Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 5101934, 16 pages
https://doi.org/10.1155/2017/5101934
Research Article

A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map

1Department of Mathematics, University of Education Lahore, Jauharabad Campus, Jauharabad, Pakistan
2Department of Mathematics, The Islamia University of Bahawalpur, Bahawalpur, Pakistan
3Department of Mathematics, Government College University Faisalabad, Faisalabad, Pakistan
4Department of Basic Sciences, University of Engineering and Technology, Taxila, Punjab, Pakistan
5Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan
6Department of Information Technology, University of Education Lahore, Jauharabad Campus, Jauharabad, Pakistan

Correspondence should be addressed to Abdul Razaq; moc.liamg@uaqnekam

Received 15 August 2017; Accepted 10 October 2017; Published 20 November 2017

Academic Editor: Zheng Yan

Copyright © 2017 Abdul Razaq et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. E. Shannon, “Communication theory of secrecy systems,” Bell Labs Technical Journal, vol. 28, pp. 656–715, 1949. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  2. J. Daemen and V. Rijmen, The Design of Rijndael-AES: The Advanced Encryption Standard, Springer, Berlin, Germany, 2002.
  3. P. J. Cameron, “encyclopaedia of design theory,” in Cayley Graphs and Coset Diagrams, pp. 1–9, 2013. View at Google Scholar
  4. B. Everitt, “Alternating quotients of the (3,q,r) triangle groups,” Communications in Algebra, vol. 25, no. 6, pp. 1817–1832, 1997. View at Publisher · View at Google Scholar · View at MathSciNet
  5. R. C. Lyndon and E. Paul, Combinatorial group theory, vol. 89, Springer, 2015.
  6. Q. Mushtaq and H. Servatius, “Permutation representation of the symmetry groups of regular hyperbolic tessellations,” Journal of the London Mathematical Society, vol. 2, no. 48, pp. 77–86, 1993. View at Google Scholar
  7. A. Torstensson, “Coset diagrams in the study of finitely presented groups with an application to quotients of the modular group,” Journal of Commutative Algebra, vol. 2, no. 4, pp. 501–514, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. J. Pieprzyk and G. Finkelstein, “Towards effective nonlinear cryptosystem design,” IEE Proceedings Part E Computers and Digital Techniques, vol. 135, no. 6, pp. 325–335, 1988. View at Publisher · View at Google Scholar · View at Scopus
  9. I. Vergili and M. D. Yücel, “Avalanche and bit independence properties for the ensembles of randomly chosen n × n s-boxes,” Turkish Journal of Electrical Engineering & Computer Sciences, vol. 9, no. 2, pp. 137–145, 2001. View at Google Scholar · View at Scopus
  10. A. F. Webster and S. E. Tavares, “On the design of s-boxes, advances in cryptology,” in Proceedings of CRYPTO’85, Springer, Berlin, Germany, 1986.
  11. E. Biham and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems,” Journal of Cryptology, vol. 4, no. 1, pp. 3–72, 1991. View at Publisher · View at Google Scholar · View at Scopus
  12. I. Hussain, T. Shah, M. A. Gondal, and H. Mahmood, “Generalized Majority Logic Criterion to Analyze the Statistical Strength of S-Boxes,” Zeitschrift für Naturforschung A, vol. 67, no. 5, pp. 282–288, 2012. View at Publisher · View at Google Scholar
  13. M. T. Tran, D. K. Bui, and A. D. Doung, “Gray S-box for advanced encryption standard,” in Proceedings of the International Conference on Computer Intel Security, vol. 1, pp. 253–258, 2008.
  14. A. Gautam, G. S. Gaba, R. Miglani, and R. Pasricha, “Application of Chaotic Functions for Construction of Strong Substitution Boxes,” Indian Journal of Science and Technology, vol. 8, no. 28, pp. 1–5, 2015. View at Publisher · View at Google Scholar
  15. I. Hussain, T. Shah, H. Mahmood, M. A. Gondal, and U. Y. Bhatti, “Some analysis of S-box based on residue of prime number,” Proceedings of the Pakistan Academy of Sciences, vol. 48, no. 2, pp. 111–115, 2011. View at Google Scholar · View at Scopus
  16. I. Hussain, T. Shah, and H. Mahmood, “A new algorithm to construct secure keys for AES,” International Journal of Contemporary Mathematical Sciences, vol. 5, no. 25-28, pp. 1263–1270, 2010. View at Google Scholar · View at MathSciNet
  17. X. Y. Shi, Hu. Xiao, X. C. You, and K. Y. Lam, “A method for obtaining cryptographically strong 8*8 S-boxes,” in Proceedings of the International Conference on Advanced Information Networking and Applications, vol. 2, pp. 14–20, 2002.
  18. Skipjack and Kea, “Algorithm Specifications Version 2,” http://csrc.nist.gov/CryptoToolkit/.
  19. A. H. Alkhaldi, I. Hussain, and M. A. Gondal, “A novel design for the construction of safe S-boxes based on TDERC sequence,” Alexandria Engineering Journal, vol. 54, pp. 65–69, 2015. View at Publisher · View at Google Scholar
  20. G. Chen, Y. Chen, and X. Liao, “An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps,” Chaos, Solitons & Fractals, vol. 31, no. 3, pp. 571–579, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  21. G. Tang, X. Liao, and Y. Chen, “A novel method for designing S-boxes based on chaotic maps,” Chaos, Solitons & Fractals, vol. 23, no. 2, pp. 413–419, 2005. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Khan, T. Shah, and M. A. Gondal, “An efficient technique for the construction of substitution box with chaotic partial differential equation,” Nonlinear Dynamics, vol. 73, no. 3, pp. 1795–1801, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  23. A. Belazi, M. Khan, A. A. A. El-Latif, and S. Belghith, “Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption,” Nonlinear Dynamics, vol. 87, no. 1, pp. 337–361, 2017. View at Publisher · View at Google Scholar · View at Scopus
  24. A. Ullah, S. S. Jamal, and T. Shah, “A novel construction of substitution box using a combination of chaotic maps with improved chaotic range,” in Nonlinear Dynamics, vol. 88, pp. 2757–2769, Dynamics, 2017. View at Publisher · View at Google Scholar
  25. M. Khan, T. Shah, and S. I. Batool, “Construction of S-box based on chaotic Boolean functions and its application in image encryption,” Neural Computing and Applications, vol. 27, no. 3, pp. 677–685, 2016. View at Publisher · View at Google Scholar · View at Scopus