Abstract
Designing of nonlinear confusion component of block cipher is one of the most important and inevitable research problem. Nowadays mostly heuristic search schemes were utilized for the construction of these confusion component. To construct, a cryptographically secure confusion component several algebraic structures were utilized. The thirst for new algebraic structure for the construction of these nonlinear confusion component has always been a point of interest. In this communication, we have utilized a maximal cyclic subgroup of unit of Galois ring. The offered algorithm is more general as compared to Galois field. The class of Boolean functions over Galois ring fall in mixed category which are not completely balanced. Boolean functions having higher nonlinearity and others cryptographic aspects added an inevitable significance in the construction of modern block ciphers. The primary idea of this article is to structure non-balanced Boolean functions on n variables, where n is an even integer, sustaining strict avalanche criterion (SAC) and bit independent criterion (BIC). By comparing SAC with available cryptographic Boolean functions, the constructed multivalued Boolean function acquire highest nonlinearity which does not follow the existing nonlinearity bound of Boolean functions. These newly proposed S-boxes consists of n basic Boolean functions which satisfy the balancedness and non-balancedness criterion. Therefore, these S-box structure lies within a less balanced and more bent Boolean function categories.
Introduction
Security of digital information plays an important role in this digital advanced era. Emerging area of this digitally advanced era are namely internet of thing (IoTs) and artificial intelligence which uses various types of deep and machine learning techniques for intelligent decision. The question arises how to add information security aspects in this new and emerging technologies? Several new information privacy mechanisms were developed so far which provides data security which is based on modern characteristics. Modern information security techniques were developed based on Feistel and substitution-permutation (SP) networks. The Feistel ciphers are generally uses fixed components whereas SP networks uses dynamic components at each round. The thirst of designing new confusion and diffusion components were one of the utmost vital problems in information security. The development of modern block ciphers mainly based confusion and diffusion as proposed by Claude Shannon in 1949. The complexity between encryption key and encrypted information can be made as complex as possible by using suitable confusion whereas the relation between plaintext and ciphertext can be made as strong as possible by using diffusion. The confusion and diffusion can be attained through substitution and permutation. The idea of confusion and diffusion were used in some famous encryption algorithm for example data encryption standard (DES), SHARK, PRESENT, Blow-fish, Two-fish, international data encryption algorithm (IDEA), and advanced encryption standard (AES). These encryption algorithms used Feistel and SP-networks [1–40].
Designing new confusion and diffusion component of stream and block ciphers includes various mathematical structures. Several new mathematical structures-based confusion components were developed. These includes Galois field, symmetry groups, finite group, LA-semi groups, chaotic dynamical systems, Latin square and some other weak structures [41–50]. While designing nonlinear confusion component of block cipher namely S-box must satisfy various cryptographic criterion. To achieve good confusion characteristic in modern block cipher there must be a robust nonlinear component with high nonlinearity. There are various types of cryptographic Boolean functions were added in literature to food the requirement of modern block ciphers. Several new Boolean functions were designed by testing against different cryptographic applications and characteristics. The most imperative cryptographically desirable standards for any Boolean functions includes balancedness, high nonlinearity, strict avalanche criterion (SAC), correlation immunity (CI) of rationally high order, low autocorrelation (AC), high algebraic degree (AD), algebraic immunity (AI), transparency order (TO), linear approximation (LA), differential approximation (DA), sum of deviation (SD) and sum of square deviation (SSD). The linkages among various cryptographic aspects of Boolean functions were investigated and attain more attention because of its implementation and development. But its still a question of interest is to obtain a universal algebraic structure which satisfy all relevant cryptographic characteristics. Mostly up till now Galois field is used to construction nonlinear confusion component with optimal nonlinearity. With this we have possibly structural attacks due to its binary nature. To prevent such attacks while designing such robust component of modern ciphers there is always a room of improvement is these mathematical structures. The benefits of using structures other than binary added complexity but on the other side it makes it possible to add more computational and implementation complexity. Such mathematical structures are more generalized with least possible conditions, we can construct but its far away from traditional implementation at hardware level. For this, we must define some linkages between Galois field and maximal cyclic subgroup of Galois ring. We have defined one to one mapping between maximal cyclic subgroup of Galois ring and Galois field of same cardinality. This makes it possible to reduce computational complexity while implantation [51–65].
