Skip to main content
Log in

Construction of optimum multivalued cryptographic Boolean function using artificial bee colony optimization and multi-criterion decision-making

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In modern block ciphers, the role of the substitution boxes is to generate ciphertext from the plaintext with high confusion. The immunity to various cryptographic attacks heavily depends on the strength of the S-box. In this article, a new method of obtaining highly nonlinear substitution boxes (S-boxes) is proposed. The subject method utilizes the artificial bee colony optimization technique. To check the immunity of the proposed S-boxes, the analysis of the proposed S-boxes is checked against the key performance indicators (KPIs) for S-boxes. The results obtained from KPIs are highly encouraging and the proposed S-boxes meet all the criteria needed for secure communication and storage of digital content. To rank the proposed S-box and the recently published S-boxes, the technique for order preference by similarity to an ideal solution is discussed for the first time for the S-boxes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Data availability

Enquiries about data availability should be directed to the authors.

References

  • Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl 78:32585–32604

    Article  Google Scholar 

  • Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, New York

    Book  Google Scholar 

  • Carlet C, Ding C (2007) Nonlinearities of S-boxes. Finite Fields Appl 13:121–135

    Article  MathSciNet  Google Scholar 

  • Çavuşoğlu Ü, Zengin A, Pehlivan I, Kaçar S (2016) A novel approach for strong S-box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn 87(2):1081–1094

    Article  Google Scholar 

  • Chen J-J, Zou H, Meng W-H, Zhan Y-F, Yu Y-W, Fu C (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378

    Article  ADS  PubMed  Google Scholar 

  • Chen J, Zhu Z, Zhang L, Fu C, Yu H (2014) An efficient diffusion scheme for chaos-based digital image encryption. Hindawi Math Problems Eng 2014:1

    Google Scholar 

  • Elmoasry A, Said L, Khan M, Hussain I (2022) A dual layer security scheme for medical images using Hessenberg and singular value decompositions. Multimed Tools Appl 81:14001–14022

    Article  Google Scholar 

  • Engel O, Aydn MA, Sertba A (2020) An efficient generation and security analysis of substitution box using fingerprint patterns. IEEE Access 8:160158–160176

    Article  Google Scholar 

  • Farwa S, Bibi N, Muhammad N (2020) An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling. Multimed Tools Appl 79:28225–28238

    Article  Google Scholar 

  • Hu L, Ling S, Xianrui Q (2019) Boomerang connectivity table revisited. Application to SKINNY and AES. Trans Symmet Cryptol 2019:118–141

    Google Scholar 

  • Jamal SS, Shah T, Attaullah A (2017) A group action method for construction of strong substitution box. 3D Res 2017:1

    Google Scholar 

  • Karaboga D (2005) An idea based on honey bee swarm for numerical optimization. Technical report-TR06

  • Karaboga D, Basturk B (2008) On the performance of artificial bee colony (ABC) algorithm. Appl Soft Comput 8:687–697. https://doi.org/10.1016/j.asoc.2007.05.007

    Article  Google Scholar 

  • Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 43:15–27

    Article  MathSciNet  Google Scholar 

  • Khade PN, Narnaware M (2012) 3D chaotic functions for image encryption. IJCSI Int J Comput Sci 9(3):323–328

    Google Scholar 

  • Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76:377–382

    Article  MathSciNet  Google Scholar 

  • Khan M, Alanazi AS, Said L, Hussain I (2021a) An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial. Complex Intell Syst 2021:1

    Google Scholar 

  • Khan M, Alanazi AS, Said L, Hussain I (2021b) An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial. Complex Intell Syst 7:2751–2764

    Article  Google Scholar 

  • Khan M, Khan L, Hazzazi MM, Jamal SS, Hussain I (2022) Image encryption scheme for multi-focus images for visual sensors network. Multimed Tools Appl 81:16353–16370

    Article  Google Scholar 

  • Lambić D (2017) A novel method of S-box design based on discrete chaotic map. Nonlinear Dyn 87:2407–2413

    Article  MathSciNet  Google Scholar 

  • Lambić D (2018) S-box design method based on improved one-dimensional discrete chaotic map. J Inf Telecommun 181–191:2018

    Google Scholar 

  • Liu G, Yang W, Liu W, Dai Y (2015) Designing S-boxes based on 3-D four-wing autonomous chaotic system. Nonlinear Dyn 82:1867–1877

    Article  MathSciNet  Google Scholar 

  • Liu Z, Wu C, Wang J, Hu Y (2019) A color image encryption using dynamic DNA and 4-D memristive hyper-chaos. IEEE Access 7:7836778378

    Google Scholar 

  • Musheer Ahmad DBH (2015) A novel ant colony optimization based scheme for substitution. Elsevier, London

    Google Scholar 

  • Özkaynak F, Özer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett 374:3733–3738

    Article  Google Scholar 

  • Ozkaynak F, Ozer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett 374:3733–3738

    Article  CAS  Google Scholar 

  • Said L, Hazzazi MM, Khan M, Jamal SS (2021) A novel image encryption based on Rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes. Chin J Phys 72:558–574

    Article  MathSciNet  Google Scholar 

  • Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    Article  MathSciNet  Google Scholar 

  • Siddiqui N, Khalid H, Murtaza F, Ehatisham-Ul-Haq M, Azam MA (2020) A novel algebraic technique for design of computational substitution-boxes using action of matrices on galois field. IEEE Access 8:197630–197643

    Article  Google Scholar 

  • Tanyildizi E, Özkaynak F (2019) A new chaotic S-box generation method using parameter optimization of one dimensional chaotic maps. IEEE Access 7:117829–117838

    Article  Google Scholar 

  • Wang Y, Wong K-W, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A 376:827–833

    Article  ADS  CAS  Google Scholar 

  • Webster AF, Tavares SE (1986) On the design of S-boxes. Springer, London

    Book  Google Scholar 

  • Zengin A, Pehlivan I, Çavuşoğlu U (2016a) A novel approach for strong S-box generation algorithm. Springer, Dordrecht, p 14

    Google Scholar 

Download references

Acknowledgements

This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2023R87), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Funding

This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2023R87), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abughazalah, N., Said, L. & Khan, M. Construction of optimum multivalued cryptographic Boolean function using artificial bee colony optimization and multi-criterion decision-making. Soft Comput 28, 5213–5223 (2024). https://doi.org/10.1007/s00500-023-09267-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-09267-6

Keywords

Navigation