An Innovative Design of Substitution-Boxes Using Cubic Polynomial Mapping
Abstract
:1. Introduction
2. Related Work
3. Proposed Substitution-Box Design
4. Performance Results
4.1. Bijectiveness
4.2. Strict Avalanche Criterion (SAC)
4.3. Nonlinearity
4.4. Bit Independence Criterion (BIC)
4.5. Linear Probability
4.6. Differential Probability
4.7. Performance Comparison
- Our S-box has average value of nonlinearity greater than the other S-boxes in Table 7. As a result, proposed S-box provides good resistance against linear cryptanalysis.
- Table 7 validates that SAC value (0.507) of proposed S-box is very near to ideal value of SAC (0.5). We can say that our S-box is gratifying SAC in a respectable manner.
- Differential probability value of proposed S-box is just 0.054. This small value of DP reveals the cryptographic strength of our S-box.
- Proposed S-Box has LP value equal to 0.140. This small value guarantees that our S-box has the potential to confront the linear cryptanalysis.
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Paar, C.; Pelzl, J.; Preneel, B. Understanding Cryptography, 1st ed.; Springer: Berlin, Germany, 2010. [Google Scholar]
- Shamir, A. Stream Ciphers: Dead or Alive? In Proceedings of the 10th International Conference on Theory and Application of Cryptology and Information Security, Jeju Island, Korea, 5–9 December 2004. [Google Scholar]
- Lambić, D.; Živković, M. Comparison of Random S-Box Generation Methods. De L’institut Mathématique 2013, 93, 109–115. [Google Scholar]
- Lauridsen, M.M.; Rechberger, C.; Knudsen, L.R. Design and Analysis of Symmetric Primitive; Kgs. Lyngby, Technical University of Denmark: Kongens Lyngby, Denmark, 2016. [Google Scholar]
- Mohamed, K.; Nazran, M.; Pauzi, M.; Hani, F.; Ali, H.M.; Ariffin, S.; Huda, N.; Zulkipli, N. Study of S-box Properties in Block Cipher. In Proceedings of the International Conference on Computer Communication and Control Technology, Langkawi Island, Kedah, Malaysia, 2–4 September 2014. [Google Scholar]
- Manjula, G.; Mohan, H.S. Constructing Key Dependent Dynamic S-Box for AES Block Cipher System. In Proceedings of the International Conference on Applied and Theoretical Computing and Communication Technology, Bengaluru, Karnataka, India, 21–23 July 2016. [Google Scholar]
- Radhakrishnan, S.V.; Subramanian, S. An Analytical Approach to S-box Generation. In Proceedings of the International Conference on Communication and Signal Processing, Chennai, India, 4–5 April 2012. [Google Scholar]
- Dragomir, I.R.; Lazăr, M. Generating and Testing the Components of a Block Cipher. In Proceedings of the 18th International Conference on Electronics, Computers and Artificial Intelligence, Ploiesti, Romania, 30 June–2 July 2016. [Google Scholar]
- Du, Z.; Xu, Q.; Zhang, J.; Li, M. Design and Analysis of Dynamic S-Box based on Feistel. In Proceedings of the International Conference on Advanced Information Technology, Electronic and Automation Control, Chongqing, China, 19–20 December 2015. [Google Scholar]
- Juremi, J.; Mahmod, R.; Sulaiman, S. A Proposal for Improving AES S-box with Rotation and Key-Dependent. In Proceedings of the International Conference on Digital Cyber Security, Cyber Warfare and Digital Forensic, Kuala Lumpur, Malaysia, 26–28 June 2012. [Google Scholar]
