Department of Computer Science, Quaid-i-Azam University, Islamabad, Pakistan.
Department of Software Engineering, Foundation University Islamabad, Islamabad, Pakistan.
Comput Intell Neurosci. 2022 May 20;2022:8338508. doi: 10.1155/2022/8338508. eCollection 2022.
The protection of confidential information is a global issue, and block encryption algorithms are the most reliable option for securing data. The famous information theorist, Claude Shannon, has given two desirable characteristics that should exist in a strong cipher which are substitution and permutation in their fundamental research on "Communication Theory of Secrecy Systems." block ciphers strictly follow the substitution and permutation principle in an iterative manner to generate a ciphertext. The actual strength of the block ciphers against several attacks is entirely based on its substitution characteristic, which is gained by using the substitution box (S-box). In the current literature, algebraic structure-based and chaos-based techniques are highly used for the construction of S-boxes because both these techniques have favourable features for S-box construction but also various attacks of these techniques have been identified including SAT solver, linear and differential attacks, Gröbner-based attacks, XSL attacks, interpolation attacks, XL-based attacks, finite precision effect, chaotic systems degradation, predictability, weak randomness, chaotic discontinuity, and limited control parameters. The main objective of this research is to design a novel technique for the dynamic generation of S-boxes that are safe against the cryptanalysis techniques of algebraic structure-based and chaos-based approaches. True randomness has been universally recognized as the ideal method for cipher primitives design because true random numbers are unpredictable, irreversible, and unreproducible. The biggest challenge we faced during this research was how can we generate the true random numbers and how can true random numbers utilized for strengthening the S-box construction technique. The basic concept of the proposed technique is the extraction of true random bits from underwater acoustic waves and to design a novel technique for the dynamic generation of S-boxes using the chain of knight's tour. Rather than algebraic structure- and chaos-based techniques, our proposed technique depends on inevitable high-quality randomness which exists in underwater acoustics waves. The proposed method satisfies all standard evaluation tests of S-boxes construction and true random numbers generation. Two million bits have been analyzed using the NIST randomness test suite, and the results show that underwater sound waves are an impeccable entropy source for true randomness. Additionally, our dynamically generated S-boxes have better or equal strength, over the latest published S-boxes (2020 to 2021). According to our knowledge first time, this type of research has been conducted, in which natural randomness of underwater acoustic waves has been used for the construction of block cipher's substitution box.
保密信息的保护是一个全球性的问题,而分组加密算法是保护数据最可靠的选择。著名的信息理论家克劳德·香农(Claude Shannon)在其关于“保密系统通信理论”的基础研究中给出了两个理想的密码应该具备的特性:替代和置换。分组密码以迭代的方式严格遵循替代和置换原则,以生成密文。分组密码在抵御各种攻击时的实际强度完全取决于其替代特性,这是通过使用替代盒(S-box)获得的。在当前的文献中,基于代数结构和混沌的技术被广泛用于 S-box 的构建,因为这两种技术都具有构建 S-box 的有利特征,但也发现了针对这些技术的各种攻击,包括 SAT 求解器、线性和差分攻击、基于 Grobner 的攻击、XSL 攻击、插值攻击、基于 XL 的攻击、有限精度效应、混沌系统降级、可预测性、弱随机性、混沌不连续性和有限控制参数。本研究的主要目的是设计一种新的技术,用于动态生成针对基于代数结构和混沌的密码分析技术安全的 S-box。真随机性已被普遍认为是密码原语设计的理想方法,因为真随机数是不可预测的、不可逆的和不可复制的。我们在研究过程中面临的最大挑战是如何生成真随机数,以及如何利用真随机数来加强 S-box 构建技术。所提出技术的基本概念是从水下声波中提取真随机位,并使用骑士巡游链设计一种新的动态生成 S-box 的技术。与基于代数结构和混沌的技术不同,我们提出的技术依赖于水下声波中存在的不可避免的高质量随机性。所提出的方法满足 S-box 构建和真随机数生成的所有标准评估测试。使用 NIST 随机性测试套件对两百万位进行了分析,结果表明水下声音是一种完美的真随机数熵源。此外,我们动态生成的 S-box 的强度优于或等于最新发布的 S-box(2020 年至 2021 年)。据我们所知,这是第一次进行这种类型的研究,其中利用水下声波的自然随机性来构建分组密码的替代盒。