Research Article

An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization

Table 5

Comparison of the cryptographic properties of some of the newly generated S-boxes with some of the existing S-boxes.

S-boxesLinear Attacks DAP Analysis of Boolean Functions
LAPNLAC SAC(max)SAC(min)BIC(max)BIC(min)

Ref. [20]0.14061042550.03910.62500.39060.53130.4707
Ref. [21]0.1484106 2540.03910.57810.43750.53520.4648
Ref. [22] 0.1484 106255 0.0391 0.6406 0.40630.53710.4707
Ref. [26]0.13281032550.03910.57030.39840.53520.4727
Ref. [27]0.14841022540.03910.60940.37500.52150.4707
Ref. [28]0.14061062510.03910.59380.43750.53130.4648
Ref. [29]0.1091042550.04690.59300.39000.4990.454
Ref. [30]0.06211290.01560.56200.45300.5040.48
Ref. [31]0.2109742530.05470.68750.10940.55080.4023
Ref. [32]0.13281002550.05470.60940.42190.53130.4746
Ref. [33] 0.13281002550.03910.59360.42190.53710.4688
Ref. [34]0.1251102550.0391056250.43750.55470.4727
0.18751062530.03910.60940.40630.52730.4648
0.14841062550.03910.56250.42180.51950.4648
0.13281062550.03910.57810.39060.53520.4648
0.13281062550.03910.64060.40620.52130.4727
0.13281062540.03910.59380.43750.53520.4766
0.13281062540.03910.59380.40630.53520.4727