An algorithm for construction of substitution box based on subfield of galois field GF(216) and dynamic linear fractional transformation

In block encryption algorithms the only nonlinear component, which creates confusion and diffusion, is substitution box (S-Box). Therefore, carefully selection of S-Box is an important task. In this article, an algorithm is presented for the construction of 8 × 8 S-Box based on all subfields of Galo...

Full description

Saved in:
Bibliographic Details
Published inMultimedia tools and applications Vol. 83; no. 19; pp. 56347 - 56368
Main Authors Zafar, Sohail, Idrees, Bazgha, Rashid, Tabasam
Format Journal Article
LanguageEnglish
Published New York Springer US 01.06.2024
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1573-7721
1380-7501
1573-7721
DOI10.1007/s11042-023-17763-y

Cover

Abstract In block encryption algorithms the only nonlinear component, which creates confusion and diffusion, is substitution box (S-Box). Therefore, carefully selection of S-Box is an important task. In this article, an algorithm is presented for the construction of 8 × 8 S-Box based on all subfields of Galois Field G F 2 16 and linear fractional transformation. Proposed algorithm is easy and simple but significantly complex for the attackers as it utilizes all subfields of G F ( 2 16 ) corresponding to all primitive irreducible polynomials for making G F ( 2 16 ) . An illustrating S-Box is also developed which is showing good structural characteristics such as it has no fixed point with 108.5 nonlinearity and 0.5020 strict avalanche. In the last, illustrated S-Box is applied on images for checking the performance under various criteria available in the literature. Obtained results of analyses are compared to well-known S-Boxes and found better in the comparison.
AbstractList In block encryption algorithms the only nonlinear component, which creates confusion and diffusion, is substitution box (S-Box). Therefore, carefully selection of S-Box is an important task. In this article, an algorithm is presented for the construction of 8 × 8 S-Box based on all subfields of Galois Field G F 2 16 and linear fractional transformation. Proposed algorithm is easy and simple but significantly complex for the attackers as it utilizes all subfields of G F ( 2 16 ) corresponding to all primitive irreducible polynomials for making G F ( 2 16 ) . An illustrating S-Box is also developed which is showing good structural characteristics such as it has no fixed point with 108.5 nonlinearity and 0.5020 strict avalanche. In the last, illustrated S-Box is applied on images for checking the performance under various criteria available in the literature. Obtained results of analyses are compared to well-known S-Boxes and found better in the comparison.
In block encryption algorithms the only nonlinear component, which creates confusion and diffusion, is substitution box (S-Box). Therefore, carefully selection of S-Box is an important task. In this article, an algorithm is presented for the construction of 8×8 S-Box based on all subfields of Galois Field GF216 and linear fractional transformation. Proposed algorithm is easy and simple but significantly complex for the attackers as it utilizes all subfields of GF(216) corresponding to all primitive irreducible polynomials for making GF(216). An illustrating S-Box is also developed which is showing good structural characteristics such as it has no fixed point with 108.5 nonlinearity and 0.5020 strict avalanche. In the last, illustrated S-Box is applied on images for checking the performance under various criteria available in the literature. Obtained results of analyses are compared to well-known S-Boxes and found better in the comparison.
Author Idrees, Bazgha
Zafar, Sohail
Rashid, Tabasam
Author_xml – sequence: 1
  givenname: Sohail
  surname: Zafar
  fullname: Zafar, Sohail
  email: sohailahmad04@gmail.com
  organization: Department of Mathematics, University of Management and Technology
– sequence: 2
  givenname: Bazgha
  surname: Idrees
  fullname: Idrees, Bazgha
  organization: Department of Mathematics, University of Management and Technology
– sequence: 3
  givenname: Tabasam
  surname: Rashid
  fullname: Rashid, Tabasam
  organization: Department of Mathematics, University of Management and Technology
BookMark eNp9kM1OAyEUhYnRxPrzAq5I3OhilAvMMF02xlaTJm50TWCGqTRTUGAS-wY-trRjonHhCg6cc-_Jd4IOnXcGoQsgN0CIuI0AhNOCUFaAEBUrtgdoAqVghRAUDn_dj9FJjGtCoCopn6DPmcOqX_lg0-sGdz7gxruYwtAk6x32HY6DjsmmYa-1_8BaRdPiLPJPZ03f7lwr1Xsb8agX8ysK1TVWrsXt1qmNbXBvnVEBd0HtJ6sep6BczBs3avdwho461Udz_n2eopf5_fPdQ7F8WjzezZZFw2CaCl1TzkpFRF1D2XDB21ZT0QEnhglg3EBbckGg7pjQumItMRSAMwJTpjUodooux7lvwb8PJia59kPIfaJkpMosa6BldtWjqwk-xmA62di075lb214CkTvucuQuM3e55y63OUr_RN-C3aiw_T_ExlDMZrcy4afVP6kvkdWYtg
CitedBy_id crossref_primary_10_1007_s11760_024_03301_2
Cites_doi 10.2478/amns.2021.1.00015
10.1109/TC.1979.1675242
10.1049/ip-e.1988.0044
10.1007/s11042-018-6250-8
10.1109/ACCESS.2019.2921708
10.1007/3-540-46416-6_32
10.1109/ACCESS.2021.3053998
10.24507/ijicic.16.01.331
10.1007/BF00630563
10.2478/amns.2020.1.00011
10.5560/zna.2013-0021
10.1109/ACCESS.2020.2988298
10.1155/2019/2847801
