Substitution Box (S-Box): Current Design Techniques and Future Challen

Authors

  • Asim Ali Department of Computer Science, Comsats University Islamabad, Wah Campus, Islamabad, Pakistan
  • Muhammad Asif Khan Department of Computer Engineering, UET Taxila, Pakistan

Keywords:

Cryptography; cryptosystem; S-box; linear and differential attack; chaos; Boolean functions.

Abstract

S-box is considered a vital component of modern encryption algorithm. The secure substitutions in the form of S-box define the security of encryption algorithm. The substitutions are
defined on the basis of set of cryptographic properties. A good S-box requires having good
bounds of cryptographic properties. Herein, detail literature survey on S-box design techniques is presented. The various types of S-boxes in terms of their cryptographic properties
are carefully vetted. Moreover, in the light of current design techniques, future directions
and challenges are discussed in detail. Moreover, critical literature survey is carried out in
order to give directions to design S-box with good cryptographic properties while maintaining near optimal resistance to linear and differential cryptanalysis.

References

S. Langford and M. Hellman, "Differential-Linear Cryptanalysis," in Advances in Cryptology — CRYPTO ’94.

vol. 839, Y. Desmedt, Ed., ed: Springer Berlin Heidelberg, 1994, pp. 17-25. 10.1007/3-540-48658-5_3

M. Robshaw, "Block ciphers," RSA Lab. LOCATION, 1995. friedo.szm.com/krypto/rsa/tr-601.pdf

N. F. PUB, "46-3. Data Encryption Standard," Federal Information Processing Standards, National Bureau of

Standards, US Department of Commerce, 1977. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf

J. B. Kam and G. I. Davida, "Structured Design of Substitution-Permutation Encryption Networks," Computers,

IEEE Transactions on, vol. C-28, pp. 747-753, 1979. 10.1109/tc.1979.1675242

A. F. Webster and S. E. Tavares, "On the Design of S-Boxes," presented at the Advances in Cryptology, 1986.

1007/3-540-39799-x_41

C. E. Shannon, "Communication theory of secrecy systems," Bell system technical journal, vol. 28, pp. 656-

, 1949. http://dx.doi.org/10.1002/j.1538-7305.1949.tb00928.x

L. Corporation, "An Evalaution of DES," September 1976.

N. J. A. S. R. Morris, and A.D. Wyner,, "Assessment of the NBS Proposed Data Encryption Standard,,"

Cryptologia, vol. v. 1,, pp. 281-291., July 1977.

H. Feistel, "Cryptography and computer privacy," Scientific american, vol. 228, pp. 15-23, 1973.

DOI: 10.1038/scientificamerican0573-15

R. Forrié, "The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended

Definition," in Advances in Cryptology — CRYPTO’ 88. vol. 403, S. Goldwasser, Ed., ed: Springer New York,

, pp. 450-468. DOI:10.1007/0-387-34799-2_31

W. Meier and O. Staffelbach, "Nonlinearity Criteria for Cryptographic Functions," in Advances in Cryptology

— EUROCRYPT ’89. vol. 434, J.-J. Quisquater and J. Vandewalle, Eds., ed: Springer Berlin Heidelberg, 1990, pp.

-562. DOI: 10.1007/3-540-46885-4_53

J. Pieprzyk, "Error propagation property and application in cryptography," Computers and Digital Techniques,

IEE Proceedings E, vol. 136, pp. 262-270, 1989. DOI:10.1049/ip-e.1989.0036.

