{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T13:27:23Z","timestamp":1751894843441},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T00:00:00Z","timestamp":1635292800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T00:00:00Z","timestamp":1635292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In cryptography, one among several investigated areas is the implementation of AES S-boxes. In this paper, a substitution-box is designed which follows combined data path using dual-basis tower field extension with\u00a0Golod\u2013Shafarevich theorem fed in immune genetic algorithm for optimization purpose for each and every block. The role of enhanced immune genetic algorithm is as follows: at first, chaotic system generates S-boxes population, these S-boxes which perform excellently are then optimized by a sequence of operators such as extraction of anti-agent and immune selection. Few criteria of S-boxes such as differential uniformity, nonlinear degree, and strict avalanche effect are analyzed. The obtained results are analyzed with CMOS 35\u00a0nm and 15\u00a0nm technologies to measure the performance of the proposed designs and was observed that the proposed one outperforms in power and area. The optimized S-box can be effectively applied for securing information. The proposed Golod\u2013Shafarevich feeder Immune Genetic Algorithm S-box (GSIGA-Sbox) is compared with two baseline methods such as Reversed Genetic Algorithm S-box (RGA-Sbox) and Discrete Space Chaotic S-box (DSC-Sbox). As a result the proposed GSIGA-Sbox achieves encryption speed of 61\u00a0MHZ, decryption speed of 55\u00a0MHZ with 24% of power consumption for 35\u00a0nm CMOS technology and 57 MHZ encryption speed, 51 MHZ decryption speed with 28% of power consumption for 15\u00a0nm CMOS technology.<\/jats:p>","DOI":"10.1007\/s40747-021-00556-x","type":"journal-article","created":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T09:03:19Z","timestamp":1635325399000},"page":"2959-2967","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Low-power AES S-box design using dual-basis tower field extension method for cyber security applications"],"prefix":"10.1007","volume":"9","author":[{"given":"V.","family":"Nandan","sequence":"first","affiliation":[]},{"given":"R. Gowri Shankar","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,27]]},"reference":[{"issue":"4","key":"556_CR1","doi-asserted-by":"publisher","first-page":"271","DOI":"10.14257\/ijca.2016.9.4.27","volume":"9","author":"G Verma","year":"2016","unstructured":"Verma G, Shekhar S, Shashi Kant K, Verma V, Verma H, Pandey B (2016) SSTL IO standard based low power arithmetic design using CalanaKalanabhyamOn FPGA. Int J Control Autom 9(4):271\u2013278","journal-title":"Int J Control Autom"},{"issue":"3","key":"556_CR2","doi-asserted-by":"publisher","first-page":"181","DOI":"10.14257\/ijsh.2016.10.3.18","volume":"10","author":"G Verma","year":"2016","unstructured":"Verma G, Verma V, Sharma D, Kumar A, Verma H, Kalia K (2016) Design goal based implementation of energy efficient Greek unicode reader for natural language processing. Int J Smart Home 10(3):181\u2013190","journal-title":"Int J Smart Home"},{"issue":"4","key":"556_CR3","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TC.2006.49","volume":"55","author":"A Hodjat","year":"2006","unstructured":"Hodjat A, Verbauwhede I (2006) Area-throughput trade-offs for fully pipelined 30 to 70 Gbits\/s AES processors. IEEE Trans Comput 55(4):366\u2013372","journal-title":"IEEE Trans Comput"},{"key":"556_CR4","doi-asserted-by":"crossref","unstructured":"Wolkerstorfer J, Oswald E, Lamberger M (2002) An ASIC implementation of the AES SBoxes. In: Topics in Cryptology\u2014CT-RSA 2002, Springer Verlag, pp 67\u201378","DOI":"10.1007\/3-540-45760-7_6"},{"key":"556_CR5","doi-asserted-by":"crossref","unstructured":"G. Bertoni, M. Macchetti, L. Negri, and P. Frangneto, \"Power-efficient ASIC Synthesis of Cryptographic Sboxes,\" in Proc. the 14th ACM Creat Lakes symposium on VLSI (GLSVLSI 2004), pp. 277\u2013281, 2004.","DOI":"10.1145\/988952.989019"},{"key":"556_CR6","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V et al (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"issue":"1","key":"556_CR7","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s12652-017-0655-5","volume":"10","author":"M Prabukumar","year":"2019","unstructured":"Prabukumar M, Agilandeeswari L, Ganesan K (2019) An intelligent lung cancer diagnosis system using cuckoo search optimization and support vector machine classifier. J Ambient Intell Human Comput 10(1):267\u2013329","journal-title":"J Ambient Intell Human Comput"},{"key":"556_CR8","unstructured":"Rodwald P, Mroczkowski P (2006) How to create\u201d good \u201cS-boxes?