Open Access iconOpen Access

ARTICLE

crossmark

An Innovative Technique for Constructing Highly Non-Linear Components of Block Cipher for Data Security against Cyber Attacks

by Abid Mahboob1, Muhammad Asif2, Rana Muhammad Zulqarnain3,*, Imran Siddique4, Hijaz Ahmad5, Sameh Askar6, Giovanni Pau7

1 Department of Mathematics, Division of Science and Technology, University of Education, Lahore, Pakistan
2 Department of Mathematics, University of Management and Technology, Sialkot Campus, Sialkot, 51310, Pakistan
3 School of Mathematical Sciences, Zhejiang Normal University, Jinhua, 321004, China
4 Department of Mathematics, University of Management and Technology, Lahore, Pakistan
5 Section of Mathematics, International Telematic University Uninettuno, Corso Vittorio Emanuele II, 39, Roma, 00186, Italy
6 Department of Statistics and Operations Research, College of Science, King Saud University, P. O. Box 2455, Riyadh, 11451, Saudi Arabia
7 Faculty of Engineering and Architecturer-Kore University of Enna, Enna, 94100, Italy

* Corresponding Author: Rana Muhammad Zulqarnain. Email: email

Computer Systems Science and Engineering 2023, 47(2), 2547-2562. https://doi.org/10.32604/csse.2023.040855

Abstract

The rapid advancement of data in web-based communication has created one of the biggest issues concerning the security of data carried over the internet from unauthorized access. To improve data security, modern cryptosystems use substitution-boxes. Nowadays, data privacy has become a key concern for consumers who transfer sensitive data from one place to another. To address these problems, many companies rely on cryptographic techniques to secure data from illegal activities and assaults. Among these cryptographic approaches, AES is a well-known algorithm that transforms plain text into cipher text by employing substitution box (S-box). The S-box disguises the relationship between cipher text and the key to guard against cipher attacks. The security of a cipher using an S-box depends on the cryptographic strength of the respective S-box. Therefore, various researchers have employed different techniques to construct high order non-linear S-box. This paper provides a novel approach for evolving S-boxes using coset graphs for the action of the alternating group over the finite field and the symmetric group . The motivation for this work is to study the symmetric group and coset graphs. The authors have performed various analyses against conventional security criteria such as nonlinearity, differential uniformity, linear probability, the bit independence criterion, and the strict avalanche criterion to determine its high cryptographic strength. To evaluate its image application performance, the proposed S-box is also used to encrypt digital images. The performance and comparison analyses show that the suggested S-box can secure data against cyber-attacks.

Keywords


Cite This Article

APA Style
Mahboob, A., Asif, M., Zulqarnain, R.M., Siddique, I., Ahmad, H. et al. (2023). An innovative technique for constructing highly non-linear components of block cipher for data security against cyber attacks. Computer Systems Science and Engineering, 47(2), 2547-2562. https://doi.org/10.32604/csse.2023.040855
Vancouver Style
Mahboob A, Asif M, Zulqarnain RM, Siddique I, Ahmad H, Askar S, et al. An innovative technique for constructing highly non-linear components of block cipher for data security against cyber attacks. Comput Syst Sci Eng. 2023;47(2):2547-2562 https://doi.org/10.32604/csse.2023.040855
IEEE Style
A. Mahboob et al., “An Innovative Technique for Constructing Highly Non-Linear Components of Block Cipher for Data Security against Cyber Attacks,” Comput. Syst. Sci. Eng., vol. 47, no. 2, pp. 2547-2562, 2023. https://doi.org/10.32604/csse.2023.040855



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 758

    View

  • 382

    Download

  • 0

    Like

Share Link