Study on S-box Properties of Convolution Coder

  • S. RoyChatterjeeEmail author
  • K. Sur
  • M. Chakraborty
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1065)


The substitution box (S-box) is an essential component in cryptography. The desirable cryptographic properties of the S-box are bijective, non-linearity, strict avalanche, bit independence, and resiliency. The analyses of these properties determine the quality of S-box. This paper provides mathematical analysis of cryptographic properties of the convolution coder. Simulation results show that it satisfies most of the properties and robustness increases with the number of iteration.


Cryptography S-box Convolution code 


  1. 1.
    Hussain, I., Shah, T., Mahmoodm, H., Gondal, M.A.: A projective general linear group based algorithm for the construction of substitution box for block ci-phers. Neural Comput. Appl. 22(6), 1085–1093 (2013)CrossRefGoogle Scholar
  2. 2.
    Khan, M., Shah, T., Gondal, M.A.: An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn., 73(3), 1795–1801 (2013)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Garg, S., Upadhyay, D.: S-box design approaches: critical analysis and future directions. Int. J. Adv. Res. Comput. Sci. Electron. Eng. (IJARCSEE) 2(4) (2013)Google Scholar
  4. 4.
    Wang, Y., Wong, K.-W., Li, C., Li, Y.: A novel method to design S-box based on chaotic map and genetic algorithm. Phys. Lett. A 376, 827–833(2012)CrossRefGoogle Scholar
  5. 5.
    Gangopadhyay, S., Gangopadhyay, A.K., Pollatos, S., et al.: Cryptographic Boolean func-tions with biased inputs Cryptogr. Commun. 9(2), 301–314 (2017)Google Scholar
  6. 6.
    Rachh, R.R., Ananda Mohan, P.V.: Implementation of AES S-boxes using combinational logic. In: IEEE International Symposium on Circuits and Systems, 2008. ISCAS 2008, pp. 3294–3297 (2008)Google Scholar
  7. 7.
    Nalini, C., Anandmohan, P.V., Poomaiah, D.V., Kulkarni, V.D.: Compact designs of subbytes and mixcolumn for AES. In: Advance Computing Conference, 2009. IACC 2009. IEEE International, pp. 1241–1247 (2009)Google Scholar
  8. 8.
    Mohamed, K., Mohammed Pauzi, M.N., Hj Mohd Ali, F.H., Ariffin, S., Nik Zulkipli, N.H.: Study of S-box properties in block cipher. In: 2014 International Conference on Computer, Communications, and Control Technology (I4CT), pp. 362–366, Langkawi (2014)Google Scholar
  9. 9.
    Dey, S., Ghosh, R.: A review of cryptographic properties of S-boxes with generation and analysis of crypto secure S-boxes. PeerJ Preprints 6, e26452v1 (2018)Google Scholar
  10. 10.
    Baby, R.A.: Convolution coding and applications: a performance analysis under AWGN channel. In: 2015 International Conference on Communication Networks (ICCN), pp. 84–88, Gwalior (2015)Google Scholar
  11. 11.
    Jakimoski, G., Kocarev, L.: Chaos and cryptography: block encryption ciphers based on chaotic maps. In: IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applica-tions, vol. 48, no. 2, pp. 163–169 (2001)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Branstad, D.K., Gait, J., Katzke, S.: Report of the workshop on cryptography in sup-port of computer security. Tech. Rep. NBSIR 77–1291, National Bureau of Standards, Sept. (1976)Google Scholar
  13. 13.
    Webster, A.F., Tavares, S.E.: On the design of S-boxes. In: Williams H.C. (eds.), Advances in Cryptology—CRYPTO ’85 Proceedings. CRYPTO 1985. Lecture Notes in Computer Science, vol. 218. Springer, Berlin, Heidelberg (1986)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Netaji Subhash Engineering CollegeKolkataIndia
  2. 2.Institute of Engineering & ManagementKolkataIndia

Personalised recommendations