Abstract
Cryptography is promising primitive for secure communication. Substitution permutation networks (SPN) is one cryptographic scheme which uses substitution box (S-box). S-box is an integral part of many encryption schemes. These are nonlinear map** functions having certain desirable properties like bijectiveness, nonlinearity, balancedness, algebraic immunity, independence, completeness, strict avalanche criteria, etc. Designing good S-boxes is a research problem. In this paper, we discuss a method of designing S-boxes based on the Nordstrom–Robinson code \((\mathcal {N}_{16})\) which is a nonlinear code and explained various properties of designed S-box. We also compare our designed S-box with Rijndael S-box.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Farwa, S., Shah, T., Idrees, L.: A highly nonlinear S-box based on a fractional linear transformation. SpringerPlus (2016)
Ritter, T.: S-box Design: A Literature Survey
Cheung, J.M.: The Design of S-Boxes
National Institute of Standard and Technology
Deepak, K.D.: On Some Necessary Conditions of Boolean Functions to Resist Algebraic Attacks. Thesis
Rachh, R.R., Anami, B.S., Mohan, P.A.: Efficient Implementations of S-Box and Inverse S-Box for AES algorithm. TENCON 63–66 (2009)
Ibrahim, S., Abbas, A.M.: A novel optimization method for constructing cryptographically strong dynamic S-boxes. IEEE Access
Nyberg, K.: Perfect nonlinear S box. Eurocrypt 378–386 (1991)
Pasalic, E., Maitra, S.: Linear codes in generalized construction of resilient functions with very high nonlinearity. IEEE Trans. Inf. Theory 48(8) (2002)
Chew, L.C.N., Ismail, E.S.: S-box construction based on linear fractional transformation and permutation function. Symmetry
Mazumdar, B., Mukhopadhyay, D., Sengupta, I.: Constrained search for a class of good bijective s-boxes with improved DPA resistivity. IEEE Trans. Inf. Forensic Secur. 8(12) (2013)
Mazumdar, B., Mukhopadhyay, D.: Construction of rotation symmetric S-boxes with high nonlinearity and improved DPA resistivity. IEEE Trans. Comput. 66(1) (2017)
MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error Correcting Codes. Elsevier (1977)
Agrawal, D., Das, S., Krishanaswamy, S.: Secret sharing schemes based on Nonlinear codes. In: International Symposium on Information Theory, pp. 864–867 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Agrawal, D. (2024). Construction of Substitution Box from Nordstrom–Robinson \((\mathcal N_{16})\) Code. In: Nanda, S.J., Yadav, R.P., Gandomi, A.H., Saraswat, M. (eds) Data Science and Applications. ICDSA 2023. Lecture Notes in Networks and Systems, vol 819. Springer, Singapore. https://doi.org/10.1007/978-981-99-7820-5_39
Download citation
DOI: https://doi.org/10.1007/978-981-99-7820-5_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7819-9
Online ISBN: 978-981-99-7820-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)