International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 8, Issue 3 (March 2021), Pages: 30-35

----------------------------------------------

 Original Research Paper

 Title: Application of fuzzy soft sets to analyze the statistical strength of S-boxes

 Author(s): Asima Razzaque 1, Inayatur Rehman 2, *, Shahid Razzaque 3, Muhammad Iftikhar Faraz 4, Muhammad Asif Gondal 2

 Affiliation(s):

 1Basic Science Department, King Faisal University, Hofuf, Saudi Arabia
 2Department of Mathematics and Sciences, College of Arts and Applied Sciences, Dhofar University, Salalah, Oman
 3Pakistan Institute of Development Economics, Quaid-e-Azam University Campus, Islamabad, Pakistan
 4Department of Mechanical Engineering, College of Engineering, King Faisal University, Hofuf, Saudi Arabia

  Full Text - PDF          XML

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0002-6993-945X

 Digital Object Identifier: 

 https://doi.org/10.21833/ijaas.2021.03.004

 Abstract:

For the evaluation of the substitution boxes, the majority logic criterion is used to analyze the statistical strength of the existing substitution boxes. The main objective of this paper is to make a decision on the analysis and selection of the most appropriate S-box based on a fuzzy soft-aggregation operator. Instead of the usual practice in which a single parameter is considered, we are considering several parameters that will definitely give us a comprehensive analysis of the S-boxes. 

 © 2020 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords: Soft set, Fuzzy set, Fuzzy soft set, FS-aggregation operator, S-box, Majority logic criterion

 Article History: Received 20 July 2020, Received in revised form 17 October 2020, Accepted 7 November 2020

 Acknowledgment:

No Acknowledgment.

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

 Citation:

  Razzaque A, Rehman I, and Razzaque S et al. (2021). Application of fuzzy soft sets to analyze the statistical strength of S-boxes. International Journal of Advanced and Applied Sciences, 8(3): 30-35

 Permanent Link to this page

 Figures

 Fig. 1 Fig. 2 Fig. 3 Fig. 4 Fig. 5 Fig. 6 Fig. 7 Fig. 8 

 Tables

 Table 1 Table 2 Table 3

----------------------------------------------

 References (26)

