Abstract
In this article, we have designed a new scheme for the construction of the nonlinear confusion component. Our mechanism uses the notion of a semigroup, Inverse LA-semigroup, and various other loops. With the help of these mathematical structures, we can easily build our confusion component namely substitution boxes (S-boxes) without having specialized structures. We authenticate our proposed methodology by incorporating the available cryptographic benchmarks. Moreover, we have utilized the technique for order of preference by similarity to ideal solution (TOPSIS) to select the best nonlinear confusion component. With the aid of this multi-criteria decision-making (MCDM), one can easily select the best possible confusion component while selecting among various available nonlinear confusion components.
Introduction
In the current world, everything has become so fast forward and technology-dependent. If anything has pros it also has its cons as well. Therefore, with all the technology now we have the main goal to achieve is to secure our communication. For this purpose, many cryptographic techniques have been used so far to secure our communication. Security and confidentiality are the new challenges of this world. To ensure privacy algebraic-based cryptosystems are constructed which are resilient to differential and linear cryptanalysis. Substitution-boxes (S-boxes) play a vital role in secure data encryption. Many techniques have been proposed in literature for secure S-box construction [1–3]. In this era, constructing the S-box with new mathematical structures to create confusion has become the target for every oncoming researcher in the field of information technology [4, 5].
Different types of mathematical structures are utilized for the construction of nonlinear confusion component. In addition to that, we have introduced another technique which is known as TOPSIS, to choose the best among all. Left almost semigroups are the algebraic structures that hold closure law and left inverted binary operation, abbreviated as LA-semigroup. After the 1970 s, the evolution of LA semigroup occurred after the generalization of groups and semigroups. After the significant number of research results, it has become a distinct branch within itself. Kazim and Naseeruddin familiarized the (LA semigroup) Left almost semigroup [6]. Further, the exploration of fuzzy semigroup was done by Kuroki and Modern [7, 8]. The applications of fuzzy algebra are so vast, that is why they are being applied in different fields. Some significant properties of inverse LA semigroup were deliberated by Younas et al. [9]. The generalization of quasi-prime ideals of the LA semigroup was introduced by Yiarayong [10]. The perception of ordered (LA-semigroups, LA*-semigroups, LA groups) and left (resp. right) simple ordered LA-semigroups are introduced. The relationship between ordered (LA-semigroups, LA*-semigroup) ideals and ordered (LA-semigroup) ideals (ordered LA-groups, left simple, right simple) are proved, in particular, that: 1. If an ordered LA*-semigroup (S, . , ⩽) has the left identity e, then Sa = aS = S ∀ aɛS. 2. If and only if it contains no proper quasi-ideal, an ordered LA* -semigroup (S, . , ⩽) with left identity e is a left simple and a right simple [11]. In a non-associative algebraic structure named as an ordered LA-Γ-semigroup, the concept of (m, n)-ideals is investigated by Basar [12]. Younas et al endeavor to establish a framework for defining an inverse LA- semigroup using generators and relations [13].
In this work, we have utilized inverse LA- semigroup, Moufang loops, and C-loops for the construction of the nonlinear confusion component. This article presents the structure of ten different substitution boxes with strong cryptographic properties due to their design dependence on loops. Moreover, we have applied a method for the selection of the best S-box among all the proposed ones known as the technique for order of preference by similarity to ideal solution (TOPSIS).
The problems of TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) occur and are extensively employed in numerous fields, such as medical sciences, social sciences, management sciences, and economics. TOPSIS problems are also known as mentioned as multi-criteria decision analysis (MCDA), multi-criteria decision making (MCDM), or multi-attribute decision-making (MADM) [14–16]. In the previous eras, the MCDM methods have become an influential part of operations research [17]. Mingwei et al. used this technique to take care of the site determination issue for vehicle sharing stations as selection of a suitable site for building a vehicle sharing station is a major test [18].
