Revolutionizing Cryptography: A Cutting-Edge Substitution Box Design Through Trigonometric Transformation
Awais Ahmed Qarni ()
Additional contact information
Awais Ahmed Qarni: School of Systems and Technology, University of the Management and Technology, Lahore, Pakistan
International Journal of Innovations in Science & Technology, 2023, vol. 5, issue 4, 730-745
Abstract:
This paper proposes an innovative approach to enhance the robustness of substitution boxes in cryptography by employing chaotic mapping. Our methodology leverages chaotic mapping to construct a robust 8 × 8 S-box that adheres to the requirements of a bijective function. An illustrative example of such an S-box is presented, accompanied by a comprehensive analysis employing established metrics such as nonlinearity, bijection, bit independence, strict avalanche effect, linear approximation probability, and differential uniformity. To evaluate its strength, we benchmark the performance of our proposed S-box against recently investigated counterparts. Our findings reveal that our approach to S-box construction is both pioneering and efficacious in fortifying substitution boxes for cryptography. Given the escalating frequency of cyber threats and hacking incidents, safeguarding online communication and personal information has become increasingly challenging. Cryptography plays a pivotal role in addressing these challenges by transforming data into a more secure format. In this research, we introduce a novel, lightweight algorithm grounded in trigonometric principles, which significantly enhances security and reducessusceptibility to hacking attempts. Comparative evaluations demonstrate the superior performance of our algorithm over established methods such as the Hill cipher, Blowfish, and DES. While conventional approaches prioritize security, they often incur delays due to increased computational load. Our objective is to expedite cryptographic processes without compromising security, achieved through the strategic application of trigonometric principles. Our algorithm capitalizes on trigonometric functions and operations to introduce confusion, thereby thwarting hacking attempts. Extensive research and testing substantiate that our algorithm excels in both security and speed compared to traditional methods. By seamlessly integrating trigonometric concepts into a streamlined design, our algorithm proves to be practical for real-world applications, offering a robust solution for safeguarding data on the Internet.
Keywords: Substitution-Box; Linear Trigonometric Transformation; Security; Cryptosystems (search for similar items in EconPapers)
Date: 2023
References: Add references at CitEc
Citations:
Downloads: (external link)
https://journal.50sea.com/index.php/IJIST/article/view/592/1183 (application/pdf)
https://journal.50sea.com/index.php/IJIST/article/view/592 (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:abq:ijist1:v:5:y:2023:i:4:p:730-745
Access Statistics for this article
International Journal of Innovations in Science & Technology is currently edited by Prof. Dr. Syed Amer Mahmood
More articles in International Journal of Innovations in Science & Technology from 50sea
Bibliographic data for series maintained by Iqra Nazeer ().