1
|
Razaq A, Alhamzi G, Abbas S, Ahmad M, Razzaque A. Secure communication through reliable S-box design: A proposed approach using coset graphs and matrix operations. Heliyon 2023; 9:e15902. [PMID: 37215757 PMCID: PMC10192417 DOI: 10.1016/j.heliyon.2023.e15902] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/24/2023] [Revised: 04/25/2023] [Accepted: 04/26/2023] [Indexed: 05/24/2023] Open
Abstract
Protection of sensitive information has been always the major security concern since decades to withstand against illegitimate access and usage. Substitution-boxes (S-boxes) are vital components of any modern day cryptographic system that allows us to ensure its resistance to attacks. The prime problem with creating S-box is that we are generally unable to discover a consistent distribution among its numerous features to withstand diverse cryptanalysis attacks. The majority of S-boxes investigated in the literature has good cryptographic defenses against some attacks but are susceptible to others. Keeping these considerations in mind, this paper proposes a novel approach for S-box design based on a pair of coset graphs and a newly defined operation of row and column vectors on a square matrix. Several standard performance assessment criteria are used to evaluate the reliability of proposed approach, and the results demonstrate that the developed S-box satisfies all criterions for being robust for secure communication and encryption.
Collapse
Affiliation(s)
- Abdul Razaq
- Department of Mathematics, Division of Science and Technology, University of Education, Lahore, 54770, Pakistan
| | - Ghaliah Alhamzi
- Department of Mathematics and Statistics, College of Science, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, 11564, Saudi Arabia
| | - Sajida Abbas
- Department of Mathematics, Division of Science and Technology, University of Education, Lahore, 54770, Pakistan
| | - Musheer Ahmad
- Department of Computer Engineering, Jamia Millia Islamia, New Delhi, 110025, India
| | - Asima Razzaque
- Department of Basic Sciences, Deanship of Preparatory Year, King Faisal University Al Ahsa, Al Hofuf, Saudi Arabia
| |
Collapse
|
2
|
Alsaif H, Guesmi R, Kalghoum A, Alshammari BM, Guesmi T. A Novel Strong S-Box Design Using Quantum Crossover and Chaotic Boolean Functions for Symmetric Cryptosystems. Symmetry (Basel) 2023. [DOI: 10.3390/sym15040833] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 04/01/2023] Open
Abstract
In this paper, we propose a new method for drawing a cryptographically strong substitution box using the Lorenz system and quantum genetic algorithm techniques. We used the chaotic function to generate an initial random sequence of bits and the quantum crossover to provide a new and improved substitution box with increased non-linearity. The aim of the proposed algorithm was to generate a strong and secure substitution box that can be utilized in symmetric cryptosystems. The use of chaotic Boolean functions, genetic algorithm techniques, and the quantum crossover helped achieve this goal, and statistical tests further confirmed the randomness and efficiency of the generated substitution box. The results of the statistical test suite showed that the substitution box produced by the proposed algorithm is a “pass” in terms of randomness and has strong cryptographic properties. The tests include a frequency (monobit) test, a frequency test within a block, a linear complexity test, an approximate entropy test, and a cumulative sums test among others. The p-values obtained in the tests indicate that the randomness of the generated substitution box meets the requirements of a cryptographically secure substitution box.
Collapse
|
3
|
Symmetry in Chaotic Systems and Circuits. Symmetry (Basel) 2022. [DOI: 10.3390/sym14081612] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
Chaos theory is currently one of the most fascinating fields in modern science, revolutionizing our understanding of organization and patterns in nature [...]
