Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2023 May 2;9(5):e15902.
doi: 10.1016/j.heliyon.2023.e15902. eCollection 2023 May.

Secure communication through reliable S-box design: A proposed approach using coset graphs and matrix operations

Affiliations

Secure communication through reliable S-box design: A proposed approach using coset graphs and matrix operations

Abdul Razaq et al. Heliyon. .

Abstract

Protection of sensitive information has been always the major security concern since decades to withstand against illegitimate access and usage. Substitution-boxes (S-boxes) are vital components of any modern day cryptographic system that allows us to ensure its resistance to attacks. The prime problem with creating S-box is that we are generally unable to discover a consistent distribution among its numerous features to withstand diverse cryptanalysis attacks. The majority of S-boxes investigated in the literature has good cryptographic defenses against some attacks but are susceptible to others. Keeping these considerations in mind, this paper proposes a novel approach for S-box design based on a pair of coset graphs and a newly defined operation of row and column vectors on a square matrix. Several standard performance assessment criteria are used to evaluate the reliability of proposed approach, and the results demonstrate that the developed S-box satisfies all criterions for being robust for secure communication and encryption.

Keywords: Block cipher; Coset graphs; Image encryption; Substitution-box.

PubMed Disclaimer

Conflict of interest statement

The authors declare no competing interests.

Figures

Fig. 1
Fig. 1
Coset graph of M over F23{}.
Fig. 2
Fig. 2
One of the patches Pi of D1.
Fig. 3
Fig. 3
The patch P7 of D1.
Fig. 4
Fig. 4
Some part of D2.
Fig. 5
Fig. 5
Graphical version of the arrangement 1.
Fig. 6
Fig. 6
Graphical version of the arrangement 2.
Fig. 7
Fig. 7
Graphic of the row vector's operation on the initial S-box.
Fig. 8
Fig. 8
Graphic of the column vector's operation on the initial S-box.
Fig. 9
Fig. 9
Block diagram describing the suggested S-box construction.
Fig. 10
Fig. 10
Original image and the encrypted images using two rounds of encryption a) Cameraman, b) Pepper and c) Baboon.

References

    1. Shi Z., Yang Z., Hassan A., Li F., Ding X. A privacy preserving federated learning scheme using homomorphic encryption and secret sharing. Telecommun. Syst. 2022:1–15. - PubMed
    1. Butt K.K., Li G., Masood F., Khan S. A digital image confidentiality scheme based on pseudo-quantum chaos and lucas sequence. Entropy. 2020;22(11):1276. - PMC - PubMed
    1. Delfs H., Knebl H., Knebl H. vol. 2. Springer; Heidelberg: 2002. (Introduction to Cryptography).
    1. Pointcheval D. Asymmetric cryptography and practical security. J. Telecommun. Inform. Technol. 2002:41–56.
    1. Kumar S., Wollinger T. Embedded Security in Cars. Springer; Berlin, Heidelberg: 2006. Fundamentals of symmetric cryptography; pp. 125–143.

LinkOut - more resources