- Sahoo, O.B.; Kole, D.K.; Rahaman, H. An optimized S-box for Advanced Encryption Standard (AES) design. In Proceedings of the International Conference on Advanced Computer Communication, Chennai, India, 3–5 August 2012. [Google Scholar]
- Wang, H.; Zheng, H.; Hu, B.; Tang, H. Improved lightweight encryption algorithm based on optimized S-box. In Proceedings of the International Conference on Computational and Information Sciences, Hubei, China, 21–23 June 2013. [Google Scholar]
- Cui, J.; Huang, L.; Zhong, H.; Chang, C.; Yang, W. An Improved AES S-Box and its Performance Analysis. Int. J. Innov. Comput. Inf. Control 2011, 7, 2291–2302. [Google Scholar]
- Katiyar, S.; Jeyanthi, N. Pure Dynamic S-box Construction. Int. J. Comput. 2016, 1, 42–46. [Google Scholar]
- Alabaichi, A.; Salih, A.I. Enhance Security of Advance Encryption Standard Algorithm Based on Key-dependent S-Box. In Proceedings of the International Conference on Digital Information Processing and Communications, Sierre, Switzerland, 7–9 October 2015. [Google Scholar]
- Niemiec, M.; Machowski, Ł. A new symmetric block cipher based on key-dependent S-boxes. In Proceedings of the International Conference on ultra-Modern Telecommunications and Control Systems, St. Petersburg, Russia, 3–5 October 2012. [Google Scholar]
- Kazlauskas, K.; Smaliukas, R.; Vaicekauskas, G. A Novel Method to Design S-Boxes Based on Key- Dependent Permutation Schemes and its Quality Analysis. Int. J. Adv. Comput. Sci. Appl. 2016, 7, 93–99. [Google Scholar] [CrossRef]
- Kazlauskas, K.; Vaicekauskas, G.; Smaliukas, R. An Algorithm for Key-Dependent S-Box Generation in Block Cipher System. Informatica 2015, 26, 51–65. [Google Scholar] [CrossRef]
- Mathura, N.; Bansodeb, R. AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection. Procedia Comput. Sci. 2016, 79, 1036–1043. [Google Scholar] [CrossRef] [Green Version]
- Zobeiri, M.; Maybodi, B.M. Introducing a New Method in Cryptography by using Dynamic P-Box and S-Box based on Modular Calculation and Key Encryption. Arpn J. Eng. Appl. Sci. 2017, 12, 2946–2953. [Google Scholar]
- Rahaman, Z.; Corraya, A.D.; Sumi, M.A.; Bahar, A.N. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 314–320. [Google Scholar] [CrossRef]
- Easttom, C. An Examination of Inefficiencies in Key Dependent Variations of the Rijndael S-Box. In Proceedings of the Iranian Conference on Electrical Engineering, Mashhad, Iran, 8–10 May 2018. [Google Scholar]
- Shekhar, S.; Singh, P.; Jaiswal, M. An Enhanced AES Algorithm Based on Variable S-box and 200 Bit Data Block. Int. J. Innov. Res. Comput. Commun. Eng. 2016, 4, 6470–6477. [Google Scholar]
- Agrawal, H.; Sharma, M. Implementation and analysis of various symmetric cryptosystems. Indian J. Sci. Technol. 2010, 3, 1173–1176. [Google Scholar]
- Mar, P.P.; Latt, K.M. New Analysis Methods on Strict Avalanche Criterion of S-Boxes. Int. J. Math. Comput. Sci. 2008, 2, 899–903. [Google Scholar]
- Shi, H.; Deng, Y.; Guan, Y. Analysis of the Avalanche Effect of the AES S Box. In Proceedings of the International Conference on Artificial Intelligence, Management Science and Electronic Commerce, Deng Feng, China, 8–10 August 2011. [Google Scholar]