Collapse
|
4
|
Artuğer F, Özkaynak F. SBOX-CGA: substitution box generator based on chaos and genetic algorithm. Neural Comput Appl 2022. [DOI: 10.1007/s00521-022-07589-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/17/2022]
|
5
|
Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:2532497. [PMID: 35774444 PMCID: PMC9239775 DOI: 10.1155/2022/2532497] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/23/2022] [Revised: 04/21/2022] [Accepted: 04/30/2022] [Indexed: 11/17/2022]
Abstract
Schizophrenia is a multifaceted chronic psychiatric disorder that affects the way a human thinks, feels, and behaves. Inevitably, natural randomness exists in the psychological perception of schizophrenic patients, which is our primary source of inspiration for this research because true randomness is the indubitably ultimate valuable resource for symmetric cryptography. Famous information theorist Claude Shannon gave two desirable properties that a strong encryption algorithm should have, which are confusion and diffusion in his fundamental article on the theoretical foundations of cryptography. Block encryption strength against various cryptanalysis attacks is purely dependent on its confusion property, which is gained through the confusion component. In the literature, chaos and algebraic techniques are extensively used to design the confusion component. Chaos- and algebraic-based techniques provide favorable features for the design of the confusion component; however, researchers have also identified potential attacks on these techniques. Instead of existing schemes, we introduce a novel methodology to construct cryptographic confusion component from the natural randomness, which are existing in the psychological perception of the schizophrenic patients, and as a result, cryptanalysis of chaos and algebraic techniques are not applicable on our proposed technique. The psychological perception of the brain regions was captured through the electroencephalogram (EEG) readings during the sensory task. The proposed design passed all the standard evaluation criteria and validation tests of the confusion component and the random number generators. One million true random bits are assessed through the NIST statistical test suite, and the results proved that the psychological perception of schizophrenic patients is a good source of true randomness. Furthermore, the proposed confusion component attains better or equal cryptographic strength as compared to state-of-the-art techniques (2020 to 2021). To the best of our knowledge, this nature of research is performed for the first time, in which psychiatric disorder is utilized for the design of information security primitive. This research opens up new avenues in cryptographic primitive design through the fusion of computing, neuroscience, and mathematics.
Collapse
|
6
|
Block Cipher’s Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight’s Tour Chain. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:8338508. [PMID: 35634082 PMCID: PMC9142301 DOI: 10.1155/2022/8338508] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/16/2022] [Revised: 04/07/2022] [Accepted: 04/11/2022] [Indexed: 11/17/2022]
Abstract
The protection of confidential information is a global issue, and block encryption algorithms are the most reliable option for securing data. The famous information theorist, Claude Shannon, has given two desirable characteristics that should exist in a strong cipher which are substitution and permutation in their fundamental research on “Communication Theory of Secrecy Systems.” block ciphers strictly follow the substitution and permutation principle in an iterative manner to generate a ciphertext. The actual strength of the block ciphers against several attacks is entirely based on its substitution characteristic, which is gained by using the substitution box (S-box). In the current literature, algebraic structure-based and chaos-based techniques are highly used for the construction of S-boxes because both these techniques have favourable features for S-box construction but also various attacks of these techniques have been identified including SAT solver, linear and differential attacks, Gröbner-based attacks, XSL attacks, interpolation attacks, XL-based attacks, finite precision effect, chaotic systems degradation, predictability, weak randomness, chaotic discontinuity, and limited control parameters. The main objective of this research is to design a novel technique for the dynamic generation of S-boxes that are safe against the cryptanalysis techniques of algebraic structure-based and chaos-based approaches. True randomness has been universally recognized as the ideal method for cipher primitives design because true random numbers are unpredictable, irreversible, and unreproducible. The biggest challenge we faced during this research was how can we generate the true random numbers and how can true random numbers utilized for strengthening the S-box construction technique. The basic concept of the proposed technique is the extraction of true random bits from underwater acoustic waves and to design a novel technique for the dynamic generation of S-boxes using the chain of knight's tour. Rather than algebraic structure- and chaos-based techniques, our proposed technique depends on inevitable high-quality randomness which exists in underwater acoustics waves. The proposed method satisfies all standard evaluation tests of S-boxes construction and true random numbers generation. Two million bits have been analyzed using the NIST randomness test suite, and the results show that underwater sound waves are an impeccable entropy source for true randomness. Additionally, our dynamically generated S-boxes have better or equal strength, over the latest published S-boxes (2020 to 2021). According to our knowledge first time, this type of research has been conducted, in which natural randomness of underwater acoustic waves has been used for the construction of block cipher's substitution box.
