Previous Article in Journal
Kantowski–Sachs Spherically Symmetric Solutions in Teleparallel F(T) Gravity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme

1
Information Technology Department, Faculty of Computing and IT, King Abdulaziz University, Jeddah 21589, Saudi Arabia
2
Department of Mathematics, Faculty of Science, University of Tabuk, Tabuk 71491, Saudi Arabia
3
Department of Mathematics, The Islamia University of Bahawalpur, Bahawalpur 63100, Pakistan
*
Authors to whom correspondence should be addressed.
Symmetry 2024, 16(8), 954; https://doi.org/10.3390/sym16080954 (registering DOI)
Submission received: 27 June 2024 / Revised: 13 July 2024 / Accepted: 17 July 2024 / Published: 25 July 2024

Abstract

Abstract: Data security is one of the biggest concerns in the modern world due to advancements in technology, and cryptography ensures that the privacy, integrity, and authenticity of such information are safeguarded in today’s digitally connected world. In this article, we introduce a new technique for the construction of non-linear components in block ciphers. The proposed S-box generation process is a transformational procedure through which the elements of a finite field are mapped onto highly nonlinear permutations. This transformation is achieved through a series of algebraic and combinatorial operations. It involves group actions on some pairs of two Galois fields to create an initial S-box , which induces a rich algebraic structure. The post S-box , which is derived from heuristic group-based optimization, leads to high nonlinearity and other important cryptographic parameters. The proposed S-box demonstrates resilience against various attacks, making the system resistant to statistical vulnerabilities. The investigation reveals remarkable attributes, including a nonlinearity score of 112, an average Strict Avalanche Criterion score of 0.504, and LAP (Linear Approximation Probability) score of 0.062, surpassing well-established S-boxes that exhibit desired cryptographic properties. This novel methodology suggests an encouraging approach for enhancing the security framework of block ciphers. In addition, we also proposed a three-step image encryption technique comprising of Row Permutation, Bitwise XOR, and block-wise substitution using . These operations contribute to adding more levels of randomness, which improves the dispersion across the cipher image and makes it equally intense. Therefore, we were able to establish that the approach works to mitigate against statistical and cryptanalytic attacks. The PSNR, UACI, MSE, NCC, AD, SC, MD, and NAE data comparisons with existing methods are also provided to prove the efficiency of the encryption algorithm.
Keywords: group structure; block ciphers; Galois fields; group action; S-box group structure; block ciphers; Galois fields; group action; S-box

Share and Cite

MDPI and ACS Style

Baowidan, S.A.; Alamer, A.; Hassan, M.; Yousaf, A. Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme. Symmetry 2024, 16, 954. https://doi.org/10.3390/sym16080954

AMA Style

Baowidan SA, Alamer A, Hassan M, Yousaf A. Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme. Symmetry. 2024; 16(8):954. https://doi.org/10.3390/sym16080954

Chicago/Turabian Style

Baowidan, Souad Ahmad, Ahmed Alamer, Mudassir Hassan, and Awais Yousaf. 2024. "Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme" Symmetry 16, no. 8: 954. https://doi.org/10.3390/sym16080954

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop