Research Article
An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization
Table 5
Comparison of the cryptographic properties of some of the newly generated S-boxes with some of the existing S-boxes.
| S-boxes | Linear Attacks | DAP | Analysis of Boolean Functions | | LAP | NL | AC | | SAC(max) | SAC(min) | BIC(max) | BIC(min) |
| Ref. [20] | 0.1406 | 104 | 255 | 0.0391 | 0.6250 | 0.3906 | 0.5313 | 0.4707 | Ref. [21] | 0.1484 | 106 | 254 | 0.0391 | 0.5781 | 0.4375 | 0.5352 | 0.4648 | Ref. [22] | 0.1484 | 106 | 255 | 0.0391 | 0.6406 | 0.4063 | 0.5371 | 0.4707 | Ref. [26] | 0.1328 | 103 | 255 | 0.0391 | 0.5703 | 0.3984 | 0.5352 | 0.4727 | Ref. [27] | 0.1484 | 102 | 254 | 0.0391 | 0.6094 | 0.3750 | 0.5215 | 0.4707 | Ref. [28] | 0.1406 | 106 | 251 | 0.0391 | 0.5938 | 0.4375 | 0.5313 | 0.4648 | Ref. [29] | 0.109 | 104 | 255 | 0.0469 | 0.5930 | 0.3900 | 0.499 | 0.454 | Ref. [30] | 0.062 | 112 | 9 | 0.0156 | 0.5620 | 0.4530 | 0.504 | 0.48 | Ref. [31] | 0.2109 | 74 | 253 | 0.0547 | 0.6875 | 0.1094 | 0.5508 | 0.4023 | Ref. [32] | 0.1328 | 100 | 255 | 0.0547 | 0.6094 | 0.4219 | 0.5313 | 0.4746 | Ref. [33] | 0.1328 | 100 | 255 | 0.0391 | 0.5936 | 0.4219 | 0.5371 | 0.4688 | Ref. [34] | 0.125 | 110 | 255 | 0.0391 | 05625 | 0.4375 | 0.5547 | 0.4727 | | 0.1875 | 106 | 253 | 0.0391 | 0.6094 | 0.4063 | 0.5273 | 0.4648 | | 0.1484 | 106 | 255 | 0.0391 | 0.5625 | 0.4218 | 0.5195 | 0.4648 | | 0.1328 | 106 | 255 | 0.0391 | 0.5781 | 0.3906 | 0.5352 | 0.4648 | | 0.1328 | 106 | 255 | 0.0391 | 0.6406 | 0.4062 | 0.5213 | 0.4727 | | 0.1328 | 106 | 254 | 0.0391 | 0.5938 | 0.4375 | 0.5352 | 0.4766 | | 0.1328 | 106 | 254 | 0.0391 | 0.5938 | 0.4063 | 0.5352 | 0.4727 |
|
|