Collapse
|
7
|
Ali A, Khan MA, Ayyasamy RK, Wasif M. A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map. PeerJ Comput Sci 2022; 8:e940. [PMID: 35634109 PMCID: PMC9138039 DOI: 10.7717/peerj-cs.940] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/04/2021] [Accepted: 03/13/2022] [Indexed: 06/15/2023]
Abstract
Cryptography deals with designing practical mathematical algorithms having the two primitive elements of confusion and diffusion. The security of encrypted data is highly dependent on these two primitive elements and a key. S-box is the nonlinear component present in a symmetric encryption algorithm that provides confusion. A cryptographically strong bijective S-box structure in cryptosystem ensures near-optimal resistance against cryptanalytic attacks. It provides uncertainty and nonlinearity that ensures high confidentiality and security against cryptanalysis attacks. The nonlinearity of an S-box is highly dependent on the dispersal of input data using an S-box. Cryptographic performance criteria of chaos-based S-boxes are worse than algebraic S-box design methods, especially differential probability. This article reports a novel approach to design an 8 × 8 S-box using chaos and randomization using dispersion property to S-box cryptographic properties, especially differential probability. The randomization using dispersion property is introduced within the design loop to achieve low differential uniformity possibly. Two steps are involved in generating the proposed S-box. In the first step, a piecewise linear chaotic map (PWLCM) is utilized to generate initial S-box positions. Generally, the dispersion property is a post-processing technique that measures maximum nonlinearity in a given random sequence. However, in the second step, the concept is carefully reverse engineered, and the dispersion property is used within the design loop for systematic dispersal of input substituting sequence. The proposed controlled randomization changes the probability distribution statistics of S-box's differentials. The proposed methodology systematically substitutes the S-box positions that cause output differences to recur for a given input difference. The proposed S-box is analyzed using well-established and well-known statistical cryptographic criteria of nonlinearity, strict avalanche criteria (SAC), bit independence criteria (BIC), differential probability, and linear probability. Further, the S-box's boomerang connectivity table (BCT) is generated to analyze its strength against boomerang attack. Boomerang is a relatively new attacking framework for cryptosystem. The proposed S-box is compared with the state-of-the-art latest related publications. Results show that the proposed S-box achieves an upper bound of cryptographic properties, especially differential probability. This work hypothesizes that highly dispersive hamming distances at output difference, generated a systematic S-box. The mixing property of chaos generated trajectories utilized for decimal mapping. To test the randomness of generated chaotic trajectories, a cryptographically secure pseudo-random sequence was generated using a chaotic map that was tested using the National Institute of Standards and Technology (NIST) NIST-800-22 test suit.
Collapse
Affiliation(s)
- Asim Ali
- Computer Science, Comsats University Islamabad, Wah Cantt Campus, Punjab, Pakistan
- Computer Science, University of Wah, Wah Cantt, Punjab, Pakistan
| | - Muhammad Asif Khan
- Computer Engineering Department, University of Engineering and Technology Taxila, Taxila, Punjab, Pakistan
| | - Ramesh Kumar Ayyasamy
- Department of Information Systems, Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman (UTAR), Kampar, Perak, Malaysia
| | - Muhammad Wasif
- Department of Computer Science, Comsats University Islamabad, Wah Cantt Campus, Punjab, Pakistan
| |
Collapse
|
8
|
Artuğer F, Özkaynak F. An effective method to improve nonlinearity value of substitution boxes based on random selection. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.07.036] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
9
|
Artuğer F, Özkaynak F. A method for generation of substitution box based on random selection. EGYPTIAN INFORMATICS JOURNAL 2021. [DOI: 10.1016/j.eij.2021.08.002] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
10
|
Khan MF, Saleem K, Alshara MA, Bashir S. Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging. Sci Rep 2021; 11:14282. [PMID: 34253755 PMCID: PMC8275796 DOI: 10.1038/s41598-021-93344-z] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/30/2020] [Accepted: 02/18/2021] [Indexed: 02/06/2023] Open
Abstract
Block cipher has been a standout amongst the most reliable option by which data security is accomplished. Block cipher strength against various attacks relies on substitution boxes. In literature, extensively algebraic structures, and chaotic systems-based techniques are available to design the cryptographic substitution boxes. Although, algebraic and chaotic systems-based approaches have favorable characteristics for the design of substitution boxes, but on the other side researchers have also pointed weaknesses in these approaches. First-time multilevel information fusion is introduced to construct the substitution boxes, having four layers; Multi Sources, Multi Features, Nonlinear Multi Features Whitening and Substitution Boxes Construction. Our proposed design does not hold the weakness of algebraic structures and chaotic systems because our novel s-box construction relies on the strength of true random numbers. In our proposed method true random numbers are generated from the inevitable random noise of medical imaging. The proposed design passes all the substitution box security evaluation criteria including Nonlinearity, Bit Independence Criterion (BIC), Strict Avalanche Criterion (SAC), Differential Approximation Probability (DP), Linear Approximation Probability (LP), and statistical tests, including resistance to Differential Attack, Correlation Analysis, 2D, 3D histogram analysis. The outcomes of the evaluation criteria validate that the proposed substitution boxes are effective for block ciphers; furthermore, the proposed substitution boxes attain better cryptographic strength as compared to very recent state-of-the-art techniques.
