TSP Iasc 22743
TSP Iasc 22743
DOI:10.32604/iasc.2022.022743
Article
Department of Information Technology, Sri Venkateswara College of Engineering, Sriperumbudur, 602117, India
*Corresponding Author: A. Indumathi Email: [email protected]
Received: 17 August 2021; Accepted: 28 September 2021
Abstract: As cloud storage systems have developed and been applied in complex
environments, their data security has become more prevalent in recent years. The
issue has been approached through many models. Data is encrypted and stored in
these models. One of the most widely used encryption methods is the Advanced
Encryption Standard (AES). In AES, the Substitution box(S-box) is playing a sig-
nificant part in imparting the job of confusion. The security of the entire crypto-
system depends on its nonlinearity. In this work, a robust and secure S-box is
constructed using a novel method, i.e., fingerprint features-based permutation
function. Two stages are considered to construct a strong S-box. Firstly, random
numbers are generated from the fingerprint features such as bifurcation and ridge
endings of the user transmitting data. Subsequently, the permutation function is
adapted on the random numbers (developed in the first stage) to augment the
strength of the S-box. National Institute of Standards and Technology (NIST)
STS 800-22 test suite is considered to evaluate the randomness of the enhanced
fingerprint-based S-box. Also, the robustness of the constructed S-box is tested
using cryptographical properties, namely Strict Avalanche Criterion (SAC),
Nonlinearity (NL), Differential Approximation (DA) probability and output Bits
Independence Criterion (BIC). Later, the cryptographical properties of the pro-
posed S-box are compared with several existing S-boxes. After analyzing the
characteristics of the proposed scheme, it is revealed that the newly constructed
S-box is powerful, robust, and safe against linear and differential assaults.
1 Introduction
A new trend in the computer field is cloud computing, which is used as a method of storing data. The
physical storage device makes it impossible to store huge amounts of confidential or sensitive information.
Therefore, cloud computing comes into play for storing the data in accordance with their needs. As long as
the data is stored in the cloud, it is easily accessible to all, and maintaining its confidentiality is not possible.
To protect the data from unauthorized user, encrypted data can be stored into the cloud. Encryption is the
process which converts the plain text into an unreadable form. It has two significant types of encryption
techniques which are symmetric cryptosystem, asymmetric cryptosystem. Symmetric cryptosystem uses a
This work is licensed under a Creative Commons Attribution 4.0 International License, which
permits unrestricted use, distribution, and reproduction in any medium, provided the original
work is properly cited.
1510 IASC, 2022, vol.32, no.3
single key for both encryption and decryption. Stream cipher and Block cipher are the two categories of the
Symmetric cryptosystem. Block cipher encrypts a block of plaintext at a time and uses confusion, diffusion
process. It is hard for reverse encryption. On the other hand, stream cipher encrypts a plaintext byte-by-byte
or bit-by-bit. It is dependent only on confusion, and also reversing the encrypted text is easy. Merely, a block
cipher is more efficient than a stream cipher encryption algorithm. Substitution-Permutation and Feistel
cipher are the two categories of block cipher encryption.
Many new cryptographic techniques are evolving recently, notably quantum computing and post-
quantum cryptography. Post-quantum cryptography is a method to establish a new cryptosystem that
offers better security against classical and quantum computers. NIST has recommended the AES
256 block cipher encryption algorithm as quantum-resistant, and it is one of the widely used block cipher
encryption algorithms. AES converts the plaintext into ciphertext with a different number of round of
operations. The number of rounds depends on the key length. Each round consists of set of operations
that use a different key which includes Substitution and permutation operations. These are the essential
function in AES which provides confusion and diffusion by using S-box and P-box respectively.