The central parts of our article here is to concern about the assets and advancements of another class of S-box to be specific Boolean functions that achieve high nonlinearity, fulfil SAC, and remains non-balanced. We introduced an innovative scheme for developing exceptionally maximal cyclic subgroup of a Galois ring based nonlinear non-balanced functions. It is extremely intriguing to take note of that these non-balanced functions got by utilizing proposed strategy, accomplish nonlinearity greater than that achievable by any recently recognized development technique. We additionally start the investigation into the methodical development of profoundly nonlinear non-balanced functions fulfilling the SAC and BIC of SAC rule [66–80].
Using investigative tactics, we have achieved works with profiles unachievable by previous methods. The variety of assets referred demonstrates that empirical hunt is a stretchy structure for Boolean function scrutiny. Implementing additional aspects of cryptology theory into the maximal cyclic subgroup of Galois ring may confirm a productive opportunity for future research. The structure of Galois ring is little manipulated in current cryptology. We urge other scholars to be concerned about it. Using insightful philosophies, we have achieved functions with profiles unachievable by various systems. The extent of assets tended to show that accurate pursue is a stretchy development for Boolean function assessment. The distinction in premise changes shows that a little notion can enhance exploratory ways of managing incredible effect. Accepting further parts of cryptology theory into the maximal cyclic subgroup of Galois ring may exhibit a useful street for future investigation. The development of Galois ring is negligible exploited in cutting edge cryptology [81–96].
The structure of this manuscript is as respects. In section 2, the notations and the mandatory preliminaries associated to Boolean functions and their cryptographic assets are outlined which will be essential for the successive sections are evaluated. In section 3, our construction of proposed S-boxes which are based on Galois ring are presented. The analysis of cryptographically robust S-box is discussed in section 4. The results and discussions related to obtain outcomes are stated in segment 5. Finally, section 6 concludes the work.
Boolean functions and cryptographic assets of substitution boxes
This segment comprises of preliminaries characteristics related to nonlinear confusion component of block cipher which are fundamentally based on Boolean functions.
Properties of Boolean Functions
This segment will provide some basic definitions of Boolean functions. Let GF (2)
n
be the vector space with n dimension over the Galois field GF (2). GF (2)
n
comprise of 2
n
vectors created in a binary structure of size n. The vector space is outfitted with the scalar product with < . , .>: GF (2)
n
× GF (2)
n
→ GF (2)
This function ζ accepts n bits as input and returns m bits as output.
The (1, - 1)-structure is specified by ((-1) g(β0), . . . , (-1) g(β2 n -1)), and β j are defined in the definition 1.
Definition 6: For a Boolean function g, the imbalance
A balanced Boolean function is a function with imbalance zero.
i-e., if
Correlation is a rational number between –1 and 1.
The affine function exhibits zero nonlinearity. The nonlinearity N g > 0 if the Boolean function g is not affine. A high level of nonlinearity is required when developing a good cryptosystem. It assesses a cryptographic system’s capacity to avoid being written as a linear set of equations using functions, and it ensures challenge to linear cryptanalysis proposed by [44].
where <u, x> is the canonical scalar product.
Every ciphertext bit must be dependent on all output bits if a cryptographic transformation is complete.
where g a is known as a directional derivative g of in the direction of a.
for all every a ∈ GF (2) n .
A logical step from the single output, the theory of Boolean functions is an extension of that theory that allows for many outputs. The term “S-box” refers to a collection of Boolean functions. S-boxes come in a variety of shapes and sizes depending on the dimension and uniqueness of the input and output bits. Below are some essential S-box definitions, as well as a brief overview of various S-box kinds relevant to this study.
An n × m substitution box (S-box) is a mapping from n input bits to m output bits, S : GF (2) n → GF (2) m . The output vector S (x) = (s1, s2, . . . , s m ) can be rotted into m component functions S i : GF (2) n → GF (2) , i = 1, 2, . . . , m . There are inputs as 2 n and feasible outputs as 2 m for an n × m S-box. There are three categories of S-boxes: Straight, compressed, and expansion S-boxes.
Any number of inputs can be assigned to any number of potential outputs, and all of the feasible turnouts are not embodied in the S-box when using a square n × m box together with n = m (which gets in a certain bits and produces the equivalent bits).
One that produces fewer bits than it accepts is called a n × m compression S-box with n > m. DES’s S-box serves as an excellent illustration of this. There are six bits in each S-box, yet each S-box only outputs four. A n × m S-box expansion with nm produces more bits than it consumes. Each of its possible 2 m outputs are signified in the S-box in an identical number of instances. The S-box has a total of 2n-m instances of each potential output entry. The only time that regular n × m ‘S-boxes’ occur while n > m; otherwise, they are unbalanced.
