QIS-Box: Pioneering Ultralightweight S-Box Generation with Quantum Inspiration

Main Article Content

Ghada Alkateb

Abstract

This paper presents the quantum-inspired substitution box (QIS-Box) algorithm, a novel approach aimed at enhancing the security of cryptographic S-boxes by leveraging quantum-inspired techniques. The QIS-Box algorithm significantly improves key cryptographic metrics, increasing nonlinearity from 102--110 and reducing differential uniformity from 6--4. Nonlinearity, which measures an S-Box's resistance to linear cryptanalysis, is enhanced to provide stronger protection, whereas differential uniformity, which assesses resilience to differential cryptanalysis, is improved to offer greater defence. These advancements highlight the robust security capabilities of the QIS-Box algorithm against prevalent cryptanalytic attacks. Furthermore, the algorithm demonstrates notable efficiency, making it well suited for implementation in resource-constrained environments such as IoT devices. This research contributes substantially to the development of quantum-resistant cryptographic solutions, addressing the challenges posed by emerging quantum computing technologies. Future research will focus on refining the simulation of quantum events within classical computational frameworks and integrating the QIS-Box Algorithm with other cryptographic techniques to further increase security and efficiency. This study paves the way for the development of advanced cryptographic systems capable of withstanding the evolving landscape of digital threats.

Downloads

Download data is not yet available.

Article Details

How to Cite
Alkateb, G. (2024). QIS-Box: Pioneering Ultralightweight S-Box Generation with Quantum Inspiration. Mesopotamian Journal of CyberSecurity, 4(2), 106–119. https://doi.org/10.58496/MJCS/2024/010
Section
Articles
Author Biography

Ghada Alkateb, Department of Communication and Computing Engineering, Engineering College, UOITC, Baghdad, Iraq.

I got my PhD in 2023 from university of technology Iraq in computer science / network security.

References

. M. Farah, A. Farah, & T. Farah, "An image encryption scheme based on a new hybrid chaotic map and optimized substitution box", Nonlinear Dynamics, vol. 99, no. 4, p. 3041-3064, 2019. https://doi.org/10.1007/s11071-019-05413-8.

. M. Aslam, S. Beg, A. Anjum, Z. Qadir, S. Khan, S. Maliket al., "A strong construction of s-box using mandelbrot set an image encryption scheme", Peerj Computer Science, vol. 8, p. e892, 2022. https://doi.org/10.7717/peerj-cs.892.

. Guma Ali, Maad M. Mijwi, Bosco Apparatus Buruga, "A Survey on Artificial Intelligence in Cybersecurity for Smart Agriculture: State-of-the-Art, Cyber Threats, Artificial Intelligence Applications, and Ethical Concerns," Mesopotamian Journal of Cybersecurity, vol. 1, no. 1, pp. 23-45, Aug. 2024, doi: 10.58496/MJCSC/2024/007.

. G. Al-Kateb, M. M. Mijwil, M. Aljanabi, M. Abotaleb, S. R. K. Priya, and P. Mishra, "AI PotatoGuard: Leveraging Generative Models for Early Detection of Potato Diseases," Potato Research. Available: https://doi.org/10.1007/s11540-024-09751-y.

. D. Zhu, X. Tong, M. Zhang, & Z. Wang, "A new s-box generation method and advanced design based on combined chaotic system", Symmetry, vol. 12, no. 12, p. 2087, 2020. https://doi.org/10.3390/sym12122087.

. Karthik Kumar Vaigandla, Madhu Kumar Vanteru , Mounika Siluveru,"An Extensive Examination of the IoT and Blockchain Technologies in Relation to their Applications in the Healthcare Industry," Mesopotamian Journal of Cybersecurity, vol. 1, no. 1, pp. 1-15, January 2024. doi: 10.58496/MJCSC/2024/001.

. Y. Zhang, J. Hao, & X. Wang, "An efficient image encryption scheme based on s-boxes and fractional-order differential logistic map", IEEE Access, vol. 8, p. 54175-54188, 2020. https://doi.org/10.1109/access.2020.2979827.

. Ç. Ü. Çavuşoğlu, S. Kaçar, A. Akgul, V. Pham, S. Jafari, and F. Alsaadiet, "S-box based image encryption application using a chaotic system without equilibrium," Applied Sciences, vol. 9, no. 4, p. 781, 2019. doi: 10.3390/app9040781.

. M. Ahmad, I. Khaja, A. Baz, H. Alhakami, and W. Alhakami, "Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications," IEEE Access, vol. 8, pp. 116132-116147, 2020. doi: 10.1109/access.2020.3004449.

. A. El-Latif, B. Abd-El-Atty, M. Amin, and A. Iliyasu, "Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications," Scientific Reports, vol. 10, no. 1, 2020. doi: 10.1038/s41598-020-58636-w.

. D. Zhu, X. Tong, M. Zhang, and Z. Wang, "A new s-box generation method and advanced design based on combined chaotic system," Symmetry, vol. 12, no. 12, p. 2087, 2020. doi: 10.3390/sym12122087.

. G. Murtaza, N. Azam, and U. Hayat, "Designing an efficient and highly dynamic substitution-box generator for block ciphers based on finite elliptic curves," Security and Communication Networks, vol. 2021, p. 1-14, 2021. doi: 10.1155/2021/3367521.

. A. Zahid, M. Ahmad, A. Alkhayyat, M. Arshad, M. Shaban, and N. Soliman, "Construction of optimized dynamic s-boxes based on a cubic modular transform and the sine function," IEEE Access, vol. 9, pp. 131273-131285, 2021. doi: 10.1109/access.2021.3113338.

. Z. Liang, "Survey on deep learning-based 3d object detection in autonomous driving," Transactions of the Institute of Measurement and Control, vol. 45, no. 4, pp. 761-776, 2022. doi: 10.1177/01423312221093147.

. Y. Jeon, S. Baek, and J. Kim, "A novel framework to construct quantum circuits of s-boxes: applications to 4-bit s-boxes," 2023. doi: 10.21203/rs.3.rs-2727191/v1.

. B. Abd-El-Atty, "Efficient s-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem," Complex & Intelligent Systems, vol. 9, no. 5, pp. 4817-4835, 2023. doi: 10.1007/s40747-023-00988-7.

. A. Lawah, A. Ibrahim, S. Salih, H. Alhadawi, and P. JosephNg, "Grey wolf optimizer and discrete chaotic map for substitution boxes design and optimization," IEEE Access, vol. 11, pp. 42416-42430, 2023. doi: 10.1109/access.2023.3266290.

. A. Indumathi and G. Sumathi, "Construction of key-dependent s-box for secure cloud storage", Intelligent Automation & Soft Computing, vol. 32, no. 3, p. 1509-1524, 2022. https://doi.org/10.32604/iasc.2022.022743.

. B. Abd-El-Atty, "Efficient s-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem", Complex & Intelligent Systems, vol. 9, no. 5, p. 4817-4835, 2023. https://doi.org/10.1007/s40747-023-00988-7.

. A. El-Latif, B. Abd-El-Atty, M. Amin, & A. Iliyasu, "Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications", Scientific Reports, vol. 10, no. 1, 2020. https://doi.org/10.1038/s41598-020-58636-w.

. A. Zahid, M. Ahmad, A. Alkhayyat, M. Arshad, M. Shaban, N. Solimanet al., "Construction of optimized dynamic s-boxes based on a cubic modular transform and the sine function", IEEE Access, vol. 9, p. 131273-131285, 2021. https://doi.org/10.1109/access.2021.3113338.

. A. Zahid, H. Rashid, M. Shaban, S. Ahmad, E. Ahmed, M. Amjadet al., "Dynamic s-box design using a novel square polynomial transformation and permutation", IEEE Access, vol. 9, p. 82390-82401, 2021. https://doi.org/10.1109/access.2021.3086717.

. Ö. Şengel, M. Aydin, & A. Sertbas, "An efficient generation and security analysis of substitution box using fingerprint patterns", IEEE Access, vol. 8, p. 160158-160176, 2020. https://doi.org/10.1109/access.2020.3021055.

. Y. Jeon, S. Baek, & J. Kim, "A novel framework to construct quantum circuits of s-boxes: applications to 4-bit s-boxes”, 2023. https://doi.org/10.21203/rs.3.rs-2727191/v1.