Diffusion is the property that conceals the bond between the plaintext and ciphertext, accomplished
through transposition function. P-Box (Permutation box) is responsible for diffusion operation. Confusion
is the sole nonlinear component of S-box. It hides the relationship between the ciphertext and the key. S-
box provides confusion by replacing one set of bits with another set of bits. Therefore, it is cumbersome
for the attacker to find the key from the ciphertext. The complexity of the confusion process depends
upon the robustness of an S-box. As the AES uses a static S-box in each round, it allows the attacker to
cryptanalyze the ciphertext that is produced by the block cipher. In order to overcome this limitations,
various methods have been suggested by the researchers for constructing S-box. Namely, Chaotic
systems, affine transformation, Algebraic operations, Heuristic methods and etc. In this paper, A novel
method is presented to get the robust S-box using fingerprint features. The robustness and the strength of
the S-box is examined by the standard cryptographical properties needs to be examined to define the
strength and robustness of an S-box. An intense literature study is carried out and described in the below
section considering these needs.
bijective S-boxes. They claimed that the proposed method has better cryptographic properties. Hussain et al.
Constructed nonlinear S-boxes using Symmetric group, Mobius transformation, and Chaotic logistic map
[12]. It had the potential to generate a high resistant S-box. In [13], authors used Cascaded quantum-
inspired quantum walks and chaos inducement for generating S-box. Özkaynak et al. [14] constructed an
S-box by employing FO chaotic Chen system and predictor-corrector scheme. But it failed to satisfy the
bijectivity property. Khan et al. [15] proposed Gingerbreadman chaotic map and S8 permutation to build
an efficient S-box. It was efficient for secure communications. Khan et al. [16] constructed an S-box from
the binary chaotic sequences. They considered algebraic degree, Balancedness, Algebraic immunity,
Correlation immunity to find the strength of the S-box. They didn’t evaluate some of the S-box properties
like nonlinearity, differential uniformity, and SAC. Random numbers were generated from the fingerprint
[17]. Dwivedi et al. [18] used the fingerprint of the sender and receiver to generate a symmetric key
along with the Diffie-Hellman algorithm
1.3 Objectives
Based on the perceived research gaps, this work targets the following objectives:
To construct the initial S-box using biometric features of the user like ridges and bifurcations
To adapt Zigzag transformation-based permutation function on initial S-box for optimal S-box design.
To investigate the randomness of the fingerprint-based S-box using NIST SP 800-22 data.
To analyze the cryptographical properties of the proposed scheme using the online tool ‘S-box
analyzer’ [21].
To design a robust S-box for effective security systems compared with existing methods.
The rest of the article is structured as follows: Section 2 represents the proposed method and its design
factors such as image acquisition, preprocessing, and permutation; Section 3 describes the analysis features
of constructed S-box using various characteristics; Section 4 demonstrates a detailed comparative study
1512 IASC, 2022, vol.32, no.3
considering the previous works; Section 5 concludes the article based on the observed outcome from the
proposed scheme.
Figure 1: (a) Original Image from Scanner (b) Binarized Image (c) Thinned Image (d) Minutiae Extraction
IASC, 2022, vol.32, no.3 1513
2.1.2 Preprocessing
It plays a principal role in enhancing the quality of the acquired image. It helps to extract required
features with high accuracy from the fingerprint image using the defined functions such as binarization
and thinning.
i. Binarization: It is the process of transforming the acquired image into black and white (0’s and 1’s)
through thresholding, as illustrated in Fig. 1b. The term thresholding is a technique of image
segmentation that extracts the foreground image from the background image by comparing every pixel
value of an image Iðv; cÞ with the threshold value ðT Þ. If the pixel value is larger than the threshold
value, it changed to white; otherwise, it maintains a black image as given in Eq. (1).
1; 8Iðv; cÞ T;
gðv; cÞ ¼ (1)
0; 8ðv; cÞ T :
ii. Thinning: It is a morphological operation and is performed number of times until the image no longer
changes, intending to remove imperfections from the binary image. As an outcome, the skeleton of the image
with a single-pixel wide is obtained and given in Fig. 1c.
iii. Feature Extraction (FE): The last step of preprocessing is called feature extraction (FE). There are
two types of FE, namely local and global features. In this work, local features are considered ridge
endings and ridge bifurcations. It reduces the dimension of an image to extract precise and essential
components from an image. Minutiae points (Mp) are extracted from the thinned image (Fig. 1d) as
denoted in Eq. (2). Blue color specifies ridge ending, and red color indicates ridge bifurcations. This
minutiae point is the most distinguishing feature among the people.
g
Mp ¼ Mp ðvi ; ci Þ i¼1 (2)
where g denotes the extracted number of features from the fingerprint; v; c are the coordinates of the feature.
We constructed the initial S-box from two different fingerprints by performing an XOR operation
between coordinates of the fingerprint features, and the respective consequence is illustrated in Tabs. 1
and 2. To use the S-box for encryption and decryption, it should satisfy the NIST randomness test and
cryptographic properties. We use the NIST randomness assessment to evaluate the randomness of S-box
values that endorse this process. The observed results show that the elements of the initial S-box are
highly random. “S-box analyzer tool” [21] is used to evaluate the performance of the initial S-box. As a
result, the initial S-box had 106 as maximum nonlinearity and 16 as differential uniformity. Although the
range of attained nonlinearity value is optimal, differential uniformity needs to be reduced to improve the
S-box strength. Therefore, the Zigzag transformation-based permutation function is applied to the initial
S-box to enrich the S-box nonlinearity and decrease the differential uniformity.
starting position and the ending position respectively. The authors of [22,23] used the MZT approach for image
encryption. We use the recursive SZT permutation operation to improve the nonlinearity of the initial S-box.
The flowchart of the complete process is given in Fig. 3 and the pseudocode is presented in Tab. 3. The
enhanced fingerprint-based S-box (FSB) is illustrated in Tabs. 4 and 5.
0.5178
106 104.5 104.7 0.52
103.5 0.51 0.5037 0.5039
104 102.5 102.5 0.5034 0.498 0.49580.4982
0.5
102
100 0.49 0.4812
100 0.48
98 0.47
96 0.46
(c) (d)
BIC-SAC BIC-NL
0.504 0.5021 106 105.29
0.502 0.5013 0.5008
105 104.64 104.43
0.5 0.497 0.4978 103.93
0.498 0.4966 104 103.5
0.496 0.4942 103 103.1 102.64
0.494 0.4926 101.93
0.492 102
0.49 101
0.488
0.486 100
(e) DU
60 54
40
12 12 14 16
20 10 10 10
0
QWSB AT SCS CDTQW FCCS GBCM BCS Proposed
FSB
Figure 3: (a) Nonlinearity (b) SAC (c) BIC-SAC (d) BIC-NL (e) Differential Uniformity
1. The S-box elements are converted into binary sequences and concatenated together to form 2048 bits
and its randomness is verified. It is perceived that the enhanced fingerprint-based S-box satisfies
thirteen tests out of 15 tests. It fails to satisfy the approximate entropy test and universal statistical
test because it requires a long sequence.
2. We have analyzed the randomness of Enhanced fingerprint-based S-box of User-1 from the obtained
ciphertext by employing the proposed S-box in AES encryption [25]. We have generated Ciphertext
of length 13028 bits and used it for randomness analysis. The numerical values of NIST tests are
presented in Tab. 6 and compared with the related works. It reveals a success status for thirteen
tests by considering 2048 bits as a sequence and fourteen tests for 13028 bits.
IASC, 2022, vol.32, no.3 1517
Table 6: NIST test numerical values of the enhanced Fingerprint-based S-box of Uer-1
NIST statistical test/ Ref. [17] Ref. [9] Ref. [24] Ref. [25] Proposed
Sequence length
10,00,000 bits 2048 bits 10000 bits 100 bits 2048 bits 13028 bits
Frequency test 0.304126 1.000000 0.080519 0.580000 1.000000 0.362211
Block frequency test 0.739918 0.102530 0.494392 – 0.149349 0.459487
Run test 0.334538 0.658531 0.102526 0.500000 0.626870 0.980216
Longest run of ones in a block 0.534146 1.000000 0.678686 1.000000 0.999999 0.340905
Binary matrix rank test 0.637119 0.481248 0.69372 – 0.085200 0.858362
Discrete Fourier Transform test 0.759756 0.208675 0.121488 – 0.570187 0.407615
Non-Overlapping Template Test 0.145326 0.844144 – 0.128475 0.560620
Overlapping Template Matching 0.213309 0.282761 – 0.488415 0.475823
Test
Linear Complexity test 0.202268 0.481431 0.918243 – 0.868443 0.206109
Serial Test 1 0.739918 0.645337 0.00513 – 0.600084 0.900023
Serial Test 2 0.955835 – 0.324382 0.817120
Cumulative Sums test – Forward 0.867692 0.984155 0.664283 0.580000 0.223219 0.459428
Cumulative Sums test – 0.223219 0.598593
Backward
Random Excursion Test X = 1 0.110952 NA – 0.589884 0.247998
Random Excursion Variant 0.468595 NA – 0.917850 0.737315
Test X = 1
Approximate Entropy Test 0.334538 0.024931 0.991535 – NA 0.356464
Universal Statistical Test – NA – NA NA
3.2.1 Bijective
Commonly, the S-box is bijective when the observed output values of the proposed S-box fall between
the defined interval. Also, a Boolean function f : v ! c denotes a bijective when there is a unique mapping
between two sets. At this juncture, v; c are the two sets, namely input, and output sets, and mathematically
modeled as follows:
X n
hw ai fi ¼ 2n1 ; (3)
i¼1
The term ‘hw’ represents a hamming weight; ai2 f0; 1g; ai 6¼ 0 (1≤ i ≥ n). The proposed S-box has a
distinct elements framework that satisfies the bijective property.
1520 IASC, 2022, vol.32, no.3
3.2.2 Nonlinearity
Pieprzyk and Finkelstein introduced the nonlinearity model. It is the first and foremost requirement of
the S-box. To realize the higher nonlinearity, the elements of the S-box should be highly random. The optimal
value of nonlinearity of the Boolean function is defined as follows:
NLðf Þ ¼ 2g1 2g2 ; (4)
Further, Boolean function nonlinearity is described using the below equation.
NLðf Þ ¼ 2g1 ð1 2g max n sðf Þ ðwÞÞ (5)
w2GFð2 Þ
Notably, the Walsh spectrum is used to compute the nonlinearity of the Boolean expression as described
below.
X
sf ðwÞ ¼ w2GFð2n Þ
ð1Þf ðvÞv:w (6)
For symmetric Boolean functions, the nonlinearity of S-box should lie between 100 and 120. If the
experimental values violate the said band, it is susceptible to cryptanalysis. However, the proposed
scheme offers the best value of about 108 as maximum nonlinearity and average nonlinearity of 106
(Tab. 7), which ensures the robustness of the newly constructed S-box.
1X 1
sðf Þ ¼ 2 sum1jg Pi;j ðf Þ
(7)
g 1ig 2
The above tables show that the value of BIC-nonlinearity and BIC-SAC are within the acceptable range.
It ensures the robustness of the proposed S-box further.
#fv 2 Zjf ðvÞ f ðv DvÞ ¼ Dcg
DPf ¼ max (8)
Dv6¼0;Dc 2g
where Z is a collection of all possible input values; 2g is the count of elements; Δχ and Δυ are input and output
differences respectively. The analysis shows that the differential uniformity of the proposed S-box is 10,
which shows the S-box’s resistivity against the differential attacks.