In terms of compression and expansion, there are problems. Reversibility, or the ability to decrypt, is the first concern. Reversing the effects of an S-box is difficult since the overall number of bits is altered. Compression S-boxes have a second problem, which is the loss of data. Before the S-box in the DES algorithm, certain bits are reproduced. As a result, the compression process just removes duplicate bits, not actual data. Compression or expansion S-boxes, in general, will complicate your S-box design significantly. As a result, straight S-boxes are significantly more prevalent.
Some cryptographic assets of S-boxes
S-boxes are conceptually equivalent to the Boolean functions covered in earlier sections, but the methods used to obtain these features are fundamentally different. Many Boolean functions make up an S-box, hence when analysing the cryptographic qualities of an Substitution box, it is not enough to look at the cryptographic features of each Boolean function. The following list of key S-box attributes serves as an excellent illustration of this point.
An S-box with size n × m that is balanced has all its Boolean functions and linear combinations balanced. As a result of this balance, there is no exploitable bias since the equal amount of output bits in the entire output vector combinations assures that an assailant is incapable to irrelevantly estimate either the functions or their output.
The Shannon idea of confusion [31] describes a way to ensure that the ciphertext and key material have a complicated connection in a cipher system. As a result of this extrapolation, it has been hypothesized that the root of the ambiguity is a strong dependence on a substitute. Nonlinear components are used to create a cipher system that is difficult to decipher. In cryptographic cipher systems, substitution boxes are the primary source of nonlinearity. An S-box with size n × m has its nonlinearity measured for the first time.
The computation of a n × m S-box nonlinearity s value turn into computationally infeasible as n and m rise. In the next part, we’ll describe some of the most successful cryptanalytic assaults that are currently known to exist.
Shannon also introduced the term “diffusion” to go along with his idea of confusion [31]. Cipher redundancy spreads throughout a cipher’s full (or substantial) material to minimize the possibility of detecting its statistical structure, as discussed in this article. The avalanche qualities of a cipher system have long been linked to diffusion and the use of cipher components that display good avalanche characteristics. The following definitions are required to measure various properties of S-boxes:
with j = 1, . . . , 2 m - 1 and a ∈ {1, . . . , (2) n - 1}.
In 1985, Tavares and Webster presented new criteria for S-boxes dubbed the bit independent criterion (BIC) [52]. This characteristic specifies that when any single input bit i is reversed, the output bits j and k should change independently for every i, j and k ∈ (1, 2, . . . , n). This measure seems to improve the efficacy of the confusion component. The bit independence that corresponds to the impact of changing the i
th
input bit on the j
th
and k
th
bits of is B
e
i
:
For the S-box function h : GF (2)
n
→ GF (2)
n
, the bit independent criterion (BIC) is then well-demarcated as follows:
which reveals how near is fulfilling the BIC [52].
A theoretical assault on the Data Encryption Standard (DES) using linear cryptanalysis was initially presented in 1993 at the Eurocrypt conference by M. Matsui [38, 62] and later applied effectively in the practical cryptanalysis of DES [44]. If you’re interested in learning more about linear cryptanalysis, you’ll need to know that it works on the premise of finding linear terminologies using plaintext bits, ciphertext bits, and subkey bits [63]. Many plaintext-ciphertext pairings have been utilized to figure out the key bit values in this well-known plaintext attack [63].
In 1990, E. Biham and A. Shamir suggested differential cryptanalysis as an assault against DES at the Crypto conference [64]. Here is how Heys summarises the central idea: To decipher the ciphertext, differential cryptanalysis takes use of the superior probability of various plaintext differences and differences in round three’s ciphertext. That means that the key may be deduced by selecting a specific piece of plaintext and then calculating its output. Linear and differential probability are defined in this section.
such that 0 ≤ i, j ≤ 2 n - 1, τ i and τ j are n-bit binary descriptions of symbols i and j. When the S-box is used for cryptography, it can be used to make a pair of input and output XOR pairs, which are called input/output pairs. Differential cryptanalysis can break into XOR pairs with a lot of XOR table entries. If you choose S-boxes with low XOR table entries, you can protect your cipher from differential cryptanalysis. The only omission is the value (0,0) that has the value of 2 n . When you look at each row in an XOR table, the overall input vector pairs (P, P ⊕ τ i ) is 2 n , which is how many pairs there are in total [67].
where a ∈ GF (2) n , b ∈ GF (2) m ∖ {0} .
where xΓ x , represents the parity (0 or 1) of the bitwise multiplication of Γ x and x.
