Skip to main content
Log in

A group theoretic construction of highly nonlinear substitution box and its applications in image encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Substitution box is the most significant component of block cipher. The property of nonlinearity is of great importance for the design of secure substitution boxes. Therefore, it is necessary to develop new methods for the production of substitution boxes with a high non-linearity score. In this paper, we have introduced a novel group theoretic method to construct a robust S-box with non-linearity score 113.75 greater than that of AES S-box. The performance of generated S-box is found to be excellent, when examined through various other well-known algebraic criteria such as strict avalanche criterion, bit independence criterion, differential uniformity and linear approximation probability. The suitability of proposed S-box is tested for image encryption applications through different statistical analyses. We got very encouraging outcomes from all these examinations which certify that the generated S-box meets all the criteria needed to be reliable for secure communication and image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig.3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design. Procedia Comput Sci 57:572–580

    Article  Google Scholar 

  2. Ahmad M, Mittal N, Garg P, Khan MM (2016) Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspect Sci 8:465–468

    Article  Google Scholar 

  3. Ahmed HA, Zolkipli MF, Ahmad M (2019) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Appl 31(11):7201–7210

    Article  Google Scholar 

  4. Ahmet ME, Paul SF (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959–2965

    Article  Google Scholar 

  5. Alhadawi H. S, Lambić D, Zolkipli MF, Ahmad M (2020). Globalized firefly algorithm and chaos for designing substitution box. J Inf Secur Appl, 55:102671.

  6. Alhadawi HS, Majid MA, Lambić D, Ahmad M (2021) A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimedia Tools and Applications 80(5):7333–7350

    Article  Google Scholar 

  7. Ali KM, Khan M (2019) Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int J Theor Phys 58(9):3091–3117

    Article  MathSciNet  MATH  Google Scholar 

  8. Aslan B, Sakalli MT, Bulus E (2008) Classifying 8-bit to 8-bit S-boxes based on power mappings from the point of DDT and LAT distributions. International Workshop on the Arithmetic of Finite Fields. Springer, Berlin, Heidelberg, pp 123–133

    Chapter  MATH  Google Scholar 

  9. Bhanot R, Hans R (2015) A review and comparative analysis of various encryption algorithms. International Journal of Security and Its Applications 9(4):289–306

    Article  Google Scholar 

  10. Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72

    Article  MathSciNet  MATH  Google Scholar 

  11. Cameron PJ (2013). Cayley graphs and coset diagrams. Encyclopaedia of design theory, 1–9.

  12. Carlet C, Faugere JC, Goyet C, Renault G (2012) Analysis of the algebraic side channel attack. J Cryptogr Eng 2(1):45–62

    Article  Google Scholar 

  13. Choy J, Yap H, Khoo K (2009). An analysis of the compact XSL attack on BES and embedded SMS4. In International Conference on Cryptology and Network Security, 103–118.

  14. Daemen J, Rijmen V (2001). Reijndael: The Advanced Encryption Standard. Dr. Dobb's Journal: Software Tools for the Professional Programmer, 26(3):137–139.

  15. Diem C (2004). The XL-algorithm and a conjecture from commutative algebra. In International Conference on the Theory and Application of Cryptology and Information Security, 323–337.

  16. Dobbertin H (1998). One to one highly nonlinear power functions on GF(2n). Applicable Algebra in Engineering. Communication and Computing, 9(139):152 (1998).

  17. Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and teaching–learning-based Optimization. Nonlinear Dyn 88(2):1059–1074

    Article  Google Scholar 

  18. Firdousi F, Batool SI, Amin M (2019) A novel construction scheme for nonlinear component based on quantum map. J Theor Phys 58(11):3871–3898

    Article  MathSciNet  MATH  Google Scholar 

  19. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(06):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  20. Guesmi R, Farah MAB, Kachouri A, Samet M (2014). A novel design of Chaos based S-Boxes using genetic algorithm techniques. In 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications, 678–684.

