Construction of new S-boxes based on triangle groups and its applications in copyright protection
- 32 Downloads
Substitution boxes with resilient cryptographic possessions are normally utilized in block ciphers to give the substantial property of nonlinearity. They are important to resist standard attacks such as linear and differential cryptanalysis. A cryptographically robust S-box must be sound with respect to cryptographic properties like nonlinearity, bit independent criteria, strict avalanche criteria, linear and differential approximation probability. In this paper, we have developed an innovative construction scheme of nonlinear component of block cipher based on the action of projective linear groups on the projective line, and the permutation triangle groups. This nonlinear component, namely S-box, is responsible for making the relation between plaintext and ciphertext intractable which is one of the most important requirements of any modern block ciphers. By widening the scope of the proposed S-boxes, we have applied these lightweight nonlinear components in watermarking scheme.
KeywordsS-boxes Projective linear groups Finite fields Modular group Triangle groups Algebraic analyses
The authors would like to thank the anonymous referees for their helpful comments and suggestions, which improved significantly the presentation of the paper. The authors are thankful to the Higher Education Commission (HEC) of Pakistan for the financial support under-vide No. 21-1743/SRGP/R&D/HEC/2017.
- 5.Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. In: Paillier P, Verbauwhede I (eds) The 9th international workshop on cryptographic hardware and embedded systems - CHES 2007, LNCS 4727. Springer, Berlin, pp 450–466Google Scholar
- 6.Chawla G, Kamaldeep RS, Yadav R (2012) Classification of watermarking based upon various parameters. Int J Comput Appl Inf Technol 1:16–19Google Scholar
- 7.Cid C, Murphy S, Robshaw MJB (2005) Small scale variants of the AES, Proceedings of FSE 2005, LNCS, 145–162. SpringerGoogle Scholar
- 8.Conder M, Havas G, Newman MF. On one-relator quotients of the modular group, (preprint)Google Scholar
- 12.Gangadaril BR, Ahamed SR (2015) Analysis and algebraic construction of S-Box for AES algorithm using Irreducible Polynomials. In: 2015 8th international conference on contemporary computing (IC3). Noida0, pp 526–530Google Scholar
- 21.Matsui M (1994) Linear cryptanalysis method for DES cipher, LNCS 765, Eurocrypt’93, pp 386–397Google Scholar
- 22.Meier W, Staffelbach O (1990) Nonlinear criteria for cryptographic functions. In: Quisquater JJ, Vandewalle J (eds) Lecture Notes in Computer Science and Advances in Cryptology, EUROCRYPT 89, vol 434. Springer, Berlin, pp 549–562Google Scholar
- 23.Mihajloska H, Gligoroski D (2012) Construction of optimal 4-bit S-boxes by Quasigroups of order 4. In: The 6th international conference on emerging security information, systems and technologies, SECURWARE 2012, Rome, ItalyGoogle Scholar
- 28.Nakahara J Jr, de Freitas DS (2009) Mini-ciphers: a reliable testbed for cryptanalysis?, “symmetric cryptography”, seminar 09031. In: Dagstuhl S (ed) Dagstuhl Seminar Proceedings. Leibniz-Zentrum fuer Informatik, Germany, pp 1862–4405Google Scholar
- 30.Pieprzyk J, Finkelstein G (1988) Towards effective nonlinear cryptosystem design. IEE proceedings 135, part E(6):325–335Google Scholar
- 33.Singh AK, Kumar B, Singh G, Mohan A (2017) Medical image watermarking: Techniques and applications, SpringerGoogle Scholar