  1. Abuelyman ES and Alsehibani AAS (2008). An optimized implementation of the S-Box using residue of prime numbers. International Journal of Computer Science and Network Security, 8(4): 304-309.   [Google Scholar]
  2. Acar U, Koyuncu F, and Tanay B (2010). Soft sets and soft rings. Computers and Mathematics with Applications, 59(11): 3458-3463. https://doi.org/10.1016/j.camwa.2010.03.034   [Google Scholar]
  3. Ahmed F, Anees A, Abbas VU, and Siyal MY (2014). A noisy channel tolerant image encryption scheme. Wireless Personal Communications, 77(4): 2771-2791. https://doi.org/10.1007/s11277-014-1667-5   [Google Scholar]
  4. Anees A, Khan WA, Gondal MA, and Hussain I (2013). Application of mean of absolute deviation method for the selection of best nonlinear component based on video encryption. Zeitschrift für Naturforschung A, 68(6-7): 479-482. https://doi.org/10.5560/zna.2013-0022   [Google Scholar]
  5. Anees A, Siddiqui AM, and Ahmed F (2014). Chaotic substitution for highly auto correlated data in encryption algorithm. Communications in Nonlinear Science and Numerical Simulation, 19(9): 3106-3118. https://doi.org/10.1016/j.cnsns.2014.02.011   [Google Scholar]
  6. Cagman N and Enginoglu S (2011). FP-soft set theory and its applications. Annals of Fuzzy Mathematics and Informatics, 2(2): 219-226.   [Google Scholar]
  7. Cagman N, Enginoglu S, and Citak F (2011). Fuzzy soft set theory and its applications. Iranian Journal of Fuzzy Systems, 8(3): 137-147.   [Google Scholar]
  8. Chen D, Tsang ECC, Yeung DS, and Wang X (2005). The parameterization reduction of soft sets and its applications. Computers and Mathematics with Applications, 49(5-6): 757-763. https://doi.org/10.1016/j.camwa.2004.10.036   [Google Scholar]
  9. Cui L and Cao Y (2007). A new S-box structure named Affine-Power-Affine. International Journal of Innovative Computing, Information and Control, 3(3): 751-759.   [Google Scholar]
  10. Dhiman N and Sharma MK (2020). Calculus of new intuitionistic fuzzy generator: In generated intuitionistic fuzzy sets and its applications in medical diagnosis. International Journal of Advanced and Applied Sciences, 7(10): 125-130. https://doi.org/10.21833/ijaas.2020.10.014   [Google Scholar]
  11. Hussain I, Shah T, and Mahmood H (2010). A new algorithm to construct secure keys for AES. International Journal of Contemporary Mathematical Sciences, 5(26): 1263-1270.   [Google Scholar]
  12. Hussain I, Shah T, Gondal MA, and Mahmood H (2012). Generalized majority logic criterion to analyze the statistical strength of S-boxes. Zeitschrift für Naturforschung A, 67(5): 282-288. https://doi.org/10.5560/zna.2012-0022   [Google Scholar]
  13. Hussain I, Shah T, Gondal MA, Khan WA, and Mahmood H (2013). A group theoretic approach to construct cryptographically strong substitution boxes. Neural Computing and Applications, 23(1): 97-104. https://doi.org/10.1007/s00521-012-0914-5   [Google Scholar]
  14. Liu J, Wei B, Cheng X, and Wang X (2005). An AES S-box to increase complexity and cryptographic analysis. In the 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers), IEEE, Taipei, Taiwan, 1: 724-728. https://doi.org/10.1109/AINA.2005.84   [Google Scholar]
  15. Maji PK, Biswas R, and Roy A (2003). Soft set theory. Computers and Mathematics with Applications, 45(4-5): 555-562. https://doi.org/10.1016/S0898-1221(03)00016-6   [Google Scholar]
  16. Maji PK, Biswas RK, and Roy A (2001). Fuzzy soft sets. Journal of Fuzzy Mathematics, 9: 589–602.   [Google Scholar]
  17. Maji PK, Roy AR, and Biswas R (2002). An application of soft sets in a decision making problem. Computers and Mathematics with Applications, 44(8-9): 1077-1083. https://doi.org/10.1016/S0898-1221(02)00216-X   [Google Scholar]
  18. Molodtsov D (1999). Soft set theory-First results. Computers and Mathematics with Applications, 37(4-5): 19-31. https://doi.org/10.1016/S0898-1221(99)00056-5   [Google Scholar]
  19. Pei D and Miao D (2005). From soft sets to information systems. In the IEEE International Conference on Granular Computing, IEEE, Beijing, China, 2: 617-621. https://doi.org/10.1109/GRC.2005.1547365   [Google Scholar]
  20. Rehman I, Razzaque A, and Shah T (2017). A novel approach to analyze s-boxes in image encryption using fuzzy soft set aggregation operator. Journal of Multiple-Valued Logic and Soft Computing, 28(4-5): 495-510.   [Google Scholar]
  21. Rehman I, Shah T, and Hussain I (2014). Analyses of S-box in image encryption applications based on fuzzy decision making criterion. Zeitschrift für Naturforschung A, 69(5-6): 207-214. https://doi.org/10.5560/zna.2014-0023   [Google Scholar]
  22. Shi XY, Xiao Hu You XC, and Lam KY (2002). A method for obtaining cryptographically strong 8×8 Sboxes. International Conference on Advanced Information Networking and Applications, 2(3):14-20.   [Google Scholar]
  23. Skipjack KEA (1998). Algorithm. Specifications Version, 2(29): 1-23.   [Google Scholar]
  24. Tran MT, Bui DK, and Duong AD (2008). Gray S-box for advanced encryption standard. In the International Conference on Computational Intelligence and Security, IEEE, Suzhou, China, 1: 253-258. https://doi.org/10.1109/CIS.2008.205   [Google Scholar]
  25. Yaqoob N, Akram M, and Aslam M (2013). Intuitionistic fuzzy soft groups induced by (t, s)-norm. Indian Journal of Science and Technology, 6(4): 4282-4289. https://doi.org/10.17485/ijst/2013/v6i4.22   [Google Scholar]
  26. Zou Y and Xiao Z (2008). Data analysis approaches of soft sets under incomplete information. Knowledge-Based Systems, 21(8): 941-945.               https://doi.org/10.1016/j.knosys.2008.04.004   [Google Scholar]