10.3390/e21030245
10.1007/s00521-018-3557-3
10.1007/s11042-018-6953-x
10.5897/IJPS11.531
10.2478/AMNS.2020.1.00046
10.1007/s11042-020-08995-3
10.2478/amns.2020.2.00024
10.3390/sym11030437
10.1109/ACCESS.2021.3072075
10.1007/3-540-39799-X_41
10.1007/978-1-84800-988-2
10.1007/3-540-48285-7_33
10.1155/2018/9389065
10.1007/s11071-013-0904-x
10.1002/j.1538-7305.1949.tb00928.x
10.1007/3-540-46885-4_53
10.1038/scientificamerican0573-15
10.1109/ACCESS.2019.2938513
10.1145/168588.168610
10.1007/s11042-019-08282-w
10.1007/s11042-020-08718-8
10.1016/j.physleta.2012.01.009
10.2478/AMNS.2020.2.00041
10.1007/s11277-022-09524-1
10.1007/s11277-020-07841-x
10.1631/FITEE.1800434
10.1007/s40314-015-0265-9
10.1109/ACCESS.2020.2975880
10.1109/ACCESS.2020.3010615
10.1007/s11042-020-10257-1
10.1155/2017/5101934
10.1007/s11277-019-06973-z
10.2298/PIM1307109L
10.1016/j.cjph.2019.05.038
10.1007/s11042-020-10048-8
10.2478/amns.2020.1.00033
10.3390/sym11030351
10.1007/s11277-018-5698-1
10.2478/amns.2020.1.00010
10.3390/info11020110
10.1371/journal.pone.0241890
10.1063/5.0061639
10.3390/cryptography3020013
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M2O
MBDVC
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
Q9U
DOI 10.1007/s11042-023-17763-y
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection (NTUSG)
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
Research Library
ProQuest Central (Alumni)
ProQuest Central
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global (OCUL)
Computing Database
ProQuest Research Library
Research Library (Corporate)
Advanced Technologies & Aerospace Database (ProQuest)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList
ABI/INFORM Global (Corporate)
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1573-7721
EndPage 56368
ExternalDocumentID 10_1007_s11042_023_17763_y
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3EH
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
8AO
8FE
8FG
8FL
8G5
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GUQSH
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M2O
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TH9
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADKFA
AEZWR
AFDZB
AFHIU
AFOHR
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PUEGO
7SC
7XB
8AL
8FD
8FK
JQ2
L.-
L7M
L~C
L~D
MBDVC
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQUKI
Q9U
ID FETCH-LOGICAL-c319t-b82435a078815c474ddb27f140e37134e1d547018f37bb63d0e211430193bb1a3
IEDL.DBID BENPR
ISSN 1573-7721
1380-7501
IngestDate Fri Jul 25 09:37:26 EDT 2025
Wed Oct 01 04:51:41 EDT 2025
Thu Apr 24 22:56:16 EDT 2025
Fri Feb 21 02:40:13 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 19
Keywords Image encryption
S-Box
Galois field
Linear fractional transformation
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-b82435a078815c474ddb27f140e37134e1d547018f37bb63d0e211430193bb1a3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 3060078125
PQPubID 54626
PageCount 22
ParticipantIDs proquest_journals_3060078125
crossref_citationtrail_10_1007_s11042_023_17763_y
crossref_primary_10_1007_s11042_023_17763_y
springer_journals_10_1007_s11042_023_17763_y
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20240600
PublicationDateYYYYMMDD 2024-06-01
PublicationDate_xml – month: 6
  year: 2024
  text: 20240600
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Multimedia tools and applications
PublicationTitleAbbrev Multimed Tools Appl
PublicationYear 2024
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References PieprzykJFinkelsteinGTowards effective nonlinear cryptosystem designIEE Proc E - Comput Digit Tech199813532533510.1049/ip-e.1988.0044
Hussain I, Anees A, Al-Maadeed TA, Mustafa MT (2019) Construction of S-box based on chaotic map and algebraic structures. MDPI, Symmetry 11. https://doi.org/10.3390/sym11030351
FarahMABGuesmiRKachouriASametMA new design of cryptosystem based on S-box and chaotic permutationMultimed Tools Appl202079191291915010.1007/s11042-020-08718-8
RafiqAKhanMConstruction of new s-boxes based on triangle groups and its applications in copyright protectionMultimed Tools Appl201978155271554410.1007/s11042-018-6953-x
ShahTJahangirSAndradeAADDesign of new 4×4 S-box from finite commutative chain ringsComput Appl Math201736843857364205710.1007/s40314-015-0265-9
Shah T, Qureshi A (2019) S-box on subgroup of galois field. Cryptography 3. https://doi.org/10.3390/cryptography3020013
GaoWIdreesBZafarSRashidTConstruction of nonlinear component of block cipher by action of modular group PSL (2, Z) on projective line PL (GF (2 8))IEEE Access2020813673613674910.1109/ACCESS.2020.3010615
SeverMÖzdemirASNTRU over Galois ringsAppl Math Nonlinear Sci20216499506428172610.2478/AMNS.2020.2.00041
BhattiUAYuZLiJNawazSAMehmoodAZhangKYuanLHybrid watermarking algorithm using clifford algebra with arnold scrambling and chaotic encryptionIEEE Access20208763867639810.1109/ACCESS.2020.2988298
RazaqAUllahAAlolaiyanHYousafAA novel group theoretic and graphical approach for designing cryptographically strong nonlinear components of block ciphersWireless Pers Commun20201163165319010.1007/s11277-020-07841-x
