Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 3421725, 9 pages
https://doi.org/10.1155/2018/3421725
Research Article

An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization

1Department of Applied Mathematics and Physics, Graduate School of Informatics, Kyoto University, Japan
2Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan

Correspondence should be addressed to Naveed Ahmed Azam; pj.ca.u-otoyk.i.pma@maza

Received 29 September 2018; Accepted 7 November 2018; Published 2 December 2018

Academic Editor: Vincenzo Conti

Copyright © 2018 Naveed Ahmed Azam et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. E. Shannon, “Communication theory of secrecy systems,” Bell Labs Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. View at Publisher · View at Google Scholar · View at MathSciNet
  2. B. Schneier, The Twofish Encryption Algorithm: A 128-Bit Block Cipher, John Wiley and Sons Inc, New York, NY, USA, 1999, ISBN: 0471353817.
  3. B. Schneier, “Description of a new variable-length key, 64-bit block cipher (Blowfish),” in Fast Software Encryption, vol. 809 of Lecture Notes in Computer Science, pp. 191–204, Springer, Berlin, Germany, 1994. View at Publisher · View at Google Scholar
  4. X. Lai and J. L. Massey, “A proposal for a new block encryption standard,” in Advances in cryptology---{EUROCRYPT} '90 (Aarhus, 1990), vol. 473 of Lecture Notes in Comput. Sci., pp. 389–404, Springer, Berlin, 1991. View at Publisher · View at Google Scholar · View at MathSciNet
  5. N. A. Azam, “A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding,” Security and Communication Networks, vol. 2017, Article ID 5790189, 9 pages, 2017. View at Publisher · View at Google Scholar
  6. S. El-Ramly, T. El-Garf, and A. Soliman, “Dynamic generation of s-boxes in block cipher systems,” in Proceedings of the Eighteenth National Radio Science Conference. NRSC'2001, pp. 389–397, Mansoura, Egypt. View at Publisher · View at Google Scholar
  7. Y. Wu, J. P. Noonan, and S. Agaian, “Dynamic and implicit latin square doubly stochastic S-boxes with reversibility,” in Proceedings of the 2011 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2011, pp. 3358–3364, USA, October 2011. View at Scopus
  8. J. Peng, S. Jin, L. Lei, and X. Liao, “Construction and analysis of dynamic S-boxes based on spatiotemporal chaos,” in Proceedings of the 11th IEEE International Conference on Cognitive Informatics and Cognitive Computing, ICCI*CC 2012, pp. 274–278, Japan, August 2012. View at Scopus
  9. S. V. Radhakrishnan and S. Subramanian, “An analytical approach to s-box generation,” Computers and Electrical Engineering, vol. 39, no. 3, pp. 1006–1015, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Wang, K.-W. Wong, C. Li, and Y. Li, “A novel method to design S-box based on chaotic map and genetic algorithm,” Physics Letters A, vol. 376, no. 6-7, pp. 827–833, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. A. H. Alkhaldi, I. Hussain, and M. A. Gondal, “A novel design for the construction of safe S-boxes based on TDERC sequence,” Alexandria Engineering Journal, vol. 54, pp. 65–69, 2015. View at Publisher · View at Google Scholar
  12. M. Khan and N. A. Azam, “Right translated AES gray S-boxes,” Security and Communication Networks, vol. 8, no. 9, pp. 1627–1635, 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Khan and N. A. Azam, “S-boxes based on affine mapping and orbit of power function,” 3D Research, vol. 6, article 12, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. V. S. Miller, “Use of elliptic curves in cryptography,” in Advances in Cryptology—CRYPTO'85, H. C. Williams, Ed., vol. 218 of Lecture Notes in Computer Science, pp. 417–426, Springer, 1986. View at Publisher · View at Google Scholar · View at MathSciNet
  15. N. Koblitz, A Course in Number Theory and Cryptography, Springer, New York, NY, USA, 1994. View at MathSciNet
  16. F.-H. Hsiao, “Applying elliptic curve cryptography to a chaotic synchronisation system: neural-network-based approach,” International Journal of Systems Science, vol. 48, no. 14, pp. 3044–3059, 2017. View at Publisher · View at Google Scholar · View at MathSciNet
