Skip to main content

An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher

  • Conference paper
  • First Online:
Quality, Reliability, Security and Robustness in Heterogeneous Systems (QShine 2021)

Abstract

Traditional cryptographic block cipher algorithms are often unsuitable for low-resource profiled IoT (Internet of Things) devices. A lightweight cryptographic algorithm is thus mandated. The S boxes are often called the heart of a cryptographic protocol, as a considerable amount of resource and time complexities are associated with the design of an S box. A lightweight S box will consume less memory, less power and less time, ensuring a high-level Shanon’s property of confusion. This paper proposes a lightweight S box design to meet all the requirements of lightweight cryptographic ciphers. The proposed method applies a couple of transformations- the multiplicative inverse in the Galois field \(({2}^{4})\) and affine transformations on selected irreducible polynomials to create \(4\times 4\) S-boxes. Several cryptanalyses such as balance test, bijection property, difference distribution table test, and Boomerang Connectivity were performed to demonstrate the robust characteristics of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gao, W., et al.: Construction of nonlinear component of block cipher by action of modular group PSL(2, Z) on projective line PL(GF(28)). IEEE Access 8, 136736–136749 (2020)

    Article  Google Scholar 

  2. Wang, X., et al.: A chaotic system with infinite equilibria and its S-Box constructing application. Appl. Sci. 8(11), 2132 (2018)

    Article  Google Scholar 

  3. Ibrahim, S., Abbas, A.M.: A novel optimization method for constructing cryptographically strong dynamic s-boxes. IEEE Access 8, 225004–225017 (2020)

    Article  Google Scholar 

  4. Mohamed, K., et al.: Study of S-box Properties in Block Cipher. In: International Conference on Computer, Communications, and Control Technology (I4CT) (2014)

    Google Scholar 

  5. Jamal, S.S., Shah, T.: A novel algebraic technique for the construction of strong substitution box. Wireless Pers. Commun. 99(1), 213–226 (2018)

    Article  Google Scholar 

  6. Radhakrishnan, S.V., Subramanian, S.: An analytical approach to S-Box generation. Comput. Electr. Eng. 39(3), 1006–1015 (2013)

    Article  Google Scholar 

  7. Özkaynak, F.: On the effect of a chaotic system in performance characteristics of chaos based s-box designs. Physica A: Stat. Mech. Appl. 550, 124072 (2020)

    Article  Google Scholar 

  8. Mariot, L., et al.: Cellular automata based S-boxes. Crypt. Commun. 11, 41–62 (2018)

    Article  MathSciNet  Google Scholar 

  9. Partheeban, P., Kavitha, V.: Dynamic key dependent AES S-box generation with optimized quality analysis. Clust. Comput. 22(6), 14731–14741 (2018). https://doi.org/10.1007/s10586-018-2386-6

    Article  Google Scholar 

  10. Lineham, A., Gulliver, T.A.: Heuristic S-box Design. Contemporary. Eng. Sci. 1, 147–168 (2008)

    Google Scholar 

  11. Noughabi, M.N.A., Sadeghiyan, B.:Design of S-boxes based on neural networks. In: 2010 International Conference on Electronics and Information Engineering (2010)

    Google Scholar 

  12. Isa, H., Jamil, N., Z'aba, M.R.: S-box construction from non-permutation power functions. In: 6th International Conference on Security of Information and Networks (2013)

    Google Scholar 

  13. Çavu¸so˘glu, Ü., et al.: A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn. 87(2), 1081–1094 (2017)

    Google Scholar 

  14. Atani, R.E., Mirzakuchaki, S., Atani, S.E.:Low cost implementation of Pomaranch S-Box. In: 1st International Conference on Wireless Communication. (2009)

    Google Scholar 

  15. Islam, F.U., Liu, G.: Designing S-Box Based on 4D-4Wing Hyperchaotic System (2017)

    Google Scholar 

  16. Alhadawi, H.S., Majid, M.A., Lambić, D., Ahmad, M.: A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimedia Tools Appl. 80(5), 7333–7350 (2020). https://doi.org/10.1007/s11042-020-10048-8

    Article  Google Scholar 

  17. Dey, S., Ghosh, R.: A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes. Taylor & Francis Group (2019)

    Google Scholar 

  18. Wong, M.M., Wong, M.L.D.: New lightweight AES S-box using LFSR. In: International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Kuching, Malaysia (2014)

    Google Scholar 

  19. Zhang, W., Bao, Z., Rijmen, V., Liu, M.: A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT. In: Leander, G. (ed.) FSE 2015. LNCS, vol. 9054, pp. 494–515. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48116-5_24

    Chapter  Google Scholar 

  20. Dawood, O.A., et al.: Design a compact non-linear S-Box with multiple-affine transformations. In: Khalaf, M., Al-Jumeily, D., Lisitsa, A. (eds.) Applied Computing to Support Industry: Innovation and Technology, ACRIT 2019, Communications in Computer and Information Science, vol 1174. Springer, Cham (2020)

    Google Scholar 

  21. Waqas, U., et al.: Generation of AES-Like S-Boxes by Replacing Affine Matrix. In: 12th International Conference on Frontiers of Information Technology (2014)

    Google Scholar 

  22. Zhang, X., et al.: Hardware Implementation of Compact AES S-box. Int. J. Comput. Sci. 42, 125–131 (2015)

    Google Scholar 

  23. Tang, G., Liao, X., Chen, Y.: A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons Fractals 23(2), 413–419 (2005)

    Article  Google Scholar 

  24. Song, L., Qin, X., Hu, L.: Boomerang connectivity table revisited. application to SKINNY and AES. IACR Trans. Symmetric Crypt. 1, 118–141 (2019)

    Google Scholar 

  25. Stein, W.A.: S-Boxes and their algebraic representations. Sage 9.3 Reference Manual: Cryptography (2021)

    Google Scholar 

  26. Cid, C., et al.: Boomerang Connectivity Table: A New Cryptanalysis Tool. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (2018)

    Google Scholar 

  27. Boura, C., Canteaut, A.: On the Boomerang Uniformityof Cryptographic Sboxes. IACR Trans. Symmetric Crypt. 3, 290–310 (2018)

    Article  Google Scholar 

  28. Dey, S., Ghosh, R.: A review of existing 4-bit crypto S-Box cryptanalysis techniques and two new techniques with 4-bit boolean functions for cryptanalysis of 4-bit crypto S-Boxes. Adv. Pure Math. 8(3), 273 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Rana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rana, M., Mamun, Q., Islam, R. (2021). An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher. In: Yuan, X., Bao, W., Yi, X., Tran, N.H. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Systems. QShine 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 402. Springer, Cham. https://doi.org/10.1007/978-3-030-91424-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91424-0_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91423-3

  • Online ISBN: 978-3-030-91424-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics