Back

Substitution Box Construction Using Transfer‐Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach.

  • Published In: Security & Privacy, 2025, v. 8, n. 1. P. 1 1 of 3

  • Database: Academic Search Ultimate 2 of 3

  • Authored By: Shadab, Mohd; Jawed, Md Saquib; Sajid, Mohammad 3 of 3

Abstract

S‐box strengthens the encryption and decryption process by introducing nonlinearity and protecting the encrypted data against various differential and linear cryptanalytic attacks. Generating a highly nonlinear S‐box with maximal nonlinearity is computationally impractical due to the expansive search space, classifying it as an NP‐hard problem. This paper proposes the Hawkboost algorithm, a novel hybrid method merging the Harris Hawks optimization algorithm (HHO) and the Booster algorithm for generating highly nonlinear S‐boxes with low computational efforts. The HHO algorithm is utilized to navigate in the large permutation search space to find an S‐box with acceptable cryptographic properties. The HHO algorithm is assisted by the Transfer function and Random Key (RK) method to speed up the S‐box design process. Additionally, the Booster algorithm enhances S‐box nonlinearity by applying random local operators like swap and inversion, effectively reshaping elements of S‐box. This novel combination of methodologies facilitates the efficient generation of S‐boxes that exhibit excellent cryptographic properties while addressing key challenges in S‐box optimization. The performance of the proposed S‐box has been analyzed by comparing various state‐of‐the‐art S‐boxes based on numerous characteristics including average nonlinearity, strict Avalanche criterion (SAC), SAC offset, bit independence criterion (BIC), linear approximation probability (LP), differential approximation probability (DP), fixed points, opposite fixed points, and cycle counts. The results from experiments and analysis based on multiple metrics show that the proposed Hawkboost algorithm satisfies all requirements for safe and reliable S‐boxes without sacrificing any crucial security features. [ABSTRACT FROM AUTHOR]

Additional Information

  • Source:Security & Privacy. 2025/01, Vol. 8, Issue 1, p1
  • Document Type:Article
  • Subject Area:Mathematics
  • Publication Date:2025
  • ISSN:2475-6725
  • DOI:10.1002/spy2.462
  • Accession Number:183953608
  • Copyright Statement:Copyright of Security & Privacy is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)

Looking to go deeper into this topic? Look for more articles on EBSCOhost.