In various real-world circumstances, the problems of decision-making are exposed to certain restraints, purposes, and effects that are not precisely identified. Fuzzy set within MCDM was firstly introduced by Bellman and Zadeh [24] and afterward many researchers have been fixated by decision making in fuzzy environments. The combination of fuzzy set and multi-criteria decision making (MCDM) has headed to a different decision theory identified as fuzzy multi-criteria decision making (FMCDM). In FMCDM we can decide by uncertainty in incomplete information and knowledge. The decision-makers must rank or select all possible alternatives corresponding to the weights of the criteria.
In this study, we have applied TOPSIS for the selection of substitution boxes proposed by using loops. Also, we have presented a brief comparison of proposed substitution-boxes properties with already existing techniques [19–30]. These criteria rank substitution boxes according to the weight assigned to each characteristic of substitution-box and ideal best and worst values from all possible events.
The remaining manuscript is arranged as follows: Section 2 presents some basic concepts and proposed technique for construction of nonlinear confusion component; some standard cryptographic benchmarks are applied to proposed s-boxes are performed in section 3; In section 4 we have presented comparative analysis; TOPSIS technique is applied for best s-box selection in section 5, finally, work is concluded in the last section.
Basic concepts and proposed methodology for confusion component
In this section, we discussed some basic definitions and our proposed methodology for the construction of the nonlinear confusion component of the block cipher.
We write (a . b) as(ab).
Construction Based on Inverse LA-semigroup
Let S = (Z16, +), which is an inverse LA-semigroup, defined by the following multiplication table:
Confusion component over LA-semigroup
With the help of Table 1 (which is generated by inverse LA-semigroup)o S-boxes are formed in which values of λ = 8, 5, and β = 12, 15 have been used, respectively. Similarly, in Table 3, the values of λ = 7, 2 and β = 13, 3 are used for S3-box and S4-box. We can visually observe that the substitution boxes constructed in Tables 2 and 3 are highly random and distinct from each other which depicts that the suggested structure produces a unique value after changing the values of λ and β over the same loop.
Inverse LA-semigroup of order 16
Inverse LA-semigroup of order 16
S-boxes over inverse LA-semigroup
S-boxes over inverse LA-semigroup
This section of the manuscript presents a construction of substitution box overC-loop.
Confusion component over C-Loops
We have constructed three substitution boxes by using C-loop defined in Table 4 by using the following expression:
C-Loop of order 16
Three nonlinear components are constructed by considering λ = 8, β = 12, λ = 5, β = 15 and λ = 2, β = 3 respectively. Constructed substitution boxes are presented in Table 5. From the listed results in Table 5, we can examine that all S-boxes are unique and different from each other.
Proposed S-boxes over C-loop
x (z (yz)) = ((xz) y) z ; (zx) (yz) = (z (xy)) z ; (zx) (yz) = z ((xy) z) .
Confusion component over moufang loop
In Table 7, for the generation of S8-box the values of λ and β are 8 and 12 respectively. To initiate the formation of S9-box and S10-box, we have taken λ = 5, β = 15 and λ = 2, β = 3 correspondingly.
Moufang loop of order 16
Moufang loop of order 16
S-boxes construction over Moufang loop
To authenticate the cryptographic strength of the S-boxes we have generated (shown in Tables 1–7) different analysis techniques are used, and their results are discussed in this section.
Nonlinearity (NL)
Hamming distance is described as the complete tally of positions at which the relating output is dissimilar. In the n variable, the nonlinearity of function is defined as the minimum hamming distance of reference function with all affine functions. Mathematically nonlinearity is expressed below [6]:
BIC-nonlinearity is known as bit independent and nonlinearity. This measure displays the relationship between the bit independent and nonlinearity. The outcomes of the BIC-nonlinearity criterion of recommended S-boxes are displayed in Tables 1–7. Table 8 shows the consequences of BIC as per the non-linearity. This shows that the mean estimation of this aftereffect of proposed S-box 1 is 3 which is very analogous. The mean estimation of the recommended S-box 2 is 2.5 which is high. The mean estimation of the proposed S-box 3 is 2.75 which is worthy. Similarly, the mean estimation of BIC non-linear for other S-boxes is displayed in Table 8. This implies that the recommended S-boxes fulfills all the bit independent criteria well overall.
