Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
Title: | Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms |
---|---|
Authors: | Khan, Muhammad Fahad, Saleem, Khalid, Alotaibi, Mohammed, Hazzazi, Mohammad Mazyad, Rehman, Eid, Abbasi, Aaqif Afzaal, Gondal, Muhammad Asif |
Source: | Computers, Materials & Continua, 2022 |
Publication Year: | 2022 |
Subject Terms: | Computer Science - Cryptography and Security, 68P25, E.3 |
More Details: | Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In this regard, block cipher has been one of the most reliable options through which data security is accomplished. The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes. For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques. On the other side, literature endorse the true random numbers for information security due to the reason that, true random numbers are purely non-deterministic. In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes. Secondly, a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes. Based on the outcome of Systematic Literature Review (SLR), genetic algorithm is chosen for the optimization of s-boxes. The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers. Moreover, our results showed that the proposed substitution boxes achieve better Comment: 15 pages, 3 figuers, Journal Paper |
Document Type: | Working Paper |
DOI: | 10.32604/cmc.2022.027655 |
Access URL: | http://arxiv.org/abs/2206.09424 |
Accession Number: | edsarx.2206.09424 |
Database: | arXiv |
FullText | Text: Availability: 0 CustomLinks: – Url: http://arxiv.org/abs/2206.09424 Name: EDS - Arxiv Category: fullText Text: View this record from Arxiv MouseOverText: View this record from Arxiv – Url: https://resolver.ebsco.com/c/xy5jbn/result?sid=EBSCO:edsarx&genre=article&issn=&ISBN=&volume=&issue=&date=20220619&spage=&pages=&title=Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms&atitle=Construction%20and%20Optimization%20of%20TRNG%20Based%20Substitution%20Boxes%20for%20Block%20Encryption%20Algorithms&aulast=Khan%2C%20Muhammad%20Fahad&id=DOI:10.32604/cmc.2022.027655 Name: Full Text Finder (for New FTF UI) (s8985755) Category: fullText Text: Find It @ SCU Libraries MouseOverText: Find It @ SCU Libraries |
---|---|
Header | DbId: edsarx DbLabel: arXiv An: edsarx.2206.09424 RelevancyScore: 1032 AccessLevel: 3 PubType: Report PubTypeId: report PreciseRelevancyScore: 1032.39245605469 |
IllustrationInfo | |
Items | – Name: Title Label: Title Group: Ti Data: Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Khan%2C+Muhammad+Fahad%22">Khan, Muhammad Fahad</searchLink><br /><searchLink fieldCode="AR" term="%22Saleem%2C+Khalid%22">Saleem, Khalid</searchLink><br /><searchLink fieldCode="AR" term="%22Alotaibi%2C+Mohammed%22">Alotaibi, Mohammed</searchLink><br /><searchLink fieldCode="AR" term="%22Hazzazi%2C+Mohammad+Mazyad%22">Hazzazi, Mohammad Mazyad</searchLink><br /><searchLink fieldCode="AR" term="%22Rehman%2C+Eid%22">Rehman, Eid</searchLink><br /><searchLink fieldCode="AR" term="%22Abbasi%2C+Aaqif+Afzaal%22">Abbasi, Aaqif Afzaal</searchLink><br /><searchLink fieldCode="AR" term="%22Gondal%2C+Muhammad+Asif%22">Gondal, Muhammad Asif</searchLink> – Name: TitleSource Label: Source Group: Src Data: Computers, Materials & Continua, 2022 – Name: DatePubCY Label: Publication Year Group: Date Data: 2022 – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22Computer+Science+-+Cryptography+and+Security%22">Computer Science - Cryptography and Security</searchLink><br /><searchLink fieldCode="DE" term="%2268P25%22">68P25</searchLink><br /><searchLink fieldCode="DE" term="%22E%2E3%22">E.3</searchLink> – Name: Abstract Label: Description Group: Ab Data: Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In this regard, block cipher has been one of the most reliable options through which data security is accomplished. The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes. For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques. On the other side, literature endorse the true random numbers for information security due to the reason that, true random numbers are purely non-deterministic. In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes. Secondly, a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes. Based on the outcome of Systematic Literature Review (SLR), genetic algorithm is chosen for the optimization of s-boxes. The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers. Moreover, our results showed that the proposed substitution boxes achieve better<br />Comment: 15 pages, 3 figuers, Journal Paper – Name: TypeDocument Label: Document Type Group: TypDoc Data: Working Paper – Name: DOI Label: DOI Group: ID Data: 10.32604/cmc.2022.027655 – Name: URL Label: Access URL Group: URL Data: <link linkTarget="URL" linkTerm="http://arxiv.org/abs/2206.09424" linkWindow="_blank">http://arxiv.org/abs/2206.09424</link> – Name: AN Label: Accession Number Group: ID Data: edsarx.2206.09424 |
PLink | https://login.libproxy.scu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsarx&AN=edsarx.2206.09424 |
RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.32604/cmc.2022.027655 Subjects: – SubjectFull: Computer Science - Cryptography and Security Type: general – SubjectFull: 68P25 Type: general – SubjectFull: E.3 Type: general Titles: – TitleFull: Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Khan, Muhammad Fahad – PersonEntity: Name: NameFull: Saleem, Khalid – PersonEntity: Name: NameFull: Alotaibi, Mohammed – PersonEntity: Name: NameFull: Hazzazi, Mohammad Mazyad – PersonEntity: Name: NameFull: Rehman, Eid – PersonEntity: Name: NameFull: Abbasi, Aaqif Afzaal – PersonEntity: Name: NameFull: Gondal, Muhammad Asif IsPartOfRelationships: – BibEntity: Dates: – D: 19 M: 06 Type: published Y: 2022 |
ResultId | 1 |