It is perceived that the maximum nonlinearity of Fingerprint-based initial S-box-1 of user-1 was
106 initially, and then it is improved to 108 after permutation. Further, the average value of SAC value of
the proposed scheme offered the best deal, about 0.5039. It shows that the proposed system satisfies the
strict avalanche criterion. S-box quality is depending on the smaller value of differential uniformity. The
differential uniformity of the enhanced FSB is 10, which is lesser than the other methodologies. The
cryptographic criterions of S-box (NL, SAC, DU, BIC-SAC, BIC-NL) is compared with other S-boxes
and illustrated in Tab. 11.
5 Conclusions
An effective S-box is constructed using fingerprint pattern and permutation function in this work. Initially,
S-box is built from X-Y coordinates of the user’s extracted fingerprint features (ridges, bifurcation).
Subsequently, Recursive Zigzag transformation-based permutation function is carried out on the initial
IASC, 2022, vol.32, no.3 1523
S-box to boost the overall characteristics. Further, a randomness test and cryptographic efficiency are performed
to check S-box’s strength. From the observed results, the following conclusions are made:
The maximum range of nonlinearity is obtained from the proposed S-box of about 108 and the 106 as
average nonlinearity.
SAC shows a significant scale of about 0.5039, closer to the required band (0.5).
BIC-NL and BIC-SAC offer the best value, about 104.43 and 0.5008, respectively.
The rate of DU also superior for the proposed scheme compared with existing methods.
The statistical results reveal that the proposed scheme satisfies all the cryptographic properties, and
therefore the proposed S-box is strong enough against linear and differential attacks. An optimization
model can be incorporated with this scheme for further enhancement in the future.
Funding Statement: The authors received no specific funding for this study.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding this study.
References
[1] S. S. Jamal, A. Anees, M. Ahmad, M. F. Khan and I. Hussain, “Construction of cryptographic S-boxes based on
Mobius transformation and Chaotic Tent-Sine System,” IEEE Access, vol. 7, pp. 173273–173285, 2019.
[2] X. Wang and Q. Wang, “A novel image encryption algorithm based on dynamic S-boxes constructed by chaos,”
Nonlinear Dynamics, vol. 75, no. 3, pp. 567–576, 2014.
[3] I. Hussain, T. Shah, H. Mahmood and M. A. Gondal, “Construction of S8 Liu J S-boxes and their applications,”
Computers & Mathematics with Applications, vol. 64, no. 8, pp. 2450–2458, 2012.
[4] J. Liu, B. Wei, W. Cheng and X. Wang, “An AES S-box to increase complexity and cryptographic analysis,”
in 19th Int. Conf. on Advanced Information Networking and Applications (AINA’05), Taipei, Taiwan, vol. 1,
pp. 724–728, 2005.
[5] A. Ahmed, A. EL-Latif, B. Abd-El-Atty and S. E. Venegas-Andraca, “A novel image steganography technique
based on quantum substitution boxes,” Optics & Laser Technology, vol. 116, no. 3, pp. 92–102, 2019.
[6] M. S. M. Malik, M. A. Ali, M. A. Khan, M. Ehatisham-ul-haq, S. N. M. Shah et al., “Generation of highly
nonlinear and dynamic AES Substitution-Boxes (S-boxes) using Chaos-based rotational matrices,” IEEE
Access, vol. 8, pp. 35682–35695, 2020.
[7] Y. Tian and Z. Lu, “S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm,”
Journal of Systems Engineering and Electronics, vol. 27, no. 1, pp. 232–241, 2016.
[8] Attaullah, S. S. Jamal and T. Shah, “A novel algebraic technique for the construction of strong substitution box,”
Wireless Personal Communications, vol. 99, no. 1, pp. 213–226, 2018.
[9] L. Liu, Y. Zhang and X. Wang, “A novel method for constructing the S-box based on Spatiotemporal Chaotic
Dynamics,” Applied Sciences, vol. 8, no. 12, pp. 2650, 2018.