- Nejad, F.H.; Sabah, S.; Jam, A.J. Analysis of Avalanche Effect on Advance Encryption Standard by using Dynamic S-Box Depends on Rounds Keys. In Proceedings of the International Conference on Computational Science and Technology, Sabah, Malaysia, 27–28 August 2014. [Google Scholar]
- Mahmoud, E.M.; Hafez, A.A.; Elgarf, T.A.; Zekry, A.H. Dynamic AES-128 with Key-Dependent S-box. Int. J. Eng. Res. Appl. 2013, 3, 1662–1670. [Google Scholar]
- Ahmad, M.; Mittal, N.; Garg, P.; Khan, M.M. Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos. Perspect. Sci. 2016, 8, 465–468. [Google Scholar] [CrossRef]
- Ahmad, M.; Haleem, H.; Khan, P.M. A New Chaotic Substitution Box Design for Block Ciphers. In Proceedings of the International Conference on Signal Processing and Integrated Networks, Delhi, India, 20–21 February 2014. [Google Scholar]
- Ahmed, H.A.; Zolkipli, M.F.; Ahmad, M. A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput. Appl. 2018. [Google Scholar] [CrossRef]
- Ahmad, M.; Doja, M.N.; Beg, M.M.S. ABC Optimization Based Construction of Strong Substitution-Boxes. Wirel. Pers. Commun. 2018, 101, 1715–1729. [Google Scholar] [CrossRef]
- Alzaidi, A.A.; Ahmad, M.; Doja, M.N.; Solami, E.A.; Beg, M.M.S. A New 1D Chaotic Map and beta-Hill Climbing for Generating Substitution-Boxes. IEEE Access 2018, 6, 55405–55418. [Google Scholar] [CrossRef]
- Alzaidi, A.A.; Ahmad, M.; Ahmed, H.S.; Solami, E.A. Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map. Complexity 2018, 2018, 9389065. [Google Scholar] [CrossRef]
- Lai, Q.; Akgul, A.; Li, C.; Xu, G.; Çavusoglu, U. A New Chaotic System with Multiple Attractors: Dynamic Analysis, Circuit Realization and S-Box Design. Entropy 2018, 20, 12. [Google Scholar] [CrossRef]
- Ahmad, M.; Ahmad, F.; Nasim, Z.; Bano, Z.; Zafar, S. Designing Chaos Based Strong Substitution Box. In Proceedings of the International Conference on Contemporary Computing, Noida, India, 20–22 August 2015. [Google Scholar]
- Zahid, A.; Arshad, M.; Ahmad, M. A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation. Entropy 2019, 21, 245. [Google Scholar] [CrossRef]
- Belazi, A.; Khan, M.; Latif, A.A.A.; Belghith, S. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn. 2017, 87, 337–361. [Google Scholar] [CrossRef]
- Lambić, D. S-box design method based on improved one dimensional discrete chaotic map. J. Inf. Telecommun. 2018, 2, 181–191. [Google Scholar] [CrossRef]
- Peng, J.; Jin, S.; Lei, L.; Jia, R. A Novel Method for Designing Dynamical Key-Dependent S-Boxes based on Hyperchaotic System. Int. J. Adv. Comput. Technol. 2016, 4, 282–289. [Google Scholar]
- Solami, E.A.; Ahmad, M.; Volos, C.; Doja, M.; Beg, M. A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes. Entropy 2018, 20, 525. [Google Scholar] [CrossRef]
- Ababneh, M. A new four-dimensional chaotic attractor. Ain Shams Eng. J. 2018, 9, 1849–1854. [Google Scholar] [CrossRef]
- Liu, L.; Zhang, Y.; Wang, X. A Novel Method for Constructing the S-Box Based on Spatiotemporal Chaotic Dynamics. Appl. Sci. 2018, 8, 2650. [Google Scholar] [CrossRef]
- Wang, X.; Akgul, A.; Cavusoglu, U.; Pham, V.; Hoang, D.V.; Nguyen, X.Q. A Chaotic System with Infinite Equilibria and Its S-Box Constructing Application. Appl. Sci. 2018, 8, 2132. [Google Scholar] [CrossRef]
- Tran, B.N.; Nguyen, T.D.; Tran, T.D. A New S-Box Structure Based on Graph Isomorphism. In Proceedings of the International Conference on Computational Intelligence and Security, Beijing, China, 11–14 December 2009. [Google Scholar]
- Razaq, A.; Yousaf, A.; Shuaib, U.; Siddiqui, N.; Ullah, A.; Waheed, A. A Novel Construction of Substitution Box involving Coset Diagram and a Bijective Map. Secur. Comm. Netw. 2017, 2017, 5101934. [Google Scholar] [CrossRef]
- Farwa, S.; Shah, T.; Idrees, L. A Highly Nonlinear S-Box based on a Fractional Linear Transformation. SpringerPlus 2016, 5, 1–12. [Google Scholar] [CrossRef]
- Hussain, I.; Shah, T.; Gondal, M.A.; Khan, M.; Khan, W.A. Construction of New S-box using a Linear Fractional Transformation. World Appl. Sci. J. 2011, 14, 1779–1785. [Google Scholar]
- Altaleb, A.; Saeed, M.S.; Hussain, I.; Aslam, M. An Algorithm for the Construction of Substitution Box for Block Ciphers based on Projective General Linear Group. AIP Adv. 2017, 7, 035116. [Google Scholar] [CrossRef]
- Sarfraz, M.; Hussain, I.; Ali, F. Construction of S-Box Based on Mobius Transformation and Increasing its Confusion Creating Ability through Invertible Function. Int. J. Comput. Sci. Inf. Secur. 2016, 14, 187–199. [Google Scholar]
- Wang, Y.; Xie, Q.; Wu, Y.; Du, B. A Software for S-box Performance Analysis and Test. In Proceedings of the International Conference on Electronic Commerce and Business Intelligence, Beijing, China, 6–7 June 2009. [Google Scholar]
- Webster, A.F.; Tavares, S.E. On the Design of S-Boxes. In Proceedings of the Conference on Theory and Application of Cryptographic Techniques, Santa Barbara, CA, USA, 18–22 August 1986. [Google Scholar]
- Adams, C.; Tavares, S. The Structured Design of Cryptographically Good S-Boxes. J. Cryptol. 1990, 3, 27–31. [Google Scholar] [CrossRef]
- Alkhaldi, A.H.; Hussain, I.; Gondal, M.A. A novel design for the construction of safe S-boxes based on TDERC sequence. Alex. Eng. J. 2015, 54, 65–69. [Google Scholar] [CrossRef] [Green Version]
- Chen, G. A novel heuristic method for obtaining S-boxes. Chaos Solitons Fractals 2008, 36, 1028–1036. [Google Scholar] [CrossRef]
- Belazi, A.; Rhouma, R.; Belghith, S. A novel approach to construct S-box based on Rossler system. In Proceedings of the International Wireless Communications and Mobile Computing Conference, Dubrovnik, Croatia, 24–28 August 2015. [Google Scholar]
- Mahmood, S.; Farwa, S.; Rafiq, M.; Riaz, S.M.J.; Shah, T.; Jamal, S.S. To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers. Secur. Commun. Netw. 2018, 2018, 582323. [Google Scholar] [CrossRef]
- Siddiqui, N.; Afsar, U.; Shah, T.; Qureshi, A. A Novel Construction of S16 AES S-boxes. Int. J. Comput. Sci. Inf. Secur. 2016, 14, 811–818. [Google Scholar]
- Hussain, I.; Shah, T.; Gondal, M.A.; Wang, Y. Analyses of SKIPJACK S-Box. World Appl. Sci. J. 2011, 13, 2385–2388. [Google Scholar]
- Hussain, I.; Shah, T.; Gondal, M.A.; Khan, W.A.; Mahmood, H. A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 2013, 23, 97–104. [Google Scholar] [CrossRef]
- Hussain, I.; Shah, T.; Gondal, M.A.; Mahmood, H. Some analysis of S-box based on residue of prime number. Proc. Pak. Acad. Sci. 2011, 48, 111–115. [Google Scholar]
