMfYlJROKHHuCf1Elf5UVuWvb3EkmIsdmK2H1uWVPAxXSzt0v_5Qbfzfse_Cq-RpslE3NfZgwy9ew8sn-oP78HXEPlOVNNaD9NOzads-si9RVnb13TN0ahk6iYwqe661Zlkb2LxdZBjIoqEw-qa0C8rIoBNnSI8PbHxPegVv4Pbi_GY8yVLJhczJvFpmWkkvLQ8CaatExzuUJUbbPNS6tk1dCdsIXSPpa42mrnmugwjBhqaoS_QsTp14C5sLfOI7YLnD5qIKnGI21_BaKWeVrdHobShCNQC-RsK4pEdOZTG-mRiX5Np08BmCzyT4BnDcd3rs5Diev_yMIO4vJS3t2IDQmGSaJgoYaSFChZO28YXVgnTrKkf0jm86gH2Cs79JQnIAB-sJY5Ld_zBcKokRHZL8-3_3OoLtyc1saqaX8-sP8IIG2y3oHMAmgugP0cVZ2o9xZv8G4LT1Ug
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Power+Associative+Loop+Structure+for+the+Construction+of+Non-Linear+Components+of+Block+Cipher&rft.jtitle=IEEE+access&rft.au=Hussain%2C+Sadam&rft.au=Jamal%2C+Sajjad+Shaukat&rft.au=Shah%2C+Tariq&rft.au=Hussain%2C+Iqtadar&rft.date=2020&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=8&rft.spage=123492&rft.epage=123506&rft_id=info:doi/10.1109%2FACCESS.2020.3005087&rft.externalDocID=9125911
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon