Skip to main content
Log in

Construction of confusion component based on the isogeny of elliptic curves

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The confusion-creating ability of a substitution box is indispensable. Its utmost involvement in the block cipher motivates researchers to investigate methods and construct cryptographically strong and efficient substitution boxes. In this paper, we define an isogeny that maps the elements of the base curve to the second curve. The points that can generate the maximal order subgroup of the elliptic curve points are the generators of the base curve. A group action is applied to the generators of the base curve to construct the initial S-boxes. The images of the generator points are established through isogeny and used to generate initial S-boxes from the second curve. The idea is cost-effective regarding computation, as both curves share the same prime field, and we only need to find a few generator points and the corresponding images. A suitable permutation from \(S_{n}\) is applied to the selected initial substitution box to improve the nonlinearity. The suggested S-box is balanced and highly nonlinear. We assessed the cryptographic strength of the suggested S-box against linear and differential probabilities. The smaller values of these tests ensure that the suggested S-box is cryptographically strong and can be used securely in any block cipher.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data availability

All the data is included in the manuscript. No additional data has been used.

Code availability

Not applicable.

References

  1. Ahmad M, Al-Solami E, Alghamdi AM, Yousaf MA (2020) Bijective S-boxes method using improved chaotic map-based heuristic search and algebraic group structures. IEEE Access 8:110397–110411

    Article  Google Scholar 

  2. Azam NA, Hayat U, Ullah I (2019) Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field. Front Inf Technol Electron Eng 20(10):1378–1389

    Article  Google Scholar 

  3. Adams C, Tavares S (1990) The structured design of cryptographically good S-boxes. J Cryptol 3(1):27–41

    Article  MathSciNet  Google Scholar 

  4. Arshad S (2023) Construction of 4×4 substitution box using elliptic curves and algebraic group structures. Wireless Personal Communications, pp 1–15

  5. Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72

    Article  MathSciNet  Google Scholar 

  6. Coppersmith D (1994) The Data Encryption Standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243–250

    Article  Google Scholar 

  7. Cui J, Huang L, Zhong H, Chang C, Yang W (2011) An improved AES S-box and its performance analysis. Int J Innov Comput Inf Control 7(5):2291–2302

    Google Scholar 

  8. Cui L, Cao Y (2007) A new S-box structure named affine-power-affine. Int J Innov Comput Inf Control 3(3):751–759

    Google Scholar 

  9. De Feo L, Jao D, Plût J (2014) Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J Math Cryptol 8(3):209–247

    Article  MathSciNet  Google Scholar 

  10. Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and teaching–learning-based optimization. Nonlinear Dyn 88(2):1059–1074

    Article  Google Scholar 

  11. Galbraith SD, Petit C, Silva J (2016) Signature schemes based on supersingular isogeny problems. IACR Cryptol ePrint Arch 2016:1154

    Google Scholar 

  12. Hayat U, Azam NA (2019) A novel image encryption scheme based on an elliptic curve. Signal Process 155:391–402

    Article  Google Scholar 

  13. Hayat U, Azam NA, Asif M (2018) A method of generating 8× 8 substitution boxes based on elliptic curves. Wireless Pers Commun 101(1):439–451

    Article  Google Scholar 

  14. Hussain I, Shah T, Gondal MA, Khan M, Khan WA (2011) Construction of new S-box using a linear fractional transformation. World Appl Sci J 14(12):1779–1785

    Google Scholar 

  15. Hussain I, Shah T, Gondal MA, Mahmood H (2013) Efficient method for designing chaotic S-boxes based on generalized Baker’s map and TDERC chaotic sequence. Nonlinear Dyn 74(1):271–275

    Article  MathSciNet  Google Scholar 

  16. Idrees B, Zafar S, Rashid T, Gao W (2020) Image encryption algorithm using S-box and dynamic Hénon bit level permutation. Multimed Tools Appl 79(9):6135–6162

    Article  Google Scholar 

  17. Jamal SS, Shah T (2018) A novel algebraic technique for the construction of strong substitution box. Wireless Pers Commun 99(1):213–226

    Article  Google Scholar 

  18. Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209

    Article  MathSciNet  Google Scholar 

  19. Kohel DR (1996) Endomorphism rings of elliptic curves over finite fields. University of California, Berkeley

    Google Scholar 

  20. Miller VS (1985) Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques. Springer, Heidelberg, pp 417–426

  21. Mahmood S, Farwa S, Rafiq M, Riaz SMJ, Shah T, Jamal SS (2018) To study the effect of the generating polynomial on the quality of nonlinear components in block ciphers. Secur Commun Netw 2018

  22. Matsui M (1993) Linear cryptanalysis method for DES cipher. In Workshop on the Theory and Application of of Cryptographic Techniques. Springer, Heidelberg, pp 386–397

  23. Vélu J (1971) Isog´enies entre courbes elliptiques. C R Acad Sc Paris Série A 273:238–241

    Google Scholar 

  24. Jao D, Soukharev V (2014) Isogeny-based quantum-resistant undeniable signatures. In International Workshop on Post-Quantum Cryptography. Springer, Cham, pp 160–179

  25. Razaq A, Yousaf A, Shuaib U, Siddiqui N, Ullah A, Waheed A (2017) A novel construction of substitution box involving coset diagram and a bijective map. Secur Commun Netw 2017

  26. Razaq A, Alolaiyan H, Ahmad M, Yousaf MA, Shuaib U, Aslam W, Alawida M (2020) A novel method for generation of strong substitution-boxes based on coset graphs and symmetric groups. Ieee Access 8:75473–75490

    Article  Google Scholar 

  27. Rostovtsev A, Stolbunov A (2006) Public-key cryptosystem based on isogenies. Cryptology ePrint Archive

  28. Stolbunov A (2010) Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves. Adv Math Commun 4(2):215

    Article  MathSciNet  Google Scholar 

  29. Shahzad I, Mushtaq Q, Razaq A (2019) Construction of new S-box using action of quotient of the modular group for multimedia security. Secur Commun Netw 2019:1–13

  30. Skipjack NIST (1998) KEA algorithm specifications. Online document: http://csrc.nist.org/encryption/skipjack/skipjack.pdf

  31. Tran BN, Nguyen TD, Tran TD (2009) A new S-box structure based on graph isomorphism. In 2009 International Conference on Computational Intelligence and Security. IEEE 1:463–467

  32. Tran MT, Bui DK, Duong AD (2008) Gray S-box for advance encryption standard. In 2008 international conference on computational intelligence and security. IEEE 1:253–258

  33. Hallappanavar VL, Halagali BP, Desai VV (2014) Efficient implementation of AES by modifying S-Box. IOSR J Comput Sci (IOSR-JCE), 35–39

  34. Webster AF, Tavares SE (1985) On the design of S-boxes. In Conference on the theory and application of cryptographic techniques, Springer, Heidelberg, pp 523–534

  35. Waqas U, Afzal S, Mir MA, Yousaf M (2014) Generation of AES-like S-boxes by replacing affine matrix. In 2014 12th International Conference on Frontiers of Information Technology. IEEE, pp 159–164

  36. Wang D, Sun SL (2008) Replacement and structure of S-boxes in Rijndael. In 2008 International Conference on Computer Science and Software Engineering, IEEE 3:782–784

  37. Xian ZH, Sun SL (2010) Study on test for structure of S-Boxes in Rijndael. In 2010 Second International Workshop on Education Technology and Computer Science. IEEE 3:84-86

  38. Yi X, Cheng SX, You XH, Lam KY (1997) A method for obtaining cryptographically strong S-boxes. In GLOBECOM 97. IEEE global telecommunications conference. Conference record. IEEE.[Xyi bar] 2:689–693

  39. Zahid AH, Arshad MJ (2019) An innovative design of substitution-boxes using cubic polynomial mapping. Symmetry 11(3):437

    Article  Google Scholar 

Download references

Funding

No grant or financial funding has received for the preparation of this article.

Author information

Authors and Affiliations

Authors

Contributions

It’s a single author effort.

Corresponding author

Correspondence to Sadiqa Arshad.

Ethics declarations

Conflict of interest/Competing interest

The author has no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arshad, S. Construction of confusion component based on the isogeny of elliptic curves. Multimed Tools Appl 83, 47735–47749 (2024). https://doi.org/10.1007/s11042-023-17399-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17399-y

Keywords

Navigation