- Asim, M.; Jeoti, V. Efficient and Simple Method for Designing Chaotic S-Boxes. ETRI J. 2008, 30, 170–172. [Google Scholar] [CrossRef]
- Özkaynak, F.; Özer, A.B. A method for designing strong S-boxes based on chaotic Lorenz system. Phys. Lett. A 2102, 374, 3733–3738. [Google Scholar] [CrossRef]
- Khan, M.; Shah, T.; Batool, S.I. Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput. Appl. 2016, 27, 677–685. [Google Scholar] [CrossRef]
- Khan, M.; Shah, T. An efficient construction of substitution box with fractional chaotic system. SIViP 2015, 9, 1335–1338. [Google Scholar] [CrossRef]
100 | 169 | 138 | 164 | 147 | 244 | 98 | 123 | 219 | 29 | 224 | 190 | 84 | 63 | 27 | 133 |
24 | 114 | 46 | 234 | 64 | 207 | 49 | 4 | 229 | 110 | 61 | 239 | 30 | 105 | 107 | 193 |
6 | 217 | 212 | 148 | 182 | 214 | 144 | 129 | 69 | 121 | 185 | 161 | 206 | 220 | 103 | 12 |
104 | 22 | 180 | 221 | 45 | 66 | 184 | 42 | 54 | 120 | 140 | 14 | 156 | 209 | 73 | 162 |
119 | 101 | 8 | 254 | 225 | 78 | 227 | 58 | 242 | 165 | 241 | 113 | 195 | 130 | 75 | 187 |
109 | 255 | 11 | 48 | 9 | 51 | 74 | 235 | 177 | 57 | 32 | 2 | 124 | 41 | 167 | 145 |
132 | 28 | 247 | 175 | 226 | 43 | 40 | 117 | 174 | 111 | 85 | 253 | 1 | 0 | 150 | 94 |
246 | 249 | 3 | 179 | 163 | 112 | 183 | 19 | 34 | 128 | 201 | 153 | 141 | 65 | 82 | 92 |
252 | 205 | 108 | 118 | 135 | 59 | 47 | 31 | 72 | 166 | 181 | 17 | 88 | 37 | 21 | 197 |
208 | 211 | 106 | 50 | 200 | 199 | 204 | 115 | 89 | 26 | 83 | 160 | 157 | 231 | 25 | 210 |
172 | 68 | 55 | 33 | 159 | 76 | 198 | 168 | 143 | 23 | 222 | 126 | 149 | 191 | 152 | 189 |
202 | 91 | 13 | 125 | 70 | 5 | 87 | 216 | 35 | 215 | 142 | 230 | 122 | 232 | 203 | 192 |
99 | 81 | 38 | 127 | 248 | 44 | 186 | 60 | 80 | 146 | 158 | 16 | 134 | 155 | 236 | 20 |
178 | 96 | 188 | 97 | 237 | 251 | 39 | 15 | 79 | 131 | 71 | 56 | 243 | 18 | 52 | 245 |
240 | 194 | 7 | 93 | 95 | 170 | 218 | 139 | 90 | 228 | 196 | 151 | 250 | 136 | 223 | 154 |
86 | 176 | 67 | 173 | 137 | 116 | 10 | 233 | 171 | 238 | 77 | 102 | 213 | 53 | 36 | 62 |
0.500 | 0.469 | 0.500 | 0.516 | 0.547 | 0.453 | 0.563 | 0.469 |
0.531 | 0.578 | 0.453 | 0.500 | 0.453 | 0.484 | 0.531 | 0.531 |
0.531 | 0.484 | 0.547 | 0.531 | 0.594 | 0.469 | 0.516 | 0.484 |
0.469 | 0.531 | 0.500 | 0.516 | 0.453 | 0.547 | 0.531 | 0.516 |
0.438 | 0.531 | 0.406 | 0.500 | 0.500 | 0.453 | 0.547 | 0.484 |
0.563 | 0.500 | 0.453 | 0.500 | 0.531 | 0.453 | 0.468 | 0.547 |
0.563 | 0.516 | 0.531 | 0.547 | 0.469 | 0.422 | 0.531 | 0.531 |
0.547 | 0.563 | 0.438 | 0.578 | 0.516 | 0.516 | 0.516 | 0.500 |
Boolean Function | b1 | b2 | b3 | b4 | b5 | b6 | b7 | b8 |
---|---|---|---|---|---|---|---|---|
Nonlinearity | 106 | 104 | 106 | 108 | 108 | 106 | 108 | 108 |
S-box Method | Minimum | Maximum | Average |
---|---|---|---|
[17] | 98 | 108 | 102.5 |
[28] | 96 | 110 | 104.3 |
[30] | 102 | 108 | 105.3 |
[38] | 102 | 108 | 105.3 |
[43] | 102 | 108 | 104.5 |
[44] | 104 | 110 | 106 |
[48] | 98 | 108 | 104 |
[54] | 98 | 108 | 104 |
[55] | 102 | 106 | 104 |
[56] | 102 | 108 | 105.3 |
[57] | 100 | 110 | 105.5 |
[58] | 104 | 106 | 105.3 |
[59] | 100 | 108 | 105.7 |
[60] | 100 | 108 | 104.8 |
[61] | 94 | 104 | 99.5 |
[62] | 96 | 108 | 103.5 |
[63] | 100 | 106 | 103.3 |
