S-BOXLARGA QO‘YILADIGAN ASOSIY KRIPTOGRAFIK TALABLAR VA ULARNI BUZISHGA QARATILGAN HUJUM TURLARI
Keywords:
S-box, kriptografik talablar, nochiziqlilik, differensial kriptoanaliz, chiziqli kriptoanaliz, algebraik hujumlar, yengil vaznli kriptografiya, xaotik tizimlar.Abstract
Ushbu tezisda S-boxlarning kriptografik tizimlardagi o‘rni, ularga qo‘yiladigan asosiy talablar hamda ularni buzishga qaratilgan asosiy hujum turlari tahlil qilingan. Tadqiqotda nochiziqlilik, differensial birxillik, biyektivlik, qat’iy qor-ko‘chki mezoni va bit mustaqilligi kabi xususiyatlarning ahamiyati yoritilgan. Shuningdek, differensial, chiziqli, algebraik, boomerang va yon-kanal hujumlariga qarshi himoya mexanizmlari hamda S-box dizaynida qo‘llaniladigan zamonaviy yondashuvlar — xaotik tizimlar, genetik algoritmlar, heuristik usullar va yengil vaznli kriptografiya misolida ko‘rib chiqilgan. Natijalar S-boxlarning kriptografik barqarorligini oshirishga qaratilgan samarali yondashuvlarni ko‘rsatadi.
References
1. Yilmaz Aydin, Ali Murat Garipcan, Fatih Özkaynak. A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms. Arabian Journal for Science and Engineering, 2024-06-26. DOI: 10.1007/s13369-024-09251-8
2. Haitham Alsaif, Ramzi Guesmi, Anwar Kalghoum, Badr M. Alshammari, Tawfik Guesmi. A Novel Strong S-Box Design Using Quantum Crossover and Chaotic Boolean Functions for Symmetric Cryptosystems. Symmetry, 2023-03-31. DOI: 10.3390/sym15040833
3. Auday H. Saeed AL-Wattar. A Review of Block Cipher’s S-Boxes Tests Criteria. Iraqi Journal of Statistical Sciences, 2019-09-01. DOI: 10.33899/iqjoss.2019.164195
4. B. Alabduallah, Abdulbasid S. Banga, Nadeem Iqbal, Atif Ikram, Hossam Diab. Advancing Cryptographic Security with a New Delannoy-Derived Chaotic S-Box. Computer Applications and Technology, 2024-01-01. DOI: 10.0410/cata/a4bf0870f444f53b33bb733ec2230c64.
5. Farid Subkhan, M. Maarif, Nurul Taufiqu Rochman, Yudhistira Nugraha. Orchestrating Digital Economy to Foster Economic Resilience of Smart Cities: The Soft System Approach. Etikonomi: Journal of Business and Economics, 2025-03-09. DOI: 10.15408/etk.v24i1.39224
6. Asim Ali, Muhammad Asif Khan, Ramesh Kumar Ayyasamy, Muhammad Wasif. A Novel Systematic Byte Substitution Method to Design Strong Bijective Substitution Box (S-box) Using Piece-Wise Linear Chaotic Map. PeerJ Computer Science, 2022-05-12. DOI: 10.7717/peerj-cs.940
7. Jenan Namuq. S-Box Design Utilizing 3D Chaotic Maps for Cryptographic Application. Baghdad Journal of Engineering Sciences, 2024-08-18. DOI: 10.33971/bjes.24.2.9
8. Oleksandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Sergey Kandiy, Mikolaj Karpinski, Ruslan Shevchuk. Enhancing Cryptographic Primitives through Dynamic Cost Function Optimization in Heuristic Search. Electronics, 2024-05-09. DOI: 10.3390/electronics13101825
9. Omer Tariq, Muhammad Bilal Akram Dastagir, Dongsoo Han. Compact Walsh–Hadamard Transform-Driven S-Box Design for ASIC Implementations. Electronics, 2024-08-10. DOI: 10.3390/electronics13163148
10. Sinem Akyol. Hybrid Cuckoo Search–Bees Algorithm with Memristive Chaotic Initialization for Cryptographically Strong S-Box Generation. Biomimetics, 2025-09-10. DOI: 10.3390/biomimetics10090610
11. Zaid Bin Faheem, Asim Ali, Muhammad Asif Khan, Muhammad Ehatisham Ul-Haq, Waqar Ahmad. Highly Dispersive Substitution Box (S-Box) Design Using Chaos. ETRI Journal, 2020-03-04. DOI: 10.4218/etrij.2019-0138
12. Qingling Song, Lang Li, Xiantong Huang. LELBC: A Low Energy Lightweight Block Cipher for Smart Agriculture. Internet of Things, 2024-04-01. DOI: 10.1016/j.iot.2023.101022
13. Khumbelo Difference Muthavhine, Mbuyu Sumbwanyambe. Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Based on Galois Field (GF(2^32)) and High Irreducible Polynomials. Applied Sciences, 2023-11-30. DOI: 10.3390/app132312834
14. Mahnoor Naseer, Sundas Tariq, Naveed Riaz, Naveed Ahmed, Mureed Hussain. S-box Security Analysis of NIST Lightweight Cryptography Candidates: A Critical Empirical Study. arXiv preprint, 2024-04-09. DOI: 10.48550/arxiv.2404.06094
15. Ardabek Khompysh, Nursulu Kapalova, Kunbolat Algazy, Dilmukhanbet Dyusenbayev, Kairat Sakan. Design of Substitution Nodes (S-Boxes) of a Block Cipher Intended for Preliminary Encryption of Confidential Information. Cogent Engineering, 2022-06-07. DOI: 10.1080/23311916.2022.2080623
16. Khumbelo Difference Muthavhine, Mbuyu Sumbwanyambe. Preventing Differential Cryptanalysis Attacks Using a KDM Function and the 32-Bit Output S-Boxes on AES Algorithm Found on IoT Devices. Cryptography, 2022-02-22. DOI: 10.3390/cryptography6010011
17. Muhammad Usama, Osama Rehman, Imran Memon, Safdar Rizvi. An Efficient Construction of Key-Dependent Substitution Box Based on Chaotic Sine Map. International Journal of Distributed Sensor Networks, 2019-12-01. DOI: 10.1177/1550147719895957
18. Oleksandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Sergey Kandiy. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography. Cryptography, 2024-04-25. DOI: 10.3390/cryptography8020017
19. Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang. An STP-Based Model Toward Designing S-boxes with Good Cryptographic Properties. Designs, Codes and Cryptography, 2022-04-02. DOI: 10.1007/s10623-022-01034-2
20. David Carcano Ventura, Lil Maria Rodriguez Henriquez, Saul E. Pomares Hernandez. Requirements for Feistel-Based Lightweight Block Cipher S-boxes to Be Resilient to Boomerang Attacks. IEEE ENC 2024 Conference, 2024-01-01. DOI: 10.1109/enc60556.2023.10508657
