Abstract
Substitution boxes (S-boxes) are the fundamental mechanisms in symmetric key cryptosystems. These S-boxes guarantee that the cryptosystem is cryptographically secure and make them nonlinear. The S-boxes used in conventional and modern cryptography are mostly constructed over finite Galois field extensions of binary Field \(\mathbb {F}_{2}\). We have presented a novel construction scheme of S-boxes which is based on the elements of subgroups of multiplicative groups of units of the commutative finite chain rings of type \(\frac{\mathbb {F}_{2}[u]}{\langle u^{k}\rangle }\), where \(2\le k\le 8\). Majority logic criterion (MLC) is applied on the apprehended S-boxes owing to, checked their strength.
Similar content being viewed by others
References
Abualrub T, Saip I (2007) Cyclic coacquired a great consideration in algebraic coding theory over the rings \(\mathbb{F}_{2}+u \mathbb{F}_{2}\) and \(\mathbb{F}_{2}+u\mathbb{F}_{2}+u^{2}\mathbb{F}_{2}\). Des Codes Cryptogr 42:273–287
Abu Dahrouj FM (2008) Negacyclic and constacyclic codes over finite chain rings. Master of Mathematics Thesis, The Islamic University of Gaza, Gaza
Adams C, Tavares S (1990) The structured design of cryptographically good S-boxes. J Cryptol 3:27–41
Al-Ashker M (2005) Simplex codes over the ring \( \sum _{n=0}^{s}u^{n}\mathbb{F}_{2}\). Turk J Math 29(3):221–233
Al-Ashker M (2005) Simplex codes over \(\mathbb{F}_{2}+u \mathbb{F}_{2}\). Arab J Sci Eng 3:227–285
Al-Ashker M, Hamoudeh M (2011) Cyclic codes over \( \mathbb{F}_{2}+u\mathbb{F}_{2}+\cdots +u^{k-1}\mathbb{F}_{2}\). Turk J Math 33:737–749
Al-Ashker M, Chen J (2013) Cyclic codes of arbitrary length over \(\mathbb{F}_{q}+u\mathbb{F}_{q}+\cdots +u^{k-1}\mathbb{F}_{q}\). Palistine J Math 2(1):72–80
Andrade AA, Palazzo R Jr (1999) Construction and decoding of BCH codes over finite rings. Linear Algebra Appl 286:69–85
Bilgin B, Nikova S, Nikov V, Rijmen V, Stutz G (2012) Thershold Implementations of all \(3\times 3\) S-boxes. In: Cryptographic Hardware and Embedded Systems. Springer, New York, pp 76–91
Bonnecaze A, Udaya P (1999) Cyclic codes and self dual codes over \(\mathbb{F}_{2}+u\mathbb{F}_{2}\). IEEE Trans Inf Theory 45:1250–1255
Clark WE, Liang JJ (1973) Enumeration of finite commutative chain rings. J Algebra 27(3):445–453
Cohen S, Niederreiter H (2009) Finite fields and applications. Cambridge University Press, London
Cui L, Cao Y (2007) A new S-box structure named affine-power-affine. Int J Innov Comput I 3(3):45–53
Daemen J, Rijmen V (2000) The block cipher Rijndael. Smart Card Research and Applications, Lecture Notes in Computer Science 1820. Springer, New York, pp 277–284
Gupta KC, Sarkar P (2005) Improved construction of nonlinear resilient S-boxes. IEEE Trans Inf Theory 15(1):339–348
Hou X (2001) Finite commutative chain rings. Finite Fields Appl. 7:382–396
Hussain I, Shah T (2013) Literature survey on nonlinear components and chaotic nonlinear compotents of block cipher. Nonlinear dyn 74:869–904
Hussain I, Shah T, Mahmood H, Gondal MA, Bhatti UY (2011) Some analysis of S-box based on residue of prime number. Proc Pak Acad Sci 48(2):111–115
Hussain I, Shah T, Gondal MA, Mahmood H (2012) Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z Naturforsch A 67a:282–288
Kim J, Phan RCW (2009) Advanced differential-style crypt-analysis of the NSA’s skipjack block cipher. Cryptologia 33(3):246–270
Naji A (2002) Linear codes over \({\mathbb{F}}_{2}+u{\mathbb{F}} _{2}+u^{2}{\mathbb{F}}_{2}\) of constant lee weight. The second conference of the Islamic University on Mathematical Science-Gaza
Nyberg K (1991) Perfect nonlinear S-boxes. In: Advances in cryptology—EUROCRYPT91. Lecture Notes in Computer Science, vol 547. Springer, New York pp 378–386
Qian J, Zhang L, Zhu S (2005) Cyclic codes over \( \mathbb{F}_{p}+u\mathbb{F}_{p}+\cdots +u^{k-1}\mathbb{F}_{p}\). IEICE Trans Fundam 3:779–795
Qian J, Zhang L, Zhu S (2006) (1+u) constacyclic and cyclic over \(\mathbb{F}_{2}+u\mathbb{F}_{2}\). Appl Math Lett 19(8):820–823
Qian J, Zhang L, Zhu S (2006) Constacyclic and cyclic codes over \({\mathbb{F}}_{2}+u{\mathbb{F}}_{2}+u^{2}{\mathbb{F}}_{2}\). IEICE Trans Fundam 6:1863–1885
Shah T, Hussain I, Gondal MA, Mahmood H (2011) Statistical analysis of S-box in image encryption applications based on majority logic criterion. Inter J Phys Sci 6(16):4110–4127
Shah T, Qamar A, Andrade AA (2012a) Constructions and decoding of a sequence of BCH codes. Math Sci Res J 16(9):234–250
Shah T, Qamar A, Andrade AA (2012b) Construction and decoding of BCH codes over chain of commutative rings. Math Sci 6(51):14
Shah T, Qamar A, Hussain I (2013) Substitution box on maximal cyclic subgroup of units of a Galois ring. Z Naturforsch A 68a:567–572
Shanbhag AG, Kumar PV, Helleseth T (1996) Upper bound for a hybrid sum over Galois rings with applications to aperiodic correlation of some q-ary sequences. IEEE Trans Inf Theory IT–42(1):250–254
Shankar P (1979) On BCH codes over arbitrary integer rings. IEEE Trans Inf Theory IT–25(4):480–483
Tran MT, Bui DK, Doung AD (2008) Gray S-box for advanced encryption standard. Inter Conf Comput Intell Secur 1:253–256
Yi X, Cheng SX, You XH, Lam KY (2002) A method for obtaining cryptographically strong \(8\times 8\) S-boxes. Int Conf Infor Netw Appl 2(3):14–20
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by Antonio José Silva Neto.
This work was partially supported by Fapesp 2013/25977-7.
Rights and permissions
About this article
Cite this article
Shah, T., Jahangir, S. & de Andrade, A.A. Design of new \(4\times 4\) S-box from finite commutative chain rings. Comp. Appl. Math. 36, 843–857 (2017). https://doi.org/10.1007/s40314-015-0265-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40314-015-0265-9