\u201d. In: 1st international Conference for young researchers in computer science. Control, electrical engineering and telecommunications ICYR, pp 18\u201320"},{"key":"556_CR9","doi-asserted-by":"publisher","first-page":"2071","DOI":"10.1007\/s12652-019-01233-1","volume":"11","author":"W Yin","year":"2019","unstructured":"Yin W, Mavaluru D, Ahmed M et al (2019) Application of new multiobjective optimization algorithm for EV scheduling in smart grid through theuncertainties. J Ambient Intell Human Computer 11:2071\u20132103","journal-title":"J Ambient Intell Human Computer"},{"key":"556_CR10","unstructured":"Morioka S, Katayama Y (2017) design methodology for a one-shot reed-solomon encoder and decoder. In: International Conference on computer design (ICCD \u201999), pp 60\u201367. IEEE, October 2017"},{"issue":"6\u20137","key":"556_CR11","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.physleta.2012.01.009","volume":"376","author":"Y Wang","year":"2012","unstructured":"Wang Y, Wong K-W, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A 376(6\u20137):827\u2013833","journal-title":"Phys Lett A"},{"key":"556_CR12","doi-asserted-by":"crossref","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2014) A novel design of Chaos based S-Boxes using genetic algorithm techniques. In: Proceedings of the 2014 11th IEEE\/ACS International Conference on Computer Systems and Applications, AICCSA 2014, pp 678\u2013684, Qatar, November 2014","DOI":"10.1109\/AICCSA.2014.7073265"},{"key":"556_CR13","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1016\/j.procs.2015.07.394","volume":"57","author":"M Ahmad","year":"2015","unstructured":"Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design. Proc Comput Sci 57:572\u2013580","journal-title":"Proc Comput Sci"},{"issue":"1","key":"556_CR14","first-page":"232","volume":"27","author":"Y Tian","year":"2016","unstructured":"Tian Y, Lu Z (2016) S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm. J Syst Eng Electron 27(1):232\u2013241","journal-title":"J Syst Eng Electron"},{"key":"556_CR15","first-page":"11","volume":"6969311","author":"Y Tian","year":"2017","unstructured":"Tian Y, Lu Z (2017) Chaotic s-box: intertwining logistic map and bacterial foraging optimization. Math Probl Eng 6969311:11","journal-title":"Math Probl Eng"},{"key":"556_CR16","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.pisc.2016.06.001","volume":"8","author":"M Ahmad","year":"2016","unstructured":"Ahmad M, Mittal N, Garg P, Maftab Khan M (2016) Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspect Sci 8:465\u2013468","journal-title":"Perspect Sci"},{"issue":"2","key":"556_CR17","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/s11071-016-3295-y","volume":"88","author":"T Farah","year":"2017","unstructured":"Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and Teaching\u2013Learning-Based Optimization. Nonlinear Dyn 88(2):1059\u20131074","journal-title":"Nonlinear Dyn"},{"key":"556_CR18","first-page":"7201","volume":"31","author":"M Hussam","year":"2018","unstructured":"Hussam M, Zolkipli F, Ahmad M (2018) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Appl 31:7201\u20137210","journal-title":"Neural Comput Appl"},{"key":"556_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCYB.2018.2846186","volume":"48","author":"T Zhang","year":"2018","unstructured":"Zhang T, Chen CL, Chen L, Xu X, Hu B (2018) Design of highly nonlinear substitution boxes based on I-Ching operators. IEEE Trans Cybern 48:1\u201310","journal-title":"IEEE Trans Cybern"},{"issue":"1","key":"556_CR20","doi-asserted-by":"publisher","first-page":"55405","DOI":"10.1109\/ACCESS.2018.2871557","volume":"6","author":"AA Alzaidi","year":"2018","unstructured":"Alzaidi AA, Ahmad M, Doja MN, Solami EA, Beg MM (2018) A new 1D chaotic map and \u03b2-hill climbing for generating substitution-boxes. IEEE Access 6(1):55405\u201355418","journal-title":"IEEE Access"},{"issue":"3","key":"556_CR21","doi-asserted-by":"publisher","first-page":"2115","DOI":"10.1007\/s11071-018-4478-5","volume":"94","author":"T Ye","year":"2018","unstructured":"Ye T, Zhimao L (2018) Chaotic S-box: six-dimensional fractional Lorenz\u2013Duffing chaotic system and O-shaped path scrambling. Nonlinear Dyn 94(3):2115\u20132126","journal-title":"Nonlinear Dyn"},{"issue":"7","key":"556_CR22","doi-asserted-by":"publisher","first-page":"525","DOI":"10.3390\/e20070525","volume":"20","author":"E Al Solami","year":"2018","unstructured":"Al Solami E, Ahmad M, Volos C, Doja M, Beg M (2018) A new hyperchaotic system-based design for efficient bijective substitution-boxes. Entropy 20(7):525","journal-title":"Entropy"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00556-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00556-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00556-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T17:35:58Z","timestamp":1686332158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00556-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,27]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["556"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00556-x","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,27]]},"assertion":[{"value":"29 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}