Secure communication through reliable S-box design: A proposed approach using coset graphs and matrix operations
- PMID: 37215757
- PMCID: PMC10192417
- DOI: 10.1016/j.heliyon.2023.e15902
Secure communication through reliable S-box design: A proposed approach using coset graphs and matrix operations
Abstract
Protection of sensitive information has been always the major security concern since decades to withstand against illegitimate access and usage. Substitution-boxes (S-boxes) are vital components of any modern day cryptographic system that allows us to ensure its resistance to attacks. The prime problem with creating S-box is that we are generally unable to discover a consistent distribution among its numerous features to withstand diverse cryptanalysis attacks. The majority of S-boxes investigated in the literature has good cryptographic defenses against some attacks but are susceptible to others. Keeping these considerations in mind, this paper proposes a novel approach for S-box design based on a pair of coset graphs and a newly defined operation of row and column vectors on a square matrix. Several standard performance assessment criteria are used to evaluate the reliability of proposed approach, and the results demonstrate that the developed S-box satisfies all criterions for being robust for secure communication and encryption.
Keywords: Block cipher; Coset graphs; Image encryption; Substitution-box.
© 2023 The Author(s).
Conflict of interest statement
The authors declare no competing interests.
Figures










References
-
- Shi Z., Yang Z., Hassan A., Li F., Ding X. A privacy preserving federated learning scheme using homomorphic encryption and secret sharing. Telecommun. Syst. 2022:1–15. - PubMed
-
- Delfs H., Knebl H., Knebl H. vol. 2. Springer; Heidelberg: 2002. (Introduction to Cryptography).
-
- Pointcheval D. Asymmetric cryptography and practical security. J. Telecommun. Inform. Technol. 2002:41–56.
-
- Kumar S., Wollinger T. Embedded Security in Cars. Springer; Berlin, Heidelberg: 2006. Fundamentals of symmetric cryptography; pp. 125–143.
LinkOut - more resources
Full Text Sources