SiddiquiNYousafFMurtazaFEhatisham-ul-HaqMAshrafMUAlghamdiAMAlfakeehASA highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite fieldPLos One202015e024189010.1371/journal.pone.0241890
Lambić D, Živković M (2013) Comparison of random s-box generation method. In: Publications de l’institut mathématique nouvelle série, tome, vol 93. pp. 109–115. https://doi.org/10.2298/PIM1307109L
Matsui M (1993) Linear cryptanalysis method for DES cipher. In: Proceedings of the workshop on the theory and application of of cryptographic techniques. pp 386–397
ShannonCCommunication theory of secrecy systemBell Syst Tech J1949286567153213310.1002/j.1538-7305.1949.tb00928.x
HayatUAzamNAAsifMA method of generating 8× 8 substitution boxes based on elliptic curvesWireless Pers Commun201810143945110.1007/s11277-018-5698-1
Nyberg K (1991) Perfect nonlinear S-boxes. Berlin, Heidelberg, pp 378–3865
FarhanAKAliRSNatiqHAl-SaidiNMGA new S-box generation algorithm based on multistability behavior of a plasma perturbation modelIEEE Access2019712491412492410.1109/ACCESS.2019.2938513
ParidaPPradhanCGaoX-ZRoyDSBarikRKImage encryption and authentication with elliptic curve cryptography and multidimensional chaotic mapsIEEE Access20219761917620410.1109/ACCESS.2021.3072075
PieprzykJFinkelsteinGTowards effective nonlinear cryptosystem designIEE Proc E - Comput Digit Tech198813532533510.1049/ip-e.1988.0044
SunZNonlinear relationship based on range quadratic loss functionAppl Math Nonlinear Sci20205483492419169210.2478/amns.2020.2.00024
AlhadawiHSMajidMALambićDAhmadMA novel method of S-box design based on discrete chaotic maps and cuckoo search algorithmMultimed Tools Appl2021807333735010.1007/s11042-020-10048-8
AkgandüllerÖAtmacaSPDiscrete normal vector field approximation via time scale calculusAppl Math Nonlinear Sci20205349360409291510.2478/amns.2020.1.00033
Meier W, Staffelbach O (1990) Nonlinearity criteria for cryptographic functions. Berlin, Heidelberg, pp. 549–562
YousafMAAlolaiyanHAhmadMDilbarMRazaqAComparison of pre and post-action of a finite abelian group over certain nonlinear schemesIEEE Access20208397813979210.1109/ACCESS.2020.2975880
ShahzadIMushtaqQRazaqAConstruction of new s-box using action of quotient of the modular group for multimedia securityHindawi Secur Commun Netw201920191310.1155/2019/2847801
Gallian JA (2017) Contemporary abstract algebra. Cengage Learning
RazaqAUllahAWaheedAA novel technique to improve nonlinearity of substitution box without disturbing its mathematical propertiesWireless Pers Commun20201112091210510.1007/s11277-019-06973-z
ShahTHussainIGondalMAMahmoodHStatistical analysis of s-box in image encryption applications based on majority logic criterionInt J Phys Sci201164110412710.5897/IJPS11.531
AhmedHAZolkipliMFAhmadMA novel efficient substitution-box design based on firefly algorithm and discrete chaotic mapNeural Comput Appl2019317201721010.1007/s00521-018-3557-3
Nardo LG, Nepomuceno EG, Bastos GT, Santos TA, Butusov DN, Arias-Garcia J (2021) A reliable chaos-based cryptography using Galois field. Chaos 31. https://doi.org/10.1063/5.0061639
Seberry J, Zhang X-M, Zheng Y (1993) Systematic generation of cryptographically robust s-boxes (extended abstract). In Proceedings of the 1st ACM Conference on Computer and Communications Security. pp. 171–182
JahangirSShahTDesigning S-boxes triplet over a finite chain ring and its application in RGB image encryptionMultimed Tools Appl202079268852691110.1007/s11042-020-08995-3
BhattiUAYuanLYuZLiJNawazSAMehmoodAZhangKNew watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryptionMultimed Tools Appl202180133671338710.1007/s11042-020-10257-1
ZahidAHArshadMJAhmadMA novel construction of efficient substitution-boxes using cubic fractional transformationMDPI, Entropy201921245394322810.3390/e21030245
QiuY-HYangXLiZ-ZZhangCChenS-XInvestigating the impacts of artificial intelligence technology on technological innovation from a patent perspectiveAppl Math Nonlinear Sci2021612914010.2478/amns.2021.1.00015
WangYWongK-WLiCLiYA novel method to design S-box based on chaotic map and genetic algorithmPhys Lett A201237682783310.1016/j.physleta.2012.01.009
BihamEShamirADifferential cryptanalysis of DES-like cryptosystemsJ Cryptol19914372120278610.1007/BF00630563
ShahTShahDConstruction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over ℤ2Multimed Tools Appl2019781219123410.1007/s11042-018-6250-8
HorstFCryptography and computer privacySci Am1973228152310.1038/scientificamerican0573-15
RazaqAYousafAShuaibUSiddiquiNUllahAWaheedAA novel construction of substitution box involving coset diagram and a bijective mapSecur Commun Netw201710.1155/2017/5101934
AçikkapiMŞÖzkaynakFÖzerABSide-channel analysis of chaos-based substitution box structuresIEEE Access20197790307904310.1109/ACCESS.2019.2921708
JamalSSAttaullahShahTAlKhaldiAHTufailMNConstruction of new substitution boxes using linear fractional transformation and enhanced chaosChin J Phys201960564572397951110.1016/j.cjph.2019.05.038
ShahTQamarAHussainISubstitution box on maximal cyclic subgroup of units of a Galois ringZ Naturforsch A20136856757210.5560/zna.2013-0021