[10] N. Siddiqui, F. Yousaf, F. Murtaza, M. Ehatisham-ul-Haq, M. U. Ashraf et al., “A highly nonlinear substitution-
box (S-box) design using action of modular group on a projective line over a finite field,” PLOS ONE, vol. 15,
no. 11, pp. e0241890, 2020.
[11] L. Shuai, L. Wang and L. Miao, “Constructing Chaos based substitution boxes using the composition of
transpositions,” Wireless Personal Communications, vol. 115, no. 3, pp. 1881–1897, 2020.
[12] I. Hussain, A. Anees, T. A. Al-Maadeed and M. T. Mustafa, “Construction of S-box based on Chaotic map and
algebraic structures,” Symmetry, vol. 11, no. 3, pp. 351, 2019.
[13] A. A. Abd El-Latif, B. Abd-El-Atty, M. Amin and A. M. Iliyasu, “Quantum-inspired cascaded discrete-time
quantum walks with induced chaotic dynamics and cryptographic applications,” Scientific Reports, vol. 10,
no. 1, pp. 2322, 2020.
1524 IASC, 2022, vol.32, no.3
[14] F. Özkaynak, V. Çelik and A. B. Özer, “A new S-box construction method based on the fractional-order chaotic
Chen system,” Signal, Image and Video Processing, vol. 11, no. 4, pp. 659–664, 2017.
[15] M. Khan and Z. Asghar, “A novel construction of substitution box for image encryption applications with
Gingerbreadman chaotic map and S8 permutation,” Neural Computing and Applications, vol. 29, no. 4,
pp. 993–999, 2018.
[16] M. Khan, T. Shah and S. I. Batool, “Construction of S-box based on chaotic Boolean functions and its application
in image encryption,” Neural Computing and Applications, vol. 27, no. 3, pp. 677–685, 2016.
[17] L. Ying, W. Shu, Y. Jing and L. Xiao, “Design of a random number generator from fingerprint,” in Int. Conf. on
Computational and Information Sciences, Chengdu, China, pp. 278–280, 2010.
[18] R. Dwivedi, S. Dey and M. A. Sharma, “A fingerprint based crypto-biometric system for secure communication,”
Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 4, pp. 1495–1509, 2020.
[19] O. Şengel, M. A. Aydın and A. Sertbaş, “An efficient generation and security analysis of substitution box using
Fingerprint patterns,” IEEE Access, vol. 8, pp. 160158–160176, 2020.
[20] F. Artuğer and F. Özkaynak, “A novel method for performance improvement of Chaos-based substitution boxes,”
Symmetry, vol. 12, no. 4, pp. 571, 2020.
[21] A. Özkaynak, “An analysis and generation toolbox for chaotic substitution boxes: A case study based on Chaotic
Labyrinth Rene Thomas System,” Iranian Journal of Science and Technology, Transactions of Electrical
Engineering, vol. 44, no. 1, pp. 89–98, 2020.
[22] P. Ramasamy, V. Ranganathan, S. Kadry, R. Damaševičius and T. Blažauskas, “An image encryption scheme
based on block scrambling, modified Zigzag transformation and Key generation using enhanced Logistic—
Tent Map,” Entropy, vol. 21, no. 7, pp. 656, 2019.
[23] X. Wang and H. Sun, “A chaotic image encryption algorithm based on zigzag-like transform and DNA-like
coding,” Multimedia Tools and Applications, vol. 78, no. 24, pp. 34981–34997, 2019.
[24] Z. Jiang and Q. Ding, “Construction of an S-box based on chaotic and bent functions,” Symmetry, vol. 13, no. 4,
pp. 671, 2021.
[25] D. G. Brosas, A. M. Sison, A. A. Hernandez and R. P. Medina, “Analysis of the randomness performance of the
proposed stream cipher based cryptographic algorithm,” in 11th IEEE Control and System Graduate Research
Colloquium (ICSGRC), Shah Alam, Malaysia, pp. 76–81, 2020.