We start with certain fundamental explanations of commutative rings with their corresponding polynomial extension.
Mathematical formulation of GR (p k , s)
There are some interesting characteristics of polynomial extension fields namely Galois extension field over ℤ
p
, (p is prime modulo) is vanished in its finite extension of ℤ
p
k
. Let us consider polynomial ring of integer over local ring ℤ
p
k
[x] in variable x and primitive irreducible polynomial φ (x) over ℤ
p
k
of degree s to investigate the basic properties of Galois ring extension. The Galois extension of local ring ℤ
p
k
of degree s represented with notion
Formulation of new confusion component of block cipher over GR (23, 8)
We design an 8 × 8 S-box in this segment by utilising the maximum cyclic subgroup G255 of the group of units of the Galois ring GR (23, 8). The S-box is used to encrypt images. We employ the computational approaches described in [5] to get the maximum cyclic subgroup G255 for this design.
Maximal Cyclic Subgroup of Group of Units of GR (23, 8)
For the local ring
Maximal cyclic subgroup G255 elements of the group of units of GR(23,8) with polynomial φ (x) = x8 + x4 + x3 + x2 + 1
Maximal cyclic subgroup G255 elements of the group of units of GR(23,8) with polynomial φ (x) = x8 + x4 + x3 + x2 + 1
The proposed mechanism of nonlinear confusion component of block cipher is created on Galois ring GR (23, 8) with its unit joins with zero element say G255 ∪ {0}. We have defined a mapping from unit element along with zero element to itself for instance mappings from G255 ∪ {0} to G255 ∪ {0}:
This construction of S-box involved the following mappings: Define an inverse map I : G255 → G255 by the following expression:
The scalar multiplication function g is described as g (x) = ax, where a is a fixed element taken from G255. Our proposed S-box is based on two types of mappings namely inverse and scalar mappings. In this way, we can represent construction of our nonlinear confusion component as a composition of these two functions as:
Apply action of S24 on the output of step, 3 we get 24! S-boxes.
By choosing various scalars from G255, 255 various S-boxes can be constructed. The S-box provided in the Table 2 is composed by choosing scalar.
Nonlinear confusion component of block ciphers with 24 bits element
Nonlinear confusion component of block ciphers with 24 bits element
The suggested S-box must be tested to determine its utility in encryption. Any S- box’s strength may be determined by looking at several features stated in the literature. The differential analysis of DES [64] and the information-theoretic analyses utilizing extracts from Shannon’s unique idea [30] are two widely used cryptanalysis approaches. Stringent avalanche criteria (SAC), non-linearity, bit independence criterion (BIC), differential and linear approximation probability are some of the aspects of the offered S-box that we investigate here. The findings of these studies are cautiously reviewed to verify the robustness of the suggested S-box. In the following sections, we will go through the specifics of these tests and how they affected our understanding of the S-overall box’s strength. There has been a slew of side-channel attacks on various cryptographic schemes since Kocher originally described them in 1996 [84]. One of the most potent assaults in opposition to iterated block ciphers is the DPA. Prouff developed DPA assaults in standings of correlation coefficients among two Boolean functions in [85] and introduced transparency order for Substitution boxes in block ciphers (TO). This statistic measures S-boxes’ resistance against DPA assaults.
Nonlinearity
The confusion capability of modern encryption algorithms is highly dependent on its nonlinear substitution boxes (S-boxes). The nonlinearity is one of most significant cryptographic attributes which quantitatively measures this aspect. Higher the nonlinear of S-box higher is the robustness of proposed mechanism. With this characteristics complexity of input and output bit patterns are utilized to assess the behaviour of individual Boolean functions involved in S-boxes. In nonlinearity, least distance of a particular function is measure from all its corresponding affine function. To determine the nonlinearity of an encryption procedure, the number of adjustments mandatory to get the nearest affine functions is relevant. The mathematical expression which involved Walsh spectrum is given as follows [80]:
The Walsh spectrum S
g
(w) is defined as
The nonlinearity of projected nonlinear confusion component is given in Table 3.
Nonlinearity of non-balanced functions
Generally, cryptographic Boolean functions should meet many conditions at the same time, including strong nonlinearity, rigorous avalanche criterion, and bit independence criterion. The linear cryptanalysis found by Matsui is sensitive to numerous cryptanalytic assaults on a low nonlinearity function (1994). In the past, nonlinearity was seen as an essential requirement for quality control. Nonlinearity is critical to prevent encryption schemes like DES, as demonstrated by recent improvements in linear cryptanalysis performed by Matsui. Cryptic analysis that utilizes the low non-linearity of S-boxes utilized in the block cipher FEAL, and DES has proved effective.
