Abstract
In modern block ciphers, the role of the substitution boxes is to generate ciphertext from the plaintext with high confusion. The immunity to various cryptographic attacks heavily depends on the strength of the S-box. In this article, a new method of obtaining highly nonlinear substitution boxes (S-boxes) is proposed. The subject method utilizes the artificial bee colony optimization technique. To check the immunity of the proposed S-boxes, the analysis of the proposed S-boxes is checked against the key performance indicators (KPIs) for S-boxes. The results obtained from KPIs are highly encouraging and the proposed S-boxes meet all the criteria needed for secure communication and storage of digital content. To rank the proposed S-box and the recently published S-boxes, the technique for order preference by similarity to an ideal solution is discussed for the first time for the S-boxes.
Similar content being viewed by others
Data availability
Enquiries about data availability should be directed to the authors.
References
Ali KM, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl 78:32585–32604
Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, New York
Carlet C, Ding C (2007) Nonlinearities of S-boxes. Finite Fields Appl 13:121–135
Çavuşoğlu Ü, Zengin A, Pehlivan I, Kaçar S (2016) A novel approach for strong S-box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn 87(2):1081–1094
Chen J-J, Zou H, Meng W-H, Zhan Y-F, Yu Y-W, Fu C (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378
Chen J, Zhu Z, Zhang L, Fu C, Yu H (2014) An efficient diffusion scheme for chaos-based digital image encryption. Hindawi Math Problems Eng 2014:1
Elmoasry A, Said L, Khan M, Hussain I (2022) A dual layer security scheme for medical images using Hessenberg and singular value decompositions. Multimed Tools Appl 81:14001–14022
Engel O, Aydn MA, Sertba A (2020) An efficient generation and security analysis of substitution box using fingerprint patterns. IEEE Access 8:160158–160176
Farwa S, Bibi N, Muhammad N (2020) An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling. Multimed Tools Appl 79:28225–28238
Hu L, Ling S, Xianrui Q (2019) Boomerang connectivity table revisited. Application to SKINNY and AES. Trans Symmet Cryptol 2019:118–141
Jamal SS, Shah T, Attaullah A (2017) A group action method for construction of strong substitution box. 3D Res 2017:1
Karaboga D (2005) An idea based on honey bee swarm for numerical optimization. Technical report-TR06
Karaboga D, Basturk B (2008) On the performance of artificial bee colony (ABC) algorithm. Appl Soft Comput 8:687–697. https://doi.org/10.1016/j.asoc.2007.05.007
Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 43:15–27
Khade PN, Narnaware M (2012) 3D chaotic functions for image encryption. IJCSI Int J Comput Sci 9(3):323–328
Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76:377–382
Khan M, Alanazi AS, Said L, Hussain I (2021a) An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial. Complex Intell Syst 2021:1
Khan M, Alanazi AS, Said L, Hussain I (2021b) An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial. Complex Intell Syst 7:2751–2764
Khan M, Khan L, Hazzazi MM, Jamal SS, Hussain I (2022) Image encryption scheme for multi-focus images for visual sensors network. Multimed Tools Appl 81:16353–16370
Lambić D (2017) A novel method of S-box design based on discrete chaotic map. Nonlinear Dyn 87:2407–2413
Lambić D (2018) S-box design method based on improved one-dimensional discrete chaotic map. J Inf Telecommun 181–191:2018
Liu G, Yang W, Liu W, Dai Y (2015) Designing S-boxes based on 3-D four-wing autonomous chaotic system. Nonlinear Dyn 82:1867–1877
Liu Z, Wu C, Wang J, Hu Y (2019) A color image encryption using dynamic DNA and 4-D memristive hyper-chaos. IEEE Access 7:7836778378
Musheer Ahmad DBH (2015) A novel ant colony optimization based scheme for substitution. Elsevier, London
Özkaynak F, Özer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett 374:3733–3738
Ozkaynak F, Ozer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett 374:3733–3738
Said L, Hazzazi MM, Khan M, Jamal SS (2021) A novel image encryption based on Rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes. Chin J Phys 72:558–574
Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
Siddiqui N, Khalid H, Murtaza F, Ehatisham-Ul-Haq M, Azam MA (2020) A novel algebraic technique for design of computational substitution-boxes using action of matrices on galois field. IEEE Access 8:197630–197643
Tanyildizi E, Özkaynak F (2019) A new chaotic S-box generation method using parameter optimization of one dimensional chaotic maps. IEEE Access 7:117829–117838
Wang Y, Wong K-W, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A 376:827–833
Webster AF, Tavares SE (1986) On the design of S-boxes. Springer, London
Zengin A, Pehlivan I, Çavuşoğlu U (2016a) A novel approach for strong S-box generation algorithm. Springer, Dordrecht, p 14
Acknowledgements
This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2023R87), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Funding
This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2023R87), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Abughazalah, N., Said, L. & Khan, M. Construction of optimum multivalued cryptographic Boolean function using artificial bee colony optimization and multi-criterion decision-making. Soft Comput 28, 5213–5223 (2024). https://doi.org/10.1007/s00500-023-09267-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-023-09267-6