You are currently viewing a new version of our website. To view the old version click .
Mathematics
  • Article
  • Open Access

8 January 2025

On the Search for Supersingular Elliptic Curves and Their Applications

,
and
1
Department of Mathematics, Universitat de Lleida, C/ Jaume II, 69, 25001 Lleida, Spain
2
Department of Mathematics, University of Trento, 38122 Trento, Italy
3
Department of Mathematics, Riphah International University, Lahore 54000, Pakistan
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue New Advances in Coding Theory and Cryptography, 2nd Edition

Abstract

Elliptic curves with the special quality known as supersingularity have gained much popularity in the rapidly developing field of cryptography. The conventional method of employing random search is quite ineffective in finding these curves. This paper analyzes the search of supersingular elliptic curves in the space of curves over F p 2 . We show that naive random search is unsuitable to easily find any supersingular elliptic curves when the space size is greater than 10 13 . We improve the random search using a necessary condition for supersingularity. As our main result, we define for the first time an objective function to measure the supersingularity in ordinary curves, and we apply local search and a genetic algorithm using that function. The study not only finds these supersingular elliptic curves but also investigates possible uses for them. These curves were used to create cycles inside the isogeny graph in one particular application. The research shows how the design of S-boxes may strategically use these supersingular elliptic curves. The key components of replacement, which is a fundamental step in the encryption process that shuffles and encrypts the data inside images, are S-boxes. This work represents a major advancement in effectively identifying these useful elliptic curves, eventually leading to their wider application and influence in the rapidly expanding field of cryptography.