Collapse
Affiliation(s)
- Muhammad Fahad Khan
- grid.412621.20000 0001 2215 1297Department of Computer Sciences, Quaid-i-Azam University, Islamabad, Pakistan ,grid.444791.b0000 0004 0609 4183Department of Software Engineering, Foundation University Islamabad, Islamabad, Pakistan
| | - Khalid Saleem
- grid.412621.20000 0001 2215 1297Department of Computer Sciences, Quaid-i-Azam University, Islamabad, Pakistan
| | - Mohammed Ali Alshara
- Department of Information Technology, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University, Riyadh, Saudi Arabia
| | - Shariq Bashir
- grid.444752.40000 0004 0377 8002DMPS Computer Science Section, The College of Arts and Sciences, University of Nizwa, Nizwa, Sultanate of Oman
| |
Collapse
|
11
|
Pharmacological Properties and Chemical Profiles of Passiflora foetida L. Extracts: Novel Insights for Pharmaceuticals and Nutraceuticals. Processes (Basel) 2020. [DOI: 10.3390/pr8091034] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/08/2023] Open
Abstract
In the present study, Passiflora foetida extracts characterized by different polarities were studied for their phytochemical profile, enzyme inhibitory, and antioxidant potentials. In silico, in vitro and ex vivo studies were also carried out on methanol and water extracts for predicting pharmacokinetics and pharmacodynamics. In this regard, neuronal HypoE22 cells, isolated mouse skin tissues, and pathogen dermatophytes strains were exposed to extracts. Emphasis was given to the preventing effects induced by the extracts on hydrogen peroxide-induced alterations of prostaglandin E2 (PGE2), l-dopa, and serotonin. Chemical analysis revealed the presence of similar compounds in infusion and methanolic extracts. The ex vivo studies also showed protective skin properties by P. foetida water and methanol extracts, as evidenced by the decrease of hydrogen peroxide-induced PGE2 level. Additionally, the blunting effects on hydrogen peroxide-induced l-dopa levels are consistent with the anti-tyrosinase effect exerted by both extracts. In silico studies demonstrated the affinity of extracts’ phytochemicals, namely apigenin, chrysoeriol, loliolide, luteolin, quercetin, and vitexin, towards cyclo-oxygenase-2 and tyrosinase. Finally, microbiological tests demonstrated the efficacy of P. foetida methanol and water extracts as anti-mycotic agents against Trichophyton and Arthroderma species, involved in skin inflammation. Hence, P. foetida L. extracts could represent potential sources of pharmaceuticals and nutraceuticals.
Collapse
|
12
|
Abstract
Chaotic systems have attracted considerable attention and been applied in various applications. Investigating simple systems and counterexamples with chaotic behaviors is still an important topic. The purpose of this work was to study a simple symmetrical system including only five nonlinear terms. We discovered the system’s rich behavior such as chaos through phase portraits, bifurcation diagrams, Lyapunov exponents, and entropy. Interestingly, multi-stability was observed when changing system’s initial conditions. Chaos of such a system was predicted by applying a machine learning approach based on a neural network.
Collapse
|