  17. X. Fang and Y. Wu, “Investigation into the elliptic curve cryptography,” in Proceedings of the 3rd International Conference on Information Management, ICIM 2017, pp. 412–415, China, April 2017. View at Scopus
  18. H.-Y. Chien, “Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking,” Wireless Personal Communications, vol. 94, no. 4, pp. 2925–2936, 2017. View at Publisher · View at Google Scholar · View at Scopus
  19. J. H. Cheon, S. Chee, and C. Park, “S-boxes with Controllable Nonlinearity,” in Advances in Cryptology — EUROCRYPT ’99, vol. 1592 of Lecture Notes in Computer Science, pp. 286–294, Springer Berlin Heidelberg, Berlin, Heidelberg, 1999. View at Publisher · View at Google Scholar
  20. U. Hayat, N. A. Azam, and M. Asif, “A Method of Generating 8 × 8 Substitution Boxes Based on Elliptic Curves,” Wireless Personal Communications, vol. 101, no. 1, pp. 439–451, 2018. View at Publisher · View at Google Scholar
  21. U. Hayat and N. A. Azam, “A novel image encryption scheme based on an elliptic curve,” Signal Processing, vol. 155, pp. 391–402, 2019. View at Publisher · View at Google Scholar
  22. N. A. Azam, U. Hayat, and I. Ullah, Efficient Construction of S-boxes Based on a Mordell Elliptic Curve Over a Finite Field, 1809, https://arxiv.org/pdf/1809.11057.pdf.
  23. H. W. Lenstra Jr., “Factoring integers with elliptic curves,” Annals of Mathematics, vol. 126, no. 3, pp. 649–673, 1987. View at Publisher · View at Google Scholar · View at MathSciNet
  24. S. Turner, D. Brown, K. Yiu, R. Housley, and T. Polk, “Elliptic Curve Cryptography Subject Public Key Information,” RFC Editor RFC5480, 2009. View at Publisher · View at Google Scholar
  25. L. C. Washington, Elliptic Curves Number Theory and Cryptography, Discrete Mathematics and its Applications, Discrete Mathematics and its Applications, Chapman & Hall/CRC, University of Maryland College Park, College Park, MD, USA, 2nd edition, 2008. View at MathSciNet
  26. G. Tang, X. Liao, and Y. Chen, “A novel method for designing S-boxes based on chaotic maps,” Chaos, Solitons and Fractals, vol. 23, no. 2, pp. 413–419, 2005. View at Google Scholar
  27. G. Chen, “A novel heuristic method for obtaining S-boxes,” Chaos, Solitons & Fractals, vol. 36, no. 4, pp. 1028–1036, 2008. View at Publisher · View at Google Scholar · View at Scopus
  28. Y. Wang, L. Yang, . Min Li, and S. Song, “A method for designing S-box based on chaotic neural network,” in Proceedings of the 2010 Sixth International Conference on Natural Computation (ICNC), pp. 1033–1037, Yantai, China, August 2010. View at Publisher · View at Google Scholar
  29. J. Kim and R. C.-W. Phan, “Advanced differential-style cryptanalysis of the NSA's Skipjack block Cipher,” Cryptologia, vol. 33, no. 3, pp. 246–270, 2009. View at Publisher · View at Google Scholar · View at Scopus
  30. J. Daemen and V. Rijmen, The Design of Rijndael: AES-The Advanced Encryption Standard, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar · View at MathSciNet
  31. A. Gautam, G. S. Gaba, R. Miglani, and R. Pasricha, “Application of Chaotic Functions for Construction of Strong Substitution Boxes,” Indian Journal of Science and Technology, vol. 8, no. 28, pp. 1–5, 2015. View at Publisher · View at Google Scholar
  32. G. Chen, Y. Chen, and X. Liao, “An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps,” Chaos, Solitons & Fractals, vol. 31, no. 3, pp. 571–579, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  33. F. Özkaynak and A. B. Özer, “A method for designing strong S-Boxes based on chaotic Lorenz system,” Physics Letters A, vol. 374, no. 36, pp. 3733–3738, 2010. View at Publisher · View at Google Scholar · View at Scopus
  34. Y. Wang, P. Lei, and K.-W. Wong, “A method for constructing bijective S-box with high nonlinearity based on chaos and optimization,” International Journal of Bifurcation and Chaos, vol. 25, no. 10, 1550127, 15 pages, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  35. R. Lidl and H. Niederreiter, Introduction to Finite Fields and their Applications, Cambridge University Press, Cambridge, UK, 1st edition, 1994. View at Publisher · View at Google Scholar · View at MathSciNet