Bended functions are well-known for their strong nonlinearity and ability to meet the propagation condition for any non-zero vectors that they encounter (Dillon, 1972). Because of this, bending functions cannot be used in practice because of two limitations. When the number of input coordinates corresponds to the number of output coordinates, there are two drawbacks.
Our proposed S-box consists of Boolean functions which are not balanced as a whole and exist for an even number of coordinates. Also, our proposed S-box does not follow the existing bound on nonlinearity which is a discovery in the field of cryptographic criteria. The components of the proposed S-box namely even the number of Boolean functions exhibits characteristics of balancedness and bentness, but these Boolean functions don’t satisfy the nonlinearity bounds as fulfilling the by bent Boolean functions. These classes of Boolean functions are more general as associated to the existing Boolean functions. The suggested S-box is fundamentally based on the non-balanced and non-bent Boolean functions. We have proposed a different bound for the nonlinearity of these non-balanced and non-bent Boolean functions. The comparison of the different bounds is also depicted in Table 4.
Contrast among the nonlinearity bounds of Boolean functions
For simplicity, we suppose
Our function has better nonlinearity than the newly suggested Boolean function, which has the finest nonlinearity with all known bent Boolean function constructions. This benchmark is through the mixed behaviour of our proposed S-boxes which is mainly at the same time dependent on balanced and non-balanced Boolean functions.
Strict Avalanche Criterion (SAC) Analytically
The strict avalanche criterion (SAC) investigates the behaviour of the output bits when the nonlinear S-box transformation is changed. Roughly one-half of the resultant bits should variate value in reaction to a single input change. The variation in output bit designs causes an avalanche of changes in the SP-network. The magnitude of these variations aids in estimating cryptanalysis resistance and cipher strength. The SAC of suggested S-box is given as follows:
The comparative analyses of our proposed methods with other available multivalued nonlinear Boolean function are available in Tables 6-7.
Assessment of the nonlinearity of nonbalanaced and balanced Boolean function (neven)
Assessment of the nonlinearity of nonbalanaced and balanced Boolean function (neven)
Contrast of SAC assessment of offered S-boxes with chaotic S-boxes
Contrast of SAC assessment of offered S-box with some well-known S-boxes
Changes in input bits and features of pair-wise input/output variables of avalanche vectors also play a role in the Bit Independence Criterion (BIC) [80]. Changing a single input bit in plaintext allows us to test this requirement.
Results and Discussions
S-boxes with strong encryption capabilities have been compared to the performance of the suggested S-box and found to be equivalent or even superior. As can be seen from the nonlinearity analysis, these qualities are on par with the S-boxes that were used as a standard in this study. The comparison of nonlinearity bounds is listed in Table 4. The results for each nonlinearity bounds are given in Table 5. The thorough investigations of Table 5, clearly justify the claim of being highly nonlinear Boolean functions are obtained that have yet not been devised in literature which is a central point of the proposed construction technique. The results are shown in Table 5. We have also drawn a comparison of SAC among the chaotic and some well-known S-boxes (see Tables 6-7). Our suggested S-box satisfies the SAC and is quite comparable with the SAC of already existing S-boxes. In Table 8, a contrast of bit independent criteria is presented among the suggested S-box and prime, AES, Gray, APA, S-boxes. The outcomes agree with the desired range. In these tests, it is reflected that the recital of the offered S-box is equivalent to the present eminent S-boxes utilized as standards in this article.
Contrast of SAC of BIC of offered S-box
Contrast of SAC of BIC of offered S-box
In this work, we mainly provide an innovative construction method for the maximal cyclic subgroup of the Galois ring based nonlinear component of block cipher namely S-box. Additionally, we have studied the three cryptographic assets of Boolean functions including nonlinearity, SAC, and BIC. An innovative technique has been displayed to build S-boxes that comprise Boolean functions whose nonlinearity is much higher than accomplished by any beforehand known development. Also, a comparison with already existing results in the literature has been drawn to verify the significance of the suggested construction scheme. This opens a conceivable new parkway for advanced investigation that is to develop the outcomes do that they consider other cryptographic components, for example, algebraic degree, autocorrelation, algebraic immunity, correlation immunity, linear structures, global avalanche characteristics (GAC), transparency order, linear and differential approximation probabilities of proposed S-boxes to resist against the linear and differential attacks.
Footnotes
Acknowledgments
This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2022R87), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Funding
This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2022R87), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
