{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:46:46Z","timestamp":1742399206829,"version":"3.37.3"},"reference-count":26,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T00:00:00Z","timestamp":1600905600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007446","name":"King Khalid University","doi-asserted-by":"publisher","award":["R.G.P. 1\/234\/41"],"award-info":[{"award-number":["R.G.P. 1\/234\/41"]}],"id":[{"id":"10.13039\/501100007446","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,9,24]]},"abstract":"<jats:p>Substitution boxes are the only nonlinear component of the symmetric key cryptography and play a key role in the cryptosystem. In block ciphers, the S-boxes create confusion and add valuable strength. The majority of the substitution boxes algorithms focus on bijective Boolean functions and primitive irreducible polynomial that generates the Galois field. For binary field F2, there are exactly 16 primitive irreducible polynomials of degree 8 and it prompts us to construct 16 Galois field extensions of order 256. Conventionally, construction of affine power affine S-box is based on Galois field of order 256, depending on a single degree <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\"><mml:mn>8<\/mml:mn><\/mml:math> primitive irreducible polynomial over <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M2\"><mml:msub><mml:mrow><mml:mi mathvariant=\"normal\">\u2124<\/mml:mi><\/mml:mrow><mml:mrow><mml:mn>2<\/mml:mn><\/mml:mrow><\/mml:msub><\/mml:math>. In this manuscript, we study affine power affine S-boxes for all the <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M3\"><mml:mn>16<\/mml:mn><\/mml:math> distinct degree <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M4\"><mml:mn>8<\/mml:mn><\/mml:math> primitive irreducible polynomials over <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M5\"><mml:msub><mml:mrow><mml:mi mathvariant=\"normal\">\u2124<\/mml:mi><\/mml:mrow><mml:mrow><mml:mn>2<\/mml:mn><\/mml:mrow><\/mml:msub><\/mml:math> to propose 16 different <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M6\"><mml:mn>8<\/mml:mn><mml:mo>\u00d7<\/mml:mo><mml:mn>8<\/mml:mn><\/mml:math> substitution boxes. To perform this idea, we introduce 16 affine power affine transformations and, for fixed parameters, we obtained 16 distinct S-boxes. Here, we thoroughly study S-boxes with all possible primitive irreducible polynomials and their algebraic properties. All of these boxes are evaluated with the help of nonlinearity test, strict avalanche criterion, bit independent criterion, and linear and differential approximation probability analyses to measure the algebraic and statistical strength of the proposed substitution boxes. Majority logic criterion results indicate that the proposed substitution boxes are well suited for the techniques of secure communication.<\/jats:p>","DOI":"10.1155\/2020\/8883884","type":"journal-article","created":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T23:34:13Z","timestamp":1600990453000},"page":"1-14","source":"Crossref","is-referenced-by-count":1,"title":["The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5852-1955","authenticated-orcid":true,"given":"Sajjad","family":"Shaukat Jamal","sequence":"first","affiliation":[{"name":"Department of Mathematics, College of Science, King Khalid University, P. O. Box 9004, Abha, Saudi Arabia"}]},{"given":"Dawood","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan"}]},{"given":"Abdulaziz","family":"Deajim","sequence":"additional","affiliation":[{"name":"Department of Mathematics, College of Science, King Khalid University, P. O. Box 9004, Abha, Saudi Arabia"}]},{"given":"Tariq","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan"}]}],"member":"311","reference":[{"volume-title":"The design of Rijndael: AES","year":"2002","key":"1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/4.278352"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/bf00630563"},{"volume":"46","year":"1977","key":"4"},{"issue":"3","key":"5","first-page":"751","volume":"3","year":"2007","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.05.017"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6250-8"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0621-x"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-013-0577-4"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-0870-0"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1063\/1.4994860"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0225031"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-014-0035-2"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-019-00689-w"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2018.12.003"},{"issue":"29","key":"17","first-page":"1","volume":"2","year":"1998","journal-title":"Specifications Version"},{"issue":"4","key":"18","first-page":"304","volume":"8","year":"2008","journal-title":"International Journal of Computer Science and Network Security"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5823230"},{"first-page":"386","volume-title":"Linear cryptanalysis method for DES cipher","year":"1993","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-014-0017-4"},{"first-page":"523","volume-title":"On the design of S-boxes","year":"1985","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.5120\/3395-4720"},{"volume-title":"On the design of S-boxes","year":"1992","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2938513"},{"issue":"1","key":"28","first-page":"331","volume":"16","year":"2020","journal-title":"International Journal of Innovative Computing, Information and Control: IJICIC"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103181"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8883884.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8883884.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8883884.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T23:34:15Z","timestamp":1600990455000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8883884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,24]]},"references-count":26,"alternative-id":["8883884","8883884"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8883884","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,9,24]]}}}