Nonlinearity, BIC-nonlinearity, and SAC of proposed S-boxes
Nonlinearity, BIC-nonlinearity, and SAC of proposed S-boxes
Webster presented SAC as the significant property for robust S-boxes. This property expresses that a single bit change in the input should change half of the output bits. A SAC value closer to 0.5 is viewed as sufficient. An S-box should show a SAC impact to have great haphazardness. Table 8 gives the SAC estimations of our S-boxes and clearly, the normal SAC estimation of the proposed S-boxes is equivalent to 0.5. This outcome demonstrates that our S-boxes fulfill the SAC. Table 8 depicts the values of non-linearity, BIC nonlinearity, and strict avalanche criteria for the generated S-boxes which are displayed in Tables 1–7.
BIC-SAC
BIC-SAC is known as bit independent and strict avalanche criteria. This measure displays the relationship among the bit independent and strict avalanche criteria. Table 9 shows the aftereffects of BIC as per the SAC. This shows that the mean estimation of this consequence of recommended S-box 1 is 0.46875 which is exceptionally near the ideal worth. The mean estimation of the proposed S-box 2 is 0.5 which is roughly equivalents to the ideal estimation of this test. The mean estimation of the recommended S-box 3 is 0.489583 which is near the ideal worth. Similarly, for the remaining S-boxes, the values are shown in Table 9.
BIC-SAC, LP, and DP of proposed S-boxes
BIC-SAC, LP, and DP of proposed S-boxes
Let X be the all-possible input values and 2
n
be the number of its elements, then linear approximation probability of S-box can be defined as [26]:
An S-box ought to be differentially uniform. The differential approximation probability of S-box can be demarcated as mentioned below [26]:
The algebraic degree is defined as the largest possible number of confusion components in the truth table. The mathematical expression for the algebraic degree is defined by [6]:
Correlation immunity is used to measure the amount of correlation between the linear combinations of the input and output bits of the nonlinear confusion component. Correlation immunity should be less.
Fixed point (FP)
The fixed point of confusion component is defined as if the input and output entries are equal. The mathematically fixed point is expressed as [6]:
In Table 9, the results of algebraic degree, correlation immunity, and fixed points of the proposed S-boxes are listed. From depicted results in Table 10, we can see that most of the proposed substitution boxes have no fixed points which means that the proposed construction technique is ideal.
Algebraic degree, correlation immunity, and fixed points of proposed S-boxes
In this section, we have presented a brief comparison of our proposed substitution box with already existing schemes. Table 11 presents the comparative analysis of nonlinearity, SAC, and BIC nonlinearity, and contrast of BIC-SAC, LP, and DP is listed in Table 12. From the presented contrast we can observe that our proposed scheme produces substitution-boxes that exhibit cryptographic properties that are much better than the already existing schemes.
Comparison of nonlinearity, BIC-nonlinearity, and SAC of proposed s-boxes with already existing schemes
Comparison of nonlinearity, BIC-nonlinearity, and SAC of proposed s-boxes with already existing schemes
Comparative analysis of BIC-SAC, LP, and DP of proposed S-boxes with existing schemes
Multi-criteria for decision-making (MCDM) are criteria for the selection of best evaluation from a given set. This criterion defines how the decision-maker’s evaluations of the considered alternatives hinge on the fact of the best selection. The probabilities of the considered alternatives are assumed to be known. The choices are typically associated based on the probable values and the inconsistencies of their assessments. Therefore, we consider the problem of selection of the best substitution box which is demonstrated by fuzzy sets defined on the universal set on which the probability distribution is specified, and the assessments of the choices are uttered by fuzzy numbers. Here in this section, we are using MCDM by using fuzzy sets for the best S-box selection from the ten S-boxes constructed by loops defined in the previous segment.