Kam JB, Davida GI (1979) Structured design of substitution-permutation encryption networks. IEEE Trans Comput 747–753
AlzaidiAAAhmadMAhmedHSSolamiEASine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic mapComplexity201810.1155/2018/9389065
Begum M, Uddin MS (2020) Digital image watermarking techniques: A review. Information 11. https://doi.org/10.3390/info11020110
Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A. Image steganography: A review of the recent advances. IEEE Access 9:23409–23423. https://doi.org/10.1109/ACCESS.2021.3053998
BozdumanHÇGAfacanESimulation of a homomorphic encryption systemAppl Math Nonlinear Sci20205479484409546410.2478/AMNS.2020.1.00046
IdreesBZafarSRashidTGaoWImage encryption algorithm using s-box and dynamic hénon bit level permutationMultimed Tools Appl2020796135616210.1007/s11042-019-08282-w
El-BorhamyMMosalamNOn the existence of periodic solution and the transition to chaos of Rayleigh-Duffing equation with application of gyro dynamicAppl Math Nonlinear Sci2020593108408022410.2478/amns.2020.1.00010
Webster A, Tavares SE (1985) On the design of S-boxes. In: Proceedings of the conference on the theory and application of cryptographic techniques. pp. 523–534
GünerhanHÇelikEAnalytical and approximate solutions of fractional partial differential-algebraic equationsAppl Math Nonlinear Sci20205109120409291010.2478/amns.2020.1.00011
Wu W-l, Feng D-g, ZhangW-t (2009) Design and analysis of block cipher
FarhanAKAliRSYasseinHRAl-SaidiNMGAbdul-MajeedGHA new approach to generate multi S-boxes based on RNA computingInt J Innov Comput Inf Control20201633134810.24507/ijicic.16.01.331
KhanMShahTGondalMAAn efficient technique for the construction of substitution box with chaotic partial differential equationNonlinear Dyn20137317951801308382110.1007/s11071-013-0904-x
AzamNAHayatUUllahIEfficient construction of a substitution box based on a Mordell elliptic curve over a finite fieldFront Inf Technol Electron Eng2019201378138910.1631/FITEE.1800434
ZahidAHArshadMJAn innovative design of substitution-boxes using cubic polynomial mappingSymmerty20191143710.3390/sym11030437
ArshadBSiddiquiNHussainZEhatisham-ul-HaqMA novel scheme for designing secure substitution boxes (S-boxes) based on Mobius group and finite fieldWireless Pers Commun20221243527354810.1007/s11277-022-09524-1
Wilson RA (2009) The classical groups. In: Axler S, Ribet KA (eds) The finite simple groups. Springer-Verlag
T Shah (17763_CR25) 2013; 68
E Biham (17763_CR55) 1991; 4
17763_CR52
Ö Akgandüller (17763_CR47) 2020; 5
17763_CR51
17763_CR53
17763_CR49
17763_CR45
I Shahzad (17763_CR17) 2019; 2019
N Siddiqui (17763_CR31) 2020; 15
17763_CR44
HA Ahmed (17763_CR41) 2019; 31
UA Bhatti (17763_CR3) 2020; 8
H Günerhan (17763_CR24) 2020; 5
HÇG Bozduman (17763_CR6) 2020; 5
17763_CR1
17763_CR2
17763_CR8
Z Sun (17763_CR48) 2020; 5
F Horst (17763_CR50) 1973; 228
17763_CR56
17763_CR14
17763_CR58
S Jahangir (17763_CR29) 2020; 79
MA Yousaf (17763_CR57) 2020; 8
MAB Farah (17763_CR38) 2020; 79
B Arshad (17763_CR28) 2022; 124
J Pieprzyk (17763_CR54) 1998; 135
UA Bhatti (17763_CR4) 2021; 80
T Shah (17763_CR33) 2019; 78
AH Zahid (17763_CR12) 2019; 21
M Sever (17763_CR5) 2021; 6
NA Azam (17763_CR21) 2019; 20
T Shah (17763_CR26) 2017; 36
Y-H Qiu (17763_CR34) 2021; 6
17763_CR27
AK Farhan (17763_CR11) 2020; 16
AH Zahid (17763_CR18) 2019; 11
AA Alzaidi (17763_CR42) 2018
HS Alhadawi (17763_CR37) 2021; 80
MŞ Açikkapi (17763_CR23) 2019; 7
T Shah (17763_CR59) 2011; 6
AK Farhan (17763_CR13) 2019; 7
Y Wang (17763_CR39) 2012; 376
U Hayat (17763_CR20) 2018; 101
A Rafiq (17763_CR16) 2019; 78
A Razaq (17763_CR10) 2020; 116
SS Jamal (17763_CR15) 2019; 60
J Pieprzyk (17763_CR43) 1988; 135
A Razaq (17763_CR32) 2017
M El-Borhamy (17763_CR22) 2020; 5
B Idrees (17763_CR19) 2020; 79
P Parida (17763_CR7) 2021; 9
17763_CR36
17763_CR35
W Gao (17763_CR30) 2020; 8
C Shannon (17763_CR9) 1949; 28
A Razaq (17763_CR46) 2020; 111
M Khan (17763_CR40) 2013; 73
References_xml – reference: ZahidAHArshadMJAn innovative design of substitution-boxes using cubic polynomial mappingSymmerty20191143710.3390/sym11030437
– reference: AlzaidiAAAhmadMAhmedHSSolamiEASine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic mapComplexity201810.1155/2018/9389065
– reference: HayatUAzamNAAsifMA method of generating 8× 8 substitution boxes based on elliptic curvesWireless Pers Commun201810143945110.1007/s11277-018-5698-1
– reference: Begum M, Uddin MS (2020) Digital image watermarking techniques: A review. Information 11. https://doi.org/10.3390/info11020110
– reference: RazaqAYousafAShuaibUSiddiquiNUllahAWaheedAA novel construction of substitution box involving coset diagram and a bijective mapSecur Commun Netw201710.1155/2017/5101934
– reference: El-BorhamyMMosalamNOn the existence of periodic solution and the transition to chaos of Rayleigh-Duffing equation with application of gyro dynamicAppl Math Nonlinear Sci2020593108408022410.2478/amns.2020.1.00010
– reference: FarhanAKAliRSNatiqHAl-SaidiNMGA new S-box generation algorithm based on multistability behavior of a plasma perturbation modelIEEE Access2019712491412492410.1109/ACCESS.2019.2938513