  21. Higman G, Mushtaq Q (1983) Coset diagrams and relations for PSL(2, Z). Arab Gulf J Sci Res 1(1):159–164

    MathSciNet  MATH  Google Scholar 

  22. Hussain I, Shah T, Gondal MA, Mahmood H (2012) Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z Naturforsch A 67(5):282–288

    Article  Google Scholar 

  23. Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. IET Electronic Letters 44(13):800–801

    Article  Google Scholar 

  24. Jamal SS, Shah T (2018) A novel algebraic technique for the construction of strong substitution box. Wirel Pers Commun 99(1):213–226

    Article  Google Scholar 

  25. Javeed A, Shah T, Ullah A (2020) Construction of non-linear component of block cipher by means of chaotic dynamical system and symmetric group. Wirel Pers Commun 12:467–480

    Article  Google Scholar 

  26. Jovanovic P, Kreuzer M (2010) Algebraic attacks using SAT-solvers. Groups Complex Cryptol 2(2):247–259

    Article  MathSciNet  MATH  Google Scholar 

  27. Kazlauskas K, Kazlauskas J (2009) Key-dependent S-box generation in AES block cipher system. Informatica 20(1):23–34

    Article  MathSciNet  MATH  Google Scholar 

  28. Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71(3):489–492

    Article  MathSciNet  Google Scholar 

  29. Khan M, Shah T, Batool SI (2016) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput Appl 27(3):677–685

    Article  Google Scholar 

  30. Lambić D (2017) A novel method of S-box design based on discrete chaotic map. Nonlinear Dyn 87(4):2407–2413

    Article  MathSciNet  Google Scholar 

  31. Lambić D (2020) A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design. Nonlinear Dyn 100(1):699–711

    Article  MathSciNet  Google Scholar 

  32. Li C, Preneel B (2019). Improved interpolation attacks on cryptographic primitives of low algebraic degree. In International Conference on Selected Areas in Cryptography, 171–193.

  33. Lu Q, Zhu C, Wang G (2019) A novel S-box design algorithm based on a new compound chaotic system. Entropy 21(10):1004

    Article  MathSciNet  Google Scholar 

  34. Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 8:25664–25678

    Article  Google Scholar 

  35. Lyndon RC, Schupp PE (2015) Combinatorial group theory. Springer

    MATH  Google Scholar 

  36. Matsui M (1993) Linear cryptanalysis method for DES cipher. Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp 386–397

    Google Scholar 

  37. Mushtaq Q (1989) Coset diagrams for an action of the extended modular group on the projective line over a finite field. Indian J Pure Appl Math 20(8):747–754

    MathSciNet  MATH  Google Scholar 

  38. Mustaq Q (1992) Parametrization of all homomorphisms from PGL(2 Z) into PGL(2, q). Commun Algebra 20(4):1023–1040

    Article  MathSciNet  MATH  Google Scholar 

  39. Özkaynak F (2019) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl 31(8):3317–3326

    Article  Google Scholar 

  40. Pieprzyk J, Finkelstein G (1988) Towards effective nonlinear cryptosystem design. IEE Proceedings E-Computers and Digital Techniques 135(6):325–335

    Article  Google Scholar 

  41. Razaq A, Alolaiyan H, Ahmad M, Yousaf MA, Shuaib U, Aslam W, Alawida M (2020) A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups. IEEE Access 8:75473–75490

    Article  Google Scholar 

  42. Selcuk AA (2008) On probability of success in linear and differential cryptanalysis. J Cryptol 21(1):131–147

    Article  MathSciNet  MATH  Google Scholar 

  43. Shafique A (2020) A new algorithm for the construction of substitution box by using chaotic map. Eur Phys J Plus 135(2):1–13

    Article  Google Scholar 

  44. Siddiqui N, Khalid H, Murtaza F, Ehatisham-Ul-Haq M, Azam MA (2020) A novel algebraic technique for design of computational substitution-boxes using action of matrices on galois field. IEEE Access 8:197630–197643

    Article  Google Scholar 

  45. Siddiqui N, Naseer A, Ehatisham-ul-Haq M (2020) A Novel Scheme of Substitution-Box Design Based on Modified Pascal’s Triangle and Elliptic Curve. Wireless Pers Commun 116(4):3015–3030

    Article  Google Scholar 

  46. Siddiqui N, Yousaf F, Murtaza F, Ehatisham-ul-Haq M, Ashraf MU, Alghamdi AM, Alfakeeh AS (2020). A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field. Plos one, 15(11):e0241890.