. D. Konar, S. Bhattacharyya, B. Panigrahi, & E. Behrman, "Qutrit-inspired fully self-supervised shallow quantum learning network for brain tumor segmentation", IEEE Transactions on Neural Networks and Learning Systems, vol. 33, no. 11, p. 6331-6345, 2022. https://doi.org/10.1109/tnnls.2021.3077188.

. V. Nandan and R. Rao, "Low-power AES s-box design using dual-basis tower field extension method for cyber security applications", Complex & Intelligent Systems, 2021. https://doi.org/10.1007/s40747-021-00556-x.

. Z. Liang, "Survey on deep learning-based 3d object detection in autonomous driving", Transactions of the Institute of Measurement and Control, vol. 45, no. 4, p. 761-776, 2022. https://doi.org/10.1177/01423312221093147.

. J. Zhang, Z. Yan, S. Fei, M. Wang, T. Li, & H. Wang, "Is today's end-to-end communication security enough for 5g and its beyond?", IEEE Network, vol. 36, no. 1, p. 105-112, 2022. https://doi.org/10.1109/mnet.101.2100189.

. D. Konar, S. Bhattacharyya, B. Panigrahi, & E. Behrman, "Qutrit-inspired fully self-supervised shallow quantum learning network for brain tumour segmentation", IEEE Transactions on Neural Networks and Learning Systems, vol. 33, no. 11, p. 6331-6345, 2022. https://doi.org/10.1109/tnnls.2021.3077188.

. X. Ji, B. Wang, F. Hu, C. Wang, & H. Zhang, "New advanced computing architecture for cryptography design and analysis by d-wave quantum annealer", Tsinghua Science & Technology, vol. 27, no. 4, p. 751-759, 2022. https://doi.org/10.26599/tst.2021.9010022.

. T. Fernández‐Caramés and P. Fraga‐Lamas, "Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks", IEEE Access, vol. 8, p. 21091-21116, 2020. https://doi.org/10.1109/access.2020.2968985.

. A. Qayyum, "Quantum computing for healthcare: a review”, 2021. https://doi.org/10.36227/techrxiv.17198702.v1.

. K. Kasliwal, P. Jayanthi, A. Jain, & R. Bahl, "Enhancing satellite‐to‐ground communication using quantum key distribution", Iet Quantum Communication, vol. 4, no. 2, p. 57-69, 2023. https://doi.org/10.1049/qtc2.12053.

. Y. Li, P. Zhang, & R. Huang, "Lightweight quantum encryption for secure transmission of power data in smart grid", IEEE Access, vol. 7, p. 36285-36293, 2019. https://doi.org/10.1109/access.2019.2893056.

. Ü. Çavuşoğlu, S. Kaçar, A. Akgul, V. Pham, S. Jafari, F. Alsaadiet al., "S-box based image encryption application using a chaotic system without equilibrium", Applied Sciences, vol. 9, no. 4, p. 781, 2019. https://doi.org/10.3390/app9040781.

. Q. Luo, G. Yang, X. Li, & Q. Li, "Quantum reversible circuits for mathrm multiplicative inverse", Epj Quantum Technology, vol. 9, no. 1, 2022. https://doi.org/10.1140/epjqt/s40507-022-00144-z.

. V. Nandan and R. Rao, "Low-power AES s-box design using dual-basis tower field extension method for cyber security applications", Complex & Intelligent Systems, 2021. https://doi.org/10.1007/s40747-021-00556-x.

. J. Zheng and T. Bao, "An image encryption algorithm using cascade chaotic map and s-box", Entropy, vol. 24, no. 12, p. 1827, 2022. https://doi.org/10.3390/e24121827.

. D. Zhu, X. Tong, M. Zhang, & Z. Wang, "A new s-box generation method and advanced design based on combined chaotic system", Symmetry, vol. 12, no. 12, p. 2087, 2020. https://doi.org/10.3390/sym12122087.

. M. Ahmad, I. Khaja, A. Baz, H. Alhakami, & W. Alhakami, "Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications", IEEE Access, vol. 8, p. 116132-116147, 2020. https://doi.org/10.1109/access.2020.3004449.