– reference: Lambić D, Živković M (2013) Comparison of random s-box generation method. In: Publications de l’institut mathématique nouvelle série, tome, vol 93. pp. 109–115. https://doi.org/10.2298/PIM1307109L
– reference: YousafMAAlolaiyanHAhmadMDilbarMRazaqAComparison of pre and post-action of a finite abelian group over certain nonlinear schemesIEEE Access20208397813979210.1109/ACCESS.2020.2975880
– reference: PieprzykJFinkelsteinGTowards effective nonlinear cryptosystem designIEE Proc E - Comput Digit Tech199813532533510.1049/ip-e.1988.0044
– reference: Nyberg K (1991) Perfect nonlinear S-boxes. Berlin, Heidelberg, pp 378–3865
– reference: ShahzadIMushtaqQRazaqAConstruction of new s-box using action of quotient of the modular group for multimedia securityHindawi Secur Commun Netw201920191310.1155/2019/2847801
– reference: ShahTShahDConstruction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over ℤ2Multimed Tools Appl2019781219123410.1007/s11042-018-6250-8
– reference: Webster A, Tavares SE (1985) On the design of S-boxes. In: Proceedings of the conference on the theory and application of cryptographic techniques. pp. 523–534
– reference: Nardo LG, Nepomuceno EG, Bastos GT, Santos TA, Butusov DN, Arias-Garcia J (2021) A reliable chaos-based cryptography using Galois field. Chaos 31. https://doi.org/10.1063/5.0061639
– reference: ArshadBSiddiquiNHussainZEhatisham-ul-HaqMA novel scheme for designing secure substitution boxes (S-boxes) based on Mobius group and finite fieldWireless Pers Commun20221243527354810.1007/s11277-022-09524-1
– reference: FarahMABGuesmiRKachouriASametMA new design of cryptosystem based on S-box and chaotic permutationMultimed Tools Appl202079191291915010.1007/s11042-020-08718-8
– reference: AzamNAHayatUUllahIEfficient construction of a substitution box based on a Mordell elliptic curve over a finite fieldFront Inf Technol Electron Eng2019201378138910.1631/FITEE.1800434
– reference: RafiqAKhanMConstruction of new s-boxes based on triangle groups and its applications in copyright protectionMultimed Tools Appl201978155271554410.1007/s11042-018-6953-x
– reference: GünerhanHÇelikEAnalytical and approximate solutions of fractional partial differential-algebraic equationsAppl Math Nonlinear Sci20205109120409291010.2478/amns.2020.1.00011
– reference: ShahTJahangirSAndradeAADDesign of new 4×4 S-box from finite commutative chain ringsComput Appl Math201736843857364205710.1007/s40314-015-0265-9
– reference: ShahTQamarAHussainISubstitution box on maximal cyclic subgroup of units of a Galois ringZ Naturforsch A20136856757210.5560/zna.2013-0021
– reference: BozdumanHÇGAfacanESimulation of a homomorphic encryption systemAppl Math Nonlinear Sci20205479484409546410.2478/AMNS.2020.1.00046
– reference: Seberry J, Zhang X-M, Zheng Y (1993) Systematic generation of cryptographically robust s-boxes (extended abstract). In Proceedings of the 1st ACM Conference on Computer and Communications Security. pp. 171–182
– reference: RazaqAUllahAWaheedAA novel technique to improve nonlinearity of substitution box without disturbing its mathematical propertiesWireless Pers Commun20201112091210510.1007/s11277-019-06973-z
– reference: SunZNonlinear relationship based on range quadratic loss functionAppl Math Nonlinear Sci20205483492419169210.2478/amns.2020.2.00024
– reference: Shah T, Qureshi A (2019) S-box on subgroup of galois field. Cryptography 3. https://doi.org/10.3390/cryptography3020013
– reference: GaoWIdreesBZafarSRashidTConstruction of nonlinear component of block cipher by action of modular group PSL (2, Z) on projective line PL (GF (2 8))IEEE Access2020813673613674910.1109/ACCESS.2020.3010615
– reference: BihamEShamirADifferential cryptanalysis of DES-like cryptosystemsJ Cryptol19914372120278610.1007/BF00630563
– reference: ParidaPPradhanCGaoX-ZRoyDSBarikRKImage encryption and authentication with elliptic curve cryptography and multidimensional chaotic mapsIEEE Access20219761917620410.1109/ACCESS.2021.3072075
– reference: ShannonCCommunication theory of secrecy systemBell Syst Tech J1949286567153213310.1002/j.1538-7305.1949.tb00928.x
– reference: AhmedHAZolkipliMFAhmadMA novel efficient substitution-box design based on firefly algorithm and discrete chaotic mapNeural Comput Appl2019317201721010.1007/s00521-018-3557-3
– reference: PieprzykJFinkelsteinGTowards effective nonlinear cryptosystem designIEE Proc E - Comput Digit Tech198813532533510.1049/ip-e.1988.0044
– reference: SiddiquiNYousafFMurtazaFEhatisham-ul-HaqMAshrafMUAlghamdiAMAlfakeehASA highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite fieldPLos One202015e024189010.1371/journal.pone.0241890
– reference: FarhanAKAliRSYasseinHRAl-SaidiNMGAbdul-MajeedGHA new approach to generate multi S-boxes based on RNA computingInt J Innov Comput Inf Control20201633134810.24507/ijicic.16.01.331
– reference: AkgandüllerÖAtmacaSPDiscrete normal vector field approximation via time scale calculusAppl Math Nonlinear Sci20205349360409291510.2478/amns.2020.1.00033
– reference: BhattiUAYuZLiJNawazSAMehmoodAZhangKYuanLHybrid watermarking algorithm using clifford algebra with arnold scrambling and chaotic encryptionIEEE Access20208763867639810.1109/ACCESS.2020.2988298
