Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms

Bibliographic Details
Title: Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
Authors: Khan, Muhammad Fahad, Saleem, Khalid, Alotaibi, Mohammed, Hazzazi, Mohammad Mazyad, Rehman, Eid, Abbasi, Aaqif Afzaal, Gondal, Muhammad Asif
Source: Computers, Materials & Continua, 2022
Publication Year: 2022
Subject Terms: Computer Science - Cryptography and Security, 68P25, E.3
More Details: Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In this regard, block cipher has been one of the most reliable options through which data security is accomplished. The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes. For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques. On the other side, literature endorse the true random numbers for information security due to the reason that, true random numbers are purely non-deterministic. In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes. Secondly, a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes. Based on the outcome of Systematic Literature Review (SLR), genetic algorithm is chosen for the optimization of s-boxes. The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers. Moreover, our results showed that the proposed substitution boxes achieve better
Comment: 15 pages, 3 figuers, Journal Paper
Document Type: Working Paper
DOI: 10.32604/cmc.2022.027655
Access URL: http://arxiv.org/abs/2206.09424
Accession Number: edsarx.2206.09424
Database: arXiv
FullText Text:
  Availability: 0
CustomLinks:
  – Url: http://arxiv.org/abs/2206.09424
    Name: EDS - Arxiv
    Category: fullText
    Text: View this record from Arxiv
    MouseOverText: View this record from Arxiv
  – Url: https://resolver.ebsco.com/c/xy5jbn/result?sid=EBSCO:edsarx&genre=article&issn=&ISBN=&volume=&issue=&date=20220619&spage=&pages=&title=Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms&atitle=Construction%20and%20Optimization%20of%20TRNG%20Based%20Substitution%20Boxes%20for%20Block%20Encryption%20Algorithms&aulast=Khan%2C%20Muhammad%20Fahad&id=DOI:10.32604/cmc.2022.027655
    Name: Full Text Finder (for New FTF UI) (s8985755)
    Category: fullText
    Text: Find It @ SCU Libraries
    MouseOverText: Find It @ SCU Libraries
Header DbId: edsarx
DbLabel: arXiv
An: edsarx.2206.09424
RelevancyScore: 1032
AccessLevel: 3
PubType: Report
PubTypeId: report
PreciseRelevancyScore: 1032.39245605469
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Khan%2C+Muhammad+Fahad%22">Khan, Muhammad Fahad</searchLink><br /><searchLink fieldCode="AR" term="%22Saleem%2C+Khalid%22">Saleem, Khalid</searchLink><br /><searchLink fieldCode="AR" term="%22Alotaibi%2C+Mohammed%22">Alotaibi, Mohammed</searchLink><br /><searchLink fieldCode="AR" term="%22Hazzazi%2C+Mohammad+Mazyad%22">Hazzazi, Mohammad Mazyad</searchLink><br /><searchLink fieldCode="AR" term="%22Rehman%2C+Eid%22">Rehman, Eid</searchLink><br /><searchLink fieldCode="AR" term="%22Abbasi%2C+Aaqif+Afzaal%22">Abbasi, Aaqif Afzaal</searchLink><br /><searchLink fieldCode="AR" term="%22Gondal%2C+Muhammad+Asif%22">Gondal, Muhammad Asif</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: Computers, Materials & Continua, 2022
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2022
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22Computer+Science+-+Cryptography+and+Security%22">Computer Science - Cryptography and Security</searchLink><br /><searchLink fieldCode="DE" term="%2268P25%22">68P25</searchLink><br /><searchLink fieldCode="DE" term="%22E%2E3%22">E.3</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In this regard, block cipher has been one of the most reliable options through which data security is accomplished. The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes. For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques. On the other side, literature endorse the true random numbers for information security due to the reason that, true random numbers are purely non-deterministic. In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes. Secondly, a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes. Based on the outcome of Systematic Literature Review (SLR), genetic algorithm is chosen for the optimization of s-boxes. The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers. Moreover, our results showed that the proposed substitution boxes achieve better<br />Comment: 15 pages, 3 figuers, Journal Paper
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: Working Paper
– Name: DOI
  Label: DOI
  Group: ID
  Data: 10.32604/cmc.2022.027655
– Name: URL
  Label: Access URL
  Group: URL
  Data: <link linkTarget="URL" linkTerm="http://arxiv.org/abs/2206.09424" linkWindow="_blank">http://arxiv.org/abs/2206.09424</link>
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsarx.2206.09424
PLink https://login.libproxy.scu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsarx&AN=edsarx.2206.09424
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.32604/cmc.2022.027655
    Subjects:
      – SubjectFull: Computer Science - Cryptography and Security
        Type: general
      – SubjectFull: 68P25
        Type: general
      – SubjectFull: E.3
        Type: general
    Titles:
      – TitleFull: Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Khan, Muhammad Fahad
      – PersonEntity:
          Name:
            NameFull: Saleem, Khalid
      – PersonEntity:
          Name:
            NameFull: Alotaibi, Mohammed
      – PersonEntity:
          Name:
            NameFull: Hazzazi, Mohammad Mazyad
      – PersonEntity:
          Name:
            NameFull: Rehman, Eid
      – PersonEntity:
          Name:
            NameFull: Abbasi, Aaqif Afzaal
      – PersonEntity:
          Name:
            NameFull: Gondal, Muhammad Asif
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 19
              M: 06
              Type: published
              Y: 2022
ResultId 1