1. Introduction

Modern society depends on electronic devices and how information is stored or exchanged securely. The field of cryptography defines protocols and systems to prevent confusion and diffusion of data when they are intercepted or stolen by a third party who is not authorized to access the information. Mathematical objects such as Vectorial Boolean functions (substitution boxes or S-boxes) and supersingular elliptic curves are essential components in most cryptographic procedures. S-boxes are commonly used in symmetric cryptography, while supersingular elliptic curves are used in asymmetric cryptography and post-quantum cryptography. These primitives can be constructed using algebra, can be generated using random algorithms, can be searched using metaheuristics, or can be defined by mixing the aforementioned methods.
In this sense, it is worth mentioning that Charles, Goren, and Lauter [1] proposed in 2006 to use supersingular isogeny graphs to construct hash functions. The Ramanujan graph families created by Lubotzky-Phillips-Sarnak and Pizer, respectively, are the two particular families of optimum expander graphs that the authors examine for proven collision resistant hash function implementations. Collision resistance results from the difficulty of calculating isogenies between supersingular elliptic curves when the hash function is built from one of Pizer’s Ramanujan graphs, which are the set of supersingular elliptic curves over F p 2 . Jao, De Feo, and Plût [2] designed in 2011 a Diffie–Hellman key agreement scheme (SIDH) and a public key cryptosystem from a given supersingular graph. This scheme’s main technical idea is that the authors transmit the images of torsion bases under the isogeny despite the noncommutativity of the endomorphism ring, allowing the two parties to arrive at a common shared key despite the noncommutativity of the endomorphism ring. This work is motivated by the recent development of a subexponential-time quantum algorithm for constructing isogenies between ordinary elliptic curves, while the fastest known quantum attack remains exponential in the supersingular case, as the endomorphism ring is noncommutative. The authors provide a precise formulation of the relevant computational assumption and discuss its validity. Furthermore, in the call for new standards of quantum resistance proposed by NIST [3], an isogeny-based key exchange protocol like a SIDH named SIKE was presented [4]. The study [5] examines the relationships between elliptic curve selection and elliptic-curve cryptography security. In addition to discrete-logarithm calculations, attacks that take use of common implementation flaws are also taken into consideration. One of the fundamental problems in cryptography is the discrete logarithm issue [6] for elliptic curves. The most well-known methods for solving it all have exponential running times, indicating that the issue is often quite difficult. Nonetheless, the MOV attack is a sub-exponential solution technique for supersingular elliptic curves. The MOV approach uses the Weil pairing to convert a discrete logarithm of an elliptic curve to a logarithm over a finite field. With Index Calculus, the discrete logarithm issue in a finite field may be addressed effectively. The analysis of the MOV assault and the creation of instances to illustrate its effectiveness are the main topics of this thesis. For a more recent application, the oriented supersingular isogeny Diffie–Hellman protocol was proposed in [7]. In the case of S-boxes, examples of their use can be found in classical block cipher design like DES [8] or AES [9] and a more recent design for lightweight block ciphers like PRESENT [10].
In the last years, the search for S-boxes raises a new and interesting way to obtain good cryptographic primitives by using evolutionary computation [11,12,13]. This recent approach contrasts with the classic algebraic construction approach. Sometimes, both approaches have been merged [14,15] to carry on the best of each methodology. All those optimizations are performed in a solution space with exponential size, where an exhaustive search cannot be applied. For example, the size of the space is considered large starting from the 4x4 S-box permutation space, a total of 16! ( > 10 13 ) solutions. Also, these primitives are mainly used in symmetric cryptosystems and under the design perspective. The properties to optimize are generally defined and/or deduced against attacks. However, in asymmetric cryptosystems, it seems like the absence of properties to optimize does not motivate the application of metaheuristics, which should be an open research issue in our opinion. In the particular case of elliptic curve cryptosystems, the research community prioritizes the use of random generation [16] and the verification of algebraic conditions [17,18]. Only the connection between elliptic curves and S-boxes has been flourishing for image encryption methods. Arshad et al. [19] established an isogeny that transfers the base curve’s components to the second curve. The base curve’s generators were the locations to which the maximal order subgroup of the elliptic curve points may be generated. In order to build the initial S-boxes, a group action was performed to the base curve’s makers. Initial S-boxes were created from the second curve using the generating points’ images, which were established by isogeny. The approach was computationally efficient because both curves shared the same prime field and only required a few generator points and matching pictures. The suggested approach [20] was based on the elliptic curve and Catalan number, which together form a special algorithm for an effective S-box design. Chaotic maps are gradually being used in generating S-boxes because of their complications and susceptibility to initial states. An efficient method for constructing S-boxes based on a class of elliptic curves over galois fields was proposed by Ali et al. [21]. Through careful analysis, the authors show how resilient their method is to various cryptographic challenges, emphasizing its usefulness in real-world scenarios. A comprehensive study is required to evaluate the freshly created S-box’s resistance to popular attack techniques, such as algebraic, differential, and linear assaults. Defenses against a variety of threats are greatly enhanced by an S-box with a high non-linearity value. Unfortunately, the computationally expensive aspect of building S-boxes limits the attainable encryption throughput. This highlights the need to develop new S-box generators with the highest strength and lowest processing demands in order to offer the greatest security. The authors [22] provided an effective method that makes use of the Mobius transformation of the Galois field and the composition of Frobenius automorphism. Two very nonlinear permutations that may generate millions of S-boxes with extremely high cryptographic strength were thus produced. By making clear the conditions for producing unique S-boxes and guaranteeing that the generated S-boxes had a uniform probability distribution, the dynamic behavior of the suggested generator was examined.
The principal limitation of the current state of the art in curve generation is not to use metaheuristics. As was mentioned before, in asymmetric cryptosystems for elliptic curves, properties are defined as a conditions that can be met. In contrast, if a property can be defined as an objective function, it will define curves where, for example, the supersingular condition is “covered” to a certain degree, and it will allow the discovery of new search regions where a real supersingular curve should exist.
The above issues motivate us to carry out this research due to the following points:
  • As far as we know, just one study presented in 2009 [23], attempted to use an evolutionary algorithm over elliptic curves. Despite the heuristic search being single-solution-based, the authors discuss main evolution concepts such as solution encoding and operators (crossover, mutation, selection), but no optimization was performed, no objective function was defined, and the verification of conditions remains.
  • On the other hand, supersingular elliptic curves are nowadays a cryptographic primitive relevant to post-quantum protocols. The oriented supersingular isogeny Diffie–Hellman protocol is one of the latest proposed [7]. In this case, the supersingular curve acts as a starting point. It would be interesting if this curve is not always the same.
  • This work aims to provide a different way to obtain an elliptic curve that holds the supersingular condition. We also are not addressing a generic algebraic approach to study supersingular elliptic curves such as those presented in [24,25]. Although we will focus on small primes, compared to the actual primes for post-quantum protocols, we think our study can open a new line of research that could help to discover new properties on the curves.
The novelty in this work is to start using heuristic methods in the search for supersingular elliptic curves. That will prepare the way to apply, in the future, all the methodology already gathered in the search of good cryptographic primitives, like:
  • The study of the fitness landscape [26].
  • The study of relationships between different properties of the cryptographic primitive [27].
  • The study of fast property optimization hybrid methods [28].
In this paper, we show how difficult it is to find supersingular elliptic curves using naive random search, and then we introduce a new improvement to this type of search, which is the main result of this work: we define for the first time a property that can be seen as an objective function in the search for supersingularity and we study the behavior of the local search using the objective function. We apply genetic algorithms with the same objective function. In each case, we report the supersingular elliptic curves. Finally, we show two applications of the use of those curves, one for generating