Affiliation:
1. Department of Political Sciences, Communication and International Relations at the University of Macerata, Via Crescimbeni, 30/32, 62100 Macerata, Italy
2. Department of Security Information Systems and Technologies at the V. N. Karazin Kharkiv National University, 4 Svobody Sq., 61022 Kharkiv, Ukraine
Abstract
In the realm of smart communication systems, where the ubiquity of 5G/6G networks and IoT applications demands robust data confidentiality, the cryptographic integrity of block and stream cipher mechanisms plays a pivotal role. This paper focuses on the enhancement of cryptographic strength in these systems through an innovative approach to generating substitution boxes (S-boxes), which are integral in achieving confusion and diffusion properties in substitution–permutation networks. These properties are critical in thwarting statistical, differential, linear, and other forms of cryptanalysis, and are equally vital in pseudorandom number generation and cryptographic hashing algorithms. The paper addresses the challenge of rapidly producing random S-boxes with desired cryptographic attributes, a task notably arduous given the complexity of existing generation algorithms. We delve into the hill climbing algorithm, exploring various cost functions and their impact on computational complexity for generating S-boxes with a target nonlinearity of 104. Our contribution lies in proposing a new cost function that markedly reduces the generation complexity, bringing down the iteration count to under 50,000 for achieving the desired S-box. This advancement is particularly significant in the context of smart communication environments, where the balance between security and performance is paramount.
Funder
European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie
European Union—NextGenerationEU under the Italian Ministry of University and Research (MIUR), National Innovation Ecosystem
Reference38 articles.
1. Grami, A. (2023). Discrete Mathematics, Academic Press.
2. Martin, T. (2022). Designing Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33, Newnes.
3. Milanič, M., Servatius, B., and Servatius, H. (2024). Discrete Mathematics with Logic, Academic Press.
4. Pandey, R., Goundar, S., and Fatima, S. (2023). Distributed Computing to Blockchain, Academic Press.
5. A Survey on Security and Cryptographic Perspective of Industrial-Internet-of-Things;Mishra;Internet Things,2024
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献