  47. Silva García VM, Flores Carapia R, Rentería Márquez C, Luna Benoso B, Aldape Pérez M (2018) Substitution box generation using Chaos: an image encryption application. Appl Math Comput 332:123–135

    MathSciNet  MATH  Google Scholar 

  48. Tian Y, Lu Z (2016) S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm. J Syst Eng Electron 27(1):232–241

    MathSciNet  Google Scholar 

  49. Tian Y, Lu Z (2017). Chaotic S-box: intertwining logistic map and bacterial foraging optimization. Mathematical Problems in Engineering.

  50. Torstensson A (2010) Coset diagrams in the study of finitely presented groups with an application to quotients of the modular group. J Commut Algebra 2(4):501–514

    Article  MathSciNet  MATH  Google Scholar 

  51. Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88(4):2757–2769

    Article  Google Scholar 

  52. Vergili I, Yücel MD (2001) Avalanche and bit independence properties for the ensembles of randomly chosen n×n S-boxes. Turk J Electr Eng Comput Sci 9(2):137–146

    Google Scholar 

  53. Wang J, Zhu Y, Zhou C, Qi Z (2020) Construction method and performance analysis of chaotic S-box based on a memorable simulated annealing algorithm. Symmetry 12(12):2115

    Article  Google Scholar 

  54. Wu XJ, Kan HB, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39

    Article  Google Scholar 

  55. Ye T, Zhimao L (2018) Chaotic S-box: Six-dimensional fractional Lorenz-Duffing chaotic system and O-shaped path scrambling. Nonlinear Dyn 94(3):2115–2126

    Article  Google Scholar 

  56. Yi L, Tong X, Wang Z, Zhang M, Zhu H, Liu J (2019) A novel block encryption algorithm based on chaotic S-box for wireless sensor network. IEEE Access 7:53079–53090

    Article  Google Scholar 

  57. Webster AF, Tavares SE (1986). On the design of s-boxes. Advances in cryptology, Berlin: Springer.

  58. Yousaf MA, Alolaiyan H, Ahmad M, Dilbar M, Razaq A (2020) Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes. IEEE Access 8:39781–39792

    Article  Google Scholar 

  59. Zahid AH, Arshad MJ, Ahmad M (2019) A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21(3):245

    Article  MathSciNet  Google Scholar 

  60. Zahid AH, Al-Solami E, Ahmad M (2020) A Novel Modular Approach Based Substitution-Box Design for Image Encryption. IEEE Access 8:150326–150340

    Article  Google Scholar 

  61. Zhang T, Chen CP, Chen L, Xu X, Hu B (2018) Design of highly nonlinear substitution boxes based on I-Ching operators. IEEE Trans Cybern 48(12):3349–3358

    Article  Google Scholar 

  62. Zhao K, Cui J, Xie Z (2017) Algebraic cryptanalysis scheme of AES-256 using Gröbner basis. J Electr Comput Eng 2017:1–9

    Google Scholar 

  63. Zhu S, Wang G, Zhu C (2019) A secure and fast image encryption scheme based on double chaotic s-boxes. Entropy 21(8):790

    Article  MathSciNet  Google Scholar 

  64. Zhu D, Tong X, Zhang M, Wang Z (2020) A new S-box generation method and advanced design based on combined chaotic system. Symmetry 12(12):2087

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdul Razaq.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Razaq, A., Akhter, S., Yousaf, A. et al. A group theoretic construction of highly nonlinear substitution box and its applications in image encryption. Multimed Tools Appl 81, 4163–4184 (2022). https://doi.org/10.1007/s11042-021-11635-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11635-z

Keywords

Navigation