Title: Generation of 8 × 8 S-boxes using 4 × 4 optimal S-boxes

Authors: Vikas Tiwari; Ajeet Singh; Appala Naidu Tentu; Ashutosh Saxena

Addresses: C.R. Rao Advanced Institute of Mathematics, Statistics, and Computer Science, University of Hyderabad Campus, Prof. C.R. Rao Road, Hyderabad – 500046, Telangana, India; Acharya Nagarjuna University, Nagarjuna Nagar, Guntur – 522510, Andhra Pradesh, India ' C.R. Rao Advanced Institute of Mathematics, Statistics, and Computer Science, University of Hyderabad Campus, Prof. C.R. Rao Road, Hyderabad – 500046, Telangana, India; Acharya Nagarjuna University, Nagarjuna Nagar, Guntur – 522510, Andhra Pradesh, India ' C.R. Rao Advanced Institute of Mathematics, Statistics, and Computer Science, University of Hyderabad Campus, Hyderabad – 500046, India ' C.R. Rao Advanced Institute of Mathematics, Statistics, and Computer Science, University of Hyderabad Campus, Hyderabad – 500046, India; CMR Technical Campus, Kandlakoya, Medchal Rd, Hyderabad, Telangana – 501401, India

Abstract: Substitution boxes (S-boxes) have a very important role in the recent developments of block ciphers as it provides the nonlinearity for the ciphers. To resist different kinds of attacks, S-boxes must be constructed very cautiously. There are some schemes which are known to design S-boxes, interestingly these are based on evolutionary heuristics. In this paper, we have proposed a new approach for the construction of 8 × 8 S-boxes from the existing 4 × 4 S-boxes. We have used these 4 × 4 S-boxes in the design because of their good cryptographic properties. Evaluation of the proposed S-boxes properties is done by the SET Tool fa toolbox for S-box analysisg (Picek et al., 2014) and compared them with the S-boxes of mCrypton, Twofish, Kalynapi1, MD and Safer ciphers. The results show that the S-box generated by our approach has good cryptographic properties and these S-boxes can be used as one primitive for data encryption.

Keywords: substitution-box; nonlinearity; strict avalanche criterion; differential approximation; linear approximation.

DOI: 10.1504/IJICS.2023.128831

International Journal of Information and Computer Security, 2023 Vol.20 No.3/4, pp.399 - 413

Received: 13 May 2021
Accepted: 23 Aug 2021

Published online: 07 Feb 2023 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article