– reference: ShahTHussainIGondalMAMahmoodHStatistical analysis of s-box in image encryption applications based on majority logic criterionInt J Phys Sci201164110412710.5897/IJPS11.531
– reference: Gallian JA (2017) Contemporary abstract algebra. Cengage Learning
– reference: AçikkapiMŞÖzkaynakFÖzerABSide-channel analysis of chaos-based substitution box structuresIEEE Access20197790307904310.1109/ACCESS.2019.2921708
– reference: SeverMÖzdemirASNTRU over Galois ringsAppl Math Nonlinear Sci20216499506428172610.2478/AMNS.2020.2.00041
– reference: IdreesBZafarSRashidTGaoWImage encryption algorithm using s-box and dynamic hénon bit level permutationMultimed Tools Appl2020796135616210.1007/s11042-019-08282-w
– reference: BhattiUAYuanLYuZLiJNawazSAMehmoodAZhangKNew watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryptionMultimed Tools Appl202180133671338710.1007/s11042-020-10257-1
– reference: Wilson RA (2009) The classical groups. In: Axler S, Ribet KA (eds) The finite simple groups. Springer-Verlag
– reference: WangYWongK-WLiCLiYA novel method to design S-box based on chaotic map and genetic algorithmPhys Lett A201237682783310.1016/j.physleta.2012.01.009
– reference: QiuY-HYangXLiZ-ZZhangCChenS-XInvestigating the impacts of artificial intelligence technology on technological innovation from a patent perspectiveAppl Math Nonlinear Sci2021612914010.2478/amns.2021.1.00015
– reference: Matsui M (1993) Linear cryptanalysis method for DES cipher. In: Proceedings of the workshop on the theory and application of of cryptographic techniques. pp 386–397
– reference: Meier W, Staffelbach O (1990) Nonlinearity criteria for cryptographic functions. Berlin, Heidelberg, pp. 549–562
– reference: Kam JB, Davida GI (1979) Structured design of substitution-permutation encryption networks. IEEE Trans Comput 747–753
– reference: AlhadawiHSMajidMALambićDAhmadMA novel method of S-box design based on discrete chaotic maps and cuckoo search algorithmMultimed Tools Appl2021807333735010.1007/s11042-020-10048-8
– reference: JamalSSAttaullahShahTAlKhaldiAHTufailMNConstruction of new substitution boxes using linear fractional transformation and enhanced chaosChin J Phys201960564572397951110.1016/j.cjph.2019.05.038
– reference: HorstFCryptography and computer privacySci Am1973228152310.1038/scientificamerican0573-15
– reference: RazaqAUllahAAlolaiyanHYousafAA novel group theoretic and graphical approach for designing cryptographically strong nonlinear components of block ciphersWireless Pers Commun20201163165319010.1007/s11277-020-07841-x
– reference: Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A. Image steganography: A review of the recent advances. IEEE Access 9:23409–23423. https://doi.org/10.1109/ACCESS.2021.3053998
– reference: Hussain I, Anees A, Al-Maadeed TA, Mustafa MT (2019) Construction of S-box based on chaotic map and algebraic structures. MDPI, Symmetry 11. https://doi.org/10.3390/sym11030351
– reference: JahangirSShahTDesigning S-boxes triplet over a finite chain ring and its application in RGB image encryptionMultimed Tools Appl202079268852691110.1007/s11042-020-08995-3
– reference: ZahidAHArshadMJAhmadMA novel construction of efficient substitution-boxes using cubic fractional transformationMDPI, Entropy201921245394322810.3390/e21030245
– reference: KhanMShahTGondalMAAn efficient technique for the construction of substitution box with chaotic partial differential equationNonlinear Dyn20137317951801308382110.1007/s11071-013-0904-x
– reference: Wu W-l, Feng D-g, ZhangW-t (2009) Design and analysis of block cipher
– volume: 6
  start-page: 129
  year: 2021
  ident: 17763_CR34
  publication-title: Appl Math Nonlinear Sci
  doi: 10.2478/amns.2021.1.00015
– ident: 17763_CR51
  doi: 10.1109/TC.1979.1675242
– volume: 135
  start-page: 325
  year: 1998
  ident: 17763_CR54
  publication-title: IEE Proc E - Comput Digit Tech
  doi: 10.1049/ip-e.1988.0044
– volume: 78
  start-page: 1219
  year: 2019
  ident: 17763_CR33
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-018-6250-8
– volume: 7
  start-page: 79030
  year: 2019
  ident: 17763_CR23
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2921708
– ident: 17763_CR44
  doi: 10.1007/3-540-46416-6_32
– ident: 17763_CR2
  doi: 10.1109/ACCESS.2021.3053998
– volume: 16
  start-page: 331
  year: 2020
  ident: 17763_CR11
  publication-title: Int J Innov Comput Inf Control
  doi: 10.24507/ijicic.16.01.331
– volume: 4
  start-page: 3
  year: 1991
  ident: 17763_CR55
  publication-title: J Cryptol
  doi: 10.1007/BF00630563
– volume: 5
  start-page: 109
  year: 2020
  ident: 17763_CR24
  publication-title: Appl Math Nonlinear Sci
  doi: 10.2478/amns.2020.1.00011
– volume: 68
  start-page: 567
  year: 2013
  ident: 17763_CR25
  publication-title: Z Naturforsch A
  doi: 10.5560/zna.2013-0021
– volume: 8
  start-page: 76386
  year: 2020
  ident: 17763_CR3
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2988298
– volume: 2019
  start-page: 13
  year: 2019
  ident: 17763_CR17
  publication-title: Hindawi Secur Commun Netw
  doi: 10.1155/2019/2847801
– volume: 21
  start-page: 245
  year: 2019
  ident: 17763_CR12
  publication-title: MDPI, Entropy
  doi: 10.3390/e21030245
– volume: 31