Now consider the probability space be (S, μ, P) where S denotes a non-empty universal set of all possible elementary events, μ denotes the set of considered random events, and P : μ→ { 0, 1 } represents the probability measures. Table 13 shows the decision matrix with {S1, S2, S3, … , S10 } as all possible alternatives of the decision-maker. X1, X2, X3, X4, X5, and X6 are the states of the problem which represents nonlinearity, SAC, BIC-SAC, BIC nonlinearity, DP, and LP ( See Fig. 1). Therefore, the sets S and μ can be written as:
Average cryptographic properties of proposed S-boxes
Average cryptographic properties of proposed S-boxes
Table 13 defines the average cryptographic properties of constructed substitution boxes.
Now, let us determine the normalized vector of each state in the probability space (S, μ, P) by using:
Therefore, after finding the normalized vector of each state of all possible alternatives, the results are listed in Table 14.
Normalized decision matrix of all cryptographic properties
In solving decision-making problems, the considered parameters may have different importance due to diverse human perception that forces us to give different weight to each of them. Here, in this case, we have considered equal weight for each state because the selection of the best S-box is made by treating all the states equally important. The probability of the sum of each state for one alternative must be one. The weight matrix is defined as:
Weight for each state and alternative is defined in Table 15.
Weight matrix assigned to each state of all possible alternatives
The significance of each state is defined by multiplying weight against each event with a normalized decision matrix which is defined as:
Normalized weight matrix resultants are listed in Table 16.
Normalized weighted matrix
The positive and negative matrices are constructed from a normalized weight matrix by taking the ideal best and ideal worst value of each state of the event. Ideal best values are stored in the positive matrix and listed in Table 17 and ideal worst values are stored in the negative matrix and depicted in Table 18. Ideal best values for the possible approximations are determined as follows:
Positive matrix of all events for all possible alternatives
Negative matrix of all events for all possible alternatives
Similarly, ideal worst values are calculated by the opposite selection of ideal worst states such as:
After the selection of deal best and worst values of the state, the positive and negative ideal separations are performed by the following procedure:
And relative closeness to t ideal solution is determined by,
The ranking is performed on the rule (C m ) = Rank. Positive, negative separation, relative closeness, and ranking is listed in Table 19. From the depicted table we can see that S8 is ranked as one which shows that S8 is the best substitution box selected from MCDM.
Ranking on the base of relative closeness to the ideal solution
For better visual observation we have plotted a bar chart for relative closeness and its respective rank for all possible alternatives against each event. Figure 2 displays the bar chart of ranks against relative closeness and we can examine that S-box 8 is ranked as one with all superlative cryptographic properties.

Bar chart representation of average cryptographic properties of proposed s-boxes.

Bar chart representation of relative closeness and raking values for all possible alternatives.
In this work, we have utilized different types of loops for the construction of different nonlinear confusion components. We have employed LA inverse loop, C-loop, and Moufang loops for the basic structure of S-boxes. The suggested nonlinear confusion components are passed through some cryptographic benchmarks which depict that offered nonlinear components satisfy all the properties of strong structure. Moreover, we have presented a brief comparison of the properties of substitution boxes generated by our anticipated scheme with already existing S-boxes. The comparison elucidates that our offered S-boxes exhibit strong properties relative to the existing ones. we have applied TOPSIS for the selection of the best substitution-box among all the proposed structures. The raking with TOPSIS is applied to each substitution box concerning the achievement of cryptographic properties.
Footnotes
Acknowledgment
This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.
Funding
This research was funded by the Deanship of Scientific Research at Princess Nourah bintAbdulrahman University through the Fast-track Research Funding Program.