[64] | 84 | 106 | 100 |
[65] | 100 | 108 | 104.5 |
Proposed | 104 | 108 | 106.8 |
Boolean Function | b1 | b2 | b3 | b4 | b5 | b6 | b7 | b8 |
---|---|---|---|---|---|---|---|---|
b1 | - | 104 | 106 | 106 | 104 | 104 | 102 | 102 |
b2 | 104 | - | 104 | 102 | 108 | 104 | 104 | 100 |
b3 | 106 | 104 | - | 104 | 102 | 104 | 108 | 106 |
b4 | 106 | 102 | 104 | - | 106 | 106 | 100 | 102 |
b5 | 104 | 108 | 102 | 106 | - | 108 | 106 | 100 |
b6 | 104 | 104 | 104 | 106 | 108 | - | 98 | 106 |
b7 | 102 | 104 | 108 | 100 | 106 | 98 | - | 104 |
b8 | 102 | 100 | 106 | 102 | 100 | 106 | 104 | - |
Boolean Function | b1 | b2 | b3 | b4 | b5 | b6 | b7 | b8 |
---|---|---|---|---|---|---|---|---|
b1 | - | 0.502 | 0.510 | 0.506 | 0.500 | 0.504 | 0.484 | 0.477 |
b2 | 0.502 | - | 0.512 | 0.479 | 0.510 | 0.488 | 0.512 | 0.518 |
b3 | 0.510 | 0.512 | - | 0.479 | 0.520 | 0.492 | 0.461 | 0.500 |
b4 | 0.506 | 0.479 | 0.479 | - | 0.504 | 0.518 | 0.520 | 0.467 |
b5 | 0.500 | 0.510 | 0.520 | 0.504 | - | 0.521 | 0.498 | 0.510 |
b6 | 0.504 | 0.488 | 0.492 | 0.518 | 0.521 | - | 0.488 | 0.512 |
b7 | 0.484 | 0.512 | 0.461 | 0.520 | 0.498 | 0.488 | - | 0.504 |
b8 | 0.477 | 0.518 | 0.500 | 0.467 | 0.510 | 0.512 | 0.504 | - |
S-box Method | Nonlinearity Min. Max. Average | SAC | BIC-NL | LP | DP | ||
---|---|---|---|---|---|---|---|
[17] | 98 | 108 | 102.5 | 0.492 | 103.3 | 0.141 | 0.062 |
[28] | 96 | 110 | 104.3 | 0.497 | 103.4 | 0.133 | 0.047 |
[30] | 102 | 108 | 105.3 | 0.491 | 103.6 | 0.133 | 0.039 |
[38] | 102 | 108 | 105.3 | 0.496 | 103.8 | 0.156 | 0.039 |
[43] | 102 | 108 | 104.5 | 0.498 | 104.6 | 0.125 | 0.047 |
[44] | 104 | 110 | 106 | 0.520 | 104.2 | 0.132 | 0.039 |
[48] | 98 | 108 | 104 | 0.505 | 103.4 | 0.133 | 0.250 |
[54] | 98 | 108 | 104 | 0.507 | 102.9 | 0.086 | 0.047 |
[55] | 102 | 106 | 104 | 0.498 | 102.9 | 0.148 | 0.039 |
[56] | 102 | 108 | 105.3 | 0.502 | 103.7 | 0.125 | 0.047 |
[57] | 100 | 110 | 105.5 | 0.499 | 106 | 0.133 | 0.125 |
[58] | 104 | 106 | 105.3 | 0.504 | 104.6 | 0.133 | 0.039 |
[59] | 100 | 108 | 105.7 | 0.498 | 104.3 | 0.109 | 0.047 |
[60] | 100 | 108 | 104.8 | 0.501 | 105.1 | 0.125 | 0.125 |
[61] | 94 | 104 | 99.5 | 0.516 | 101.7 | 0.132 | 0.281 |
[62] | 96 | 108 | 103.5 | 0.494 | 103.6 | 0.152 | 0.039 |
[63] | 100 | 106 | 103.3 | 0.505 | 103.7 | 0.133 | 0.039 |
[64] | 84 | 106 | 100 | 0.481 | 101.9 | 0.180 | 0.063 |
[65] | 100 | 108 | 104.5 | 0.498 | 103.6 | 0.141 | 0.047 |
Proposed | 104 | 108 | 106.8 | 0.507 | 103.9 | 0.140 | 0.054 |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zahid, A.H.; Arshad, M.J. An Innovative Design of Substitution-Boxes Using Cubic Polynomial Mapping. Symmetry 2019, 11, 437. https://doi.org/10.3390/sym11030437
Zahid AH, Arshad MJ. An Innovative Design of Substitution-Boxes Using Cubic Polynomial Mapping. Symmetry. 2019; 11(3):437. https://doi.org/10.3390/sym11030437
Chicago/Turabian StyleZahid, Amjad Hussain, and Muhammad Junaid Arshad. 2019. "An Innovative Design of Substitution-Boxes Using Cubic Polynomial Mapping" Symmetry 11, no. 3: 437. https://doi.org/10.3390/sym11030437
APA StyleZahid, A. H., & Arshad, M. J. (2019). An Innovative Design of Substitution-Boxes Using Cubic Polynomial Mapping. Symmetry, 11(3), 437. https://doi.org/10.3390/sym11030437