IEEE Access (Jan 2020)

An Efficient Generation and Security Analysis of Substitution Box Using Fingerprint Patterns

  • Oznur Sengel,
  • Muhammed Ali Aydin,
  • Ahmet Sertbas

DOI
https://doi.org/10.1109/ACCESS.2020.3021055
Journal volume & issue
Vol. 8
pp. 160158 – 160176

Abstract

Read online

Information and its security have attracted the research community in recent years with increasing usage of mobile applications. Mobile devices have different security options in data transmission such as reading some biometric values. The keystone of the modern block and stream ciphers is the use of a substitution box (s-box) that obscures correlation between plaintext and ciphertext. In this study, we proposed a novel s-box generation algorithm by using the fingerprint pattern of the person who transfers information to the target. We generated several s-boxes by using bifurcation and ridge ending features of the fingerprint. Proposed s-boxes are compared with several known s-boxes over nonlinearity, bijectiveness, strict avalanche criterion, bit independence criterion, linear probability, and differential probability. Along with these properties, we analyzed confidence interval and randomness properties of new s-boxes as well. Also, the execution time of the proposed s-box generation algorithm is calculated and examined. The results of the cryptographic properties have shown that the proposed s-boxes by using ridge ending of the fingerprint performs better. The performances analysis show that the proposed s-box has satisfactory results according to the results of chaotic-based s-boxes. On the other hand, the fingerprint s-boxes are much better than the existing biometric s-boxes according to the s-box security metrics. The results have shown that the execution time of the proposed s-box generation algorithm is more minimum than the existing biometric s-box generation algorithms. Resulting from applying fingerprint biometric data to generate an s-box, such a successful algorithm is promising to be used in mobile devices.

Keywords