  start-page: 7201
  year: 2019
  ident: 17763_CR41
  publication-title: Neural Comput Appl
  doi: 10.1007/s00521-018-3557-3
– volume: 78
  start-page: 15527
  year: 2019
  ident: 17763_CR16
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-018-6953-x
– volume: 135
  start-page: 325
  year: 1988
  ident: 17763_CR43
  publication-title: IEE Proc E - Comput Digit Tech
  doi: 10.1049/ip-e.1988.0044
– volume: 6
  start-page: 4110
  year: 2011
  ident: 17763_CR59
  publication-title: Int J Phys Sci
  doi: 10.5897/IJPS11.531
– volume: 5
  start-page: 479
  year: 2020
  ident: 17763_CR6
  publication-title: Appl Math Nonlinear Sci
  doi: 10.2478/AMNS.2020.1.00046
– volume: 79
  start-page: 26885
  year: 2020
  ident: 17763_CR29
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-020-08995-3
– volume: 5
  start-page: 483
  year: 2020
  ident: 17763_CR48
  publication-title: Appl Math Nonlinear Sci
  doi: 10.2478/amns.2020.2.00024
– volume: 11
  start-page: 437
  year: 2019
  ident: 17763_CR18
  publication-title: Symmerty
  doi: 10.3390/sym11030437
– volume: 9
  start-page: 76191
  year: 2021
  ident: 17763_CR7
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3072075
– ident: 17763_CR52
  doi: 10.1007/3-540-39799-X_41
– ident: 17763_CR36
  doi: 10.1007/978-1-84800-988-2
– ident: 17763_CR58
  doi: 10.1007/3-540-48285-7_33
– year: 2018
  ident: 17763_CR42
  publication-title: Complexity
  doi: 10.1155/2018/9389065
– volume: 73
  start-page: 1795
  year: 2013
  ident: 17763_CR40
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-013-0904-x
– volume: 28
  start-page: 656
  year: 1949
  ident: 17763_CR9
  publication-title: Bell Syst Tech J
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– ident: 17763_CR45
  doi: 10.1007/3-540-46885-4_53
– volume: 228
  start-page: 15
  year: 1973
  ident: 17763_CR50
  publication-title: Sci Am
  doi: 10.1038/scientificamerican0573-15
– volume: 7
  start-page: 124914
  year: 2019
  ident: 17763_CR13
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2938513
– ident: 17763_CR56
  doi: 10.1145/168588.168610
– volume: 79
  start-page: 6135
  year: 2020
  ident: 17763_CR19
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-019-08282-w
– volume: 79
  start-page: 19129
  year: 2020
  ident: 17763_CR38
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-020-08718-8
– volume: 376
  start-page: 827
  year: 2012
  ident: 17763_CR39
  publication-title: Phys Lett A
  doi: 10.1016/j.physleta.2012.01.009
– volume: 6
  start-page: 499
  year: 2021
  ident: 17763_CR5
  publication-title: Appl Math Nonlinear Sci
  doi: 10.2478/AMNS.2020.2.00041
– volume: 124
  start-page: 3527
  year: 2022
  ident: 17763_CR28
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-022-09524-1
– volume: 116
  start-page: 3165
  year: 2020
  ident: 17763_CR10
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-020-07841-x
– volume: 20
  start-page: 1378
  year: 2019
  ident: 17763_CR21
  publication-title: Front Inf Technol Electron Eng
  doi: 10.1631/FITEE.1800434
– volume: 36
  start-page: 843
  year: 2017
  ident: 17763_CR26
  publication-title: Comput Appl Math
  doi: 10.1007/s40314-015-0265-9
– volume: 8
  start-page: 39781
  year: 2020
  ident: 17763_CR57
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2975880
– ident: 17763_CR35
– volume: 8
  start-page: 136736
  year: 2020
  ident: 17763_CR30
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3010615
– volume: 80
  start-page: 13367
  year: 2021
  ident: 17763_CR4
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-020-10257-1
– year: 2017
  ident: 17763_CR32
  publication-title: Secur Commun Netw
  doi: 10.1155/2017/5101934
– volume: 111
  start-page: 2091
  year: 2020
  ident: 17763_CR46
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-019-06973-z
– ident: 17763_CR49
– ident: 17763_CR53
  doi: 10.2298/PIM1307109L
– volume: 60
  start-page: 564
  year: 2019
  ident: 17763_CR15
  publication-title: Chin J Phys
  doi: 10.1016/j.cjph.2019.05.038
– volume: 80
  start-page: 7333
  year: 2021
  ident: 17763_CR37
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-020-10048-8
– volume: 5
  start-page: 349
  year: 2020
  ident: 17763_CR47
  publication-title: Appl Math Nonlinear Sci
  doi: 10.2478/amns.2020.1.00033
– ident: 17763_CR14
  doi: 10.3390/sym11030351
– volume: 101
  start-page: 439
  year: 2018
  ident: 17763_CR20
  publication-title: Wireless Pers Commun
  doi: 10.1007/s11277-018-5698-1
– volume: 5
  start-page: 93
  year: 2020
  ident: 17763_CR22
  publication-title: Appl Math Nonlinear Sci
  doi: 10.2478/amns.2020.1.00010
– ident: 17763_CR1
  doi: 10.3390/info11020110
– volume: 15
  start-page: e0241890
  year: 2020
  ident: 17763_CR31
  publication-title: PLos One
  doi: 10.1371/journal.pone.0241890
– ident: 17763_CR8
  doi: 10.1063/5.0061639
– ident: 17763_CR27
  doi: 10.3390/cryptography3020013
SSID ssj0016524
Score 2.3661146
Snippet In block encryption algorithms the only nonlinear component, which creates confusion and diffusion, is substitution box (S-Box). Therefore, carefully selection...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 56347
SubjectTerms Algebra
Algorithms