M. Sivabalan, et al., "On the design of SP networks from an information theoretic point of view," in Advances

in Cryptology—CRYPTO’92, 1993, pp. 260-279. DOI:10.1007/3-540-48071-4_18

J. M. Amigó, et al., "Theory and practice of chaotic cryptography," Physics Letters A, vol. 366, pp. 211-216,

DOI:10.1016/j.physleta.2007.02.021

N. Masuda and K. Aihara, "Cryptosystems with discretized chaotic maps," Circuits and Systems I:

Fundamental Theory and Applications, IEEE Transactions on, vol. 49, pp. 28-40, 2002. DOI:10.1109/81.974872

L. Kocarev, "Chaos-based cryptography: a brief overview," Circuits and Systems Magazine, IEEE, vol. 1, pp.

-21, 2001. DOI:10.1109/7384.963463

B. Schneier and P. Sutherland, Applied cryptography: protocols, algorithms, and source code in C: John

Wiley & Sons, Inc., 1995. ISBN 0-471-12845-7

L. Kocarev and G. Jakimoski, "Logistic map as a block encryption algorithm," Physics Letters A, vol. 289,

pp. 199-206, 2001. 10.1016/s0375-9601(01)00609-0

J. Szczepanski, et al., "Cryptographically secure substitutions based on the approximation of mixing maps,"

Circuits and Systems I: Regular Papers, IEEE Transactions on, vol. 52, pp. 443-453, 2005.

1109/tcsi.2004.841602

G. Tang, et al., "A novel method for designing S-boxes based on chaotic maps," Chaos, Solitons &

Fractals, vol. 23, pp. 413-419, 2005.

Y. Wang, et al., "A block cipher with dynamic S-boxes based on tent map," Communications in Nonlinear

Science and Numerical Simulation, vol. 14, pp. 3089-3099, 2009.

F. Özkaynak and A. B. Özer, "A method for designing strong S-Boxes based on chaotic Lorenz system,"

Physics Letters A, vol. 374, pp. 3733-3738, 2010.

J. A. Clark, et al., "The design of S-boxes by simulated annealing," New Gen. Comput., vol. 23, pp. 219-231,

J. Fuller, et al., "Multi-objective optimisation of bijective s-boxes," New Generation Computing, vol. 23, pp.

-218, 2005.

E. C. Laskari, et al., "Utilizing Evolutionary Computation Methods for the Design of S-Boxes," in

Computational Intelligence and Security, 2006 International Conference on, 2006, pp. 1299-1302.

W. Millan, "How to improve the nonlinearity of bijective S-boxes Information Security and Privacy." vol.

, C. Boyd and E. Dawson, Eds., ed: Springer Berlin / Heidelberg, 1998, pp. 181-192.

Y. Wang, et al., "A novel method to design S-box based on chaotic map and genetic algorithm," Physics

Letters A, vol. 376, pp. 827-833, 2012.

G. Chen, "A novel heuristic method for obtaining S-boxes," Chaos, Solitons & Fractals, vol. 36, pp.

-1036, 2008.

A. MAMADOLIMOV, et al., "BIJECTIVE SUBSTITUTION BOX," ed: WO Patent 2,010,151,103, 2010.

G. Chen, et al., "An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps,"

Chaos, Solitons & Fractals, vol. 31, pp. 571-579, 2007.

O. A. E.-M. Hanem M. El-Sheikh, Talaat Elgarf, and Abdelhalim Zekry, "A New Approach for Designing

Key-Dependent S-Box Defined over GF (2^4) in AES," International Journal of Computer Theory and

Engineering, vol. 4, p. 7, 2012.

R. Yin, et al., "Designing key-dependent chaotic S-box with larger key space," Chaos, Solitons &

Fractals, vol. 42, pp. 2582-2589, 2009.

S. Murphy and M. J. B. Robshaw, "Key-Dependent S-Boxes and Differential Cryptanalysis," Designs, Codes

and Cryptography, vol. 27, pp. 229-255, 2002.

Published

2018-10-01

How to Cite

Asim Ali, & Muhammad Asif Khan. (2018). Substitution Box (S-Box): Current Design Techniques and Future Challen. University of Wah Journal of Computer Science, 1(1). Retrieved from https://uwjcs.org.pk/index.php/ojs/article/view/10