Computer Communication Networks
Computer Science
Construction
Cryptography
Data encryption
Data Structures and Information Theory
Diffusion barriers
Multimedia
Multimedia Information Systems
Nonlinearity
Polynomials
Special Purpose and Application-Based Systems
Substitutes
SummonAdditionalLinks – databaseName: SpringerLINK - Czech Republic Consortium
  dbid: AGYKE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB60XvTgW6xWycGDoluafWS7xyJ9oOjJgp6WJJtose5Ku4L1F_iznezD1aKClyUhyRKSmcw3ZOYLwJGyI6mpRidH29oyBF1WwH0s-VrpNvOcVmASnK-u2WDoXtx6t0VS2LSMdi-vJLOTukp2oyaVBG2MRX3UCmu2CEsZ31YNljr9u8vu5-0B82y3SJD5eeR3I1Qhy7nL0MzG9NZgWM4uDy15bL6koinf5ogb_zv9dVgtQCfp5FKyAQsq3oS18kEHUuj3Jqx8YSfcgvdOTPj4PpmM0ocnguCWyKTimyWJJlM8dbJQA1MXySsxNjEiWMGWLDbO9EIblIymJK_3e8c2ZSeExxGJZjF_GklikC6fED3JkyxwpukXOJ3E2zDsdW_OB1bxcIMlUaNTS7RtRGG8ZajqPen6bhQJ29foyynH5K4qGnmu36Jt7fhCMCdqKfRDXTxrAkcIyp0dqMVJrHaBeA5TzNOccabcQAohPRSuth0IgV_K60DLnQxlwWpuHtcYhxUfs1n4EBc-zBY-nNXh9HPMc87p8WfvRikgYaHf0xAdLQOuEB3W4azc76r597_t_a_7PizbiKLy2LQG1HCP1QGioFQcFkL_AbVfAJ4
  priority: 102
  providerName: Springer Nature
Title An algorithm for construction of substitution box based on subfield of galois field GF(216) and dynamic linear fractional transformation
URI https://link.springer.com/article/10.1007/s11042-023-17763-y
https://www.proquest.com/docview/3060078125
Volume 83
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 20241105
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1573-7721
  databaseCode: ADMLS
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1573-7721
  databaseCode: AFBBN
  dateStart: 19970101
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1573-7721
  dateEnd: 20241105
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1573-7721
  databaseCode: BENPR
  dateStart: 20240101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 20241105
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1573-7721
  databaseCode: 8FG
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016524
  issn: 1573-7721
  databaseCode: AGYKE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 1573-7721
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0016524
  issn: 1573-7721
  databaseCode: U2A
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3BbtQwEB21uxc4tFBALJSVDxxAEBE7iZMcENpFm61ArBBipXKK7NimldqkdPdA_6CfzUziNAWJXpJYdqwk4_E8xzNvAF5aYSrHHS5ynHABEXQFuUrxKnXWZTKJwpwCnL-s5NE6_nScHO_Aqo-FIbfKfk5sJ2rTVPSP_B1CWzJnaI8_XPwKKGsU7a72KTSUT61g3rcUY7swFsSMNYLxfLH6-u1mX0EmPs1tFgZoK7kPo-mC6TiFqqANC3iKWhdc_W2qBvz5z5Zpa4mKB7DnISSbdTJ_CDu2PoD9Pj0D89p6APdvcQ0-gutZzdTZT3yl7ck5Q6jKqmZgj2WNYxucQ1rHASrr5jcjC2cYFrCm9XSjVmhRmtMN68rL4pXg8jVTtWGmy23PCLeqS-Yuu5AJfNLtLXDc1I9hXSy-fzwKfBqGoEL93AY6E4ipVEjE80kVp7ExWqQOV2Y2okhUy00SpyHPXJRqLSMTWlxVxjhz5JHWXEVPYFQ3tX0KLImklYlTUkkb55XWVYJDJRO51njkagK8_-Jl5TnKKVXGWTmwK5OUSpRS2UqpvJrAm5t7LjqGjjtbH_aCLL22bsphbE3gbS_cofr_vT27u7fncE8gBuo8yw5hhDK1LxDDbPUUdrNiOYXxrJjPV3Re_vi8mPrhirVrMfsD717zBg
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtQwEB6V9gAcSikgFtriA0ggsIidxEkOFerfsqXtCqFW6i34Fyq1SdtdCfYNeCqejXHiNAWJ3nqJYjmxIs945pvY8w3AS8uNdsxhkOO4o56gixYyw7vMWZeLNI4Kn-B8MBajo-TTcXo8B7-7XBh_rLKziY2hNrX2_8jfI7T17gz98YfzC-qrRvnd1a6EhgylFcx6QzEWEjv27OwHhnCT9d1tlPcrzoc7h1sjGqoMUI3qN6Uq5wgZZOR51VOdZIkximcOAw8b-0RLy0yaZBHLXZwpJWITWQyaElwYRawUkzGOewcWkjgpMPhb2NwZf_5ytY8h0lBWN48o-mYW0nba5D3mU2PQZ1KW4Sqns79dY493_9mibTzfcAkWA2QlG62OPYQ5Wy3Dg64cBAnWYRnuX-M2fAS_NioiT7_hFE6_nxGExkTXPVstqR2ZoM1qDir4tqp_Eu9RDcEG9jQn6_xT6MHqkwlp2x-HrzkTb4isDDGzSp6daOJxsrwk7rJN0cAvnV4D43X1GI5uRSBPYL6qK_sUSBoLK1InhRQ2KbRSOkXVzHmhFF6ZHADrZrzUgRPdl-Y4LXs2Zy-lEqVUNlIqZwN4e_XOecsIcuPTK50gy2AdJmWvywN41wm37_7_aM9uHu0F3B0dHuyX-7vjvedwjyP-ak-1rcA8yteuIn6aqrWgpAS-3va6-AM95ih0
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9VAFD5BTIwufKDGq6Cz0ESjEzrTdtouCCFiAVHiQhJ2ZZ5KAi1yb6L3H_ib_HWc0wdFE9mxaTqZdtLMeX2ncx4AL710NoiATk6QgVOBLl7oDO-y4EOu0jgqKMH5857a3k8-HqQHC_BnyIWhsMpBJ7aK2jWW_pGvIrQlc4b2eDX0YRFfNsv10x-cOkjRSevQTqNjkV0__4nu23RtZxNp_UrK8sPX99u87zDALbLejJtcIlzQEdVUT22SJc4ZmQV0OnxMSZZeuDTJIpGHODNGxS7y6DAlKBRFbIzQMa57A25mVMWdstTLrYsTDJX2DXXziKNVFn3CTpe2JygpBq0lFxnKN5__bRRHpPvP4Wxr88r7cLcHq2yj464HsODrJbg3NIJgvV5YgjuXqho-hN8bNdPH33DDZt9PGIJiZpuxTi1rApuitmpDFGhsml-MbKljOMCZNqaOnkLb1RxNWTfeKl9Lod4wXTvm5rU-ObKMELI-Y-GsS87AL51dguFN_Qj2r4Ucj2Gxbmr_BFgaK6_SoJVWPimsMTZFpsxlYQxehZ6AGHa8sn01dGrKcVyNdZyJShVSqWqpVM0n8PbindOuFsiVTy8PhKx6vTCtRi6ewLuBuOP0_1d7evVqL-AWSkP1aWdv9xnclgi8unC2ZVhE8voVBE4z87zlUAaH1y0S5wzFJg4
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+algorithm+for+construction+of+substitution+box+based+on+subfield+of+galois+field+%24%24GF%28%7B2%7D%5E%7B16%7D%29%24%24+and+dynamic+linear+fractional+transformation&rft.jtitle=Multimedia+tools+and+applications&rft.au=Zafar%2C+Sohail&rft.au=Idrees%2C+Bazgha&rft.au=Rashid%2C+Tabasam&rft.date=2024-06-01&rft.issn=1573-7721&rft.eissn=1573-7721&rft.volume=83&rft.issue=19&rft.spage=56347&rft.epage=56368&rft_id=info:doi/10.1007%2Fs11042-023-17763-y&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11042_023_17763_y
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1573-7721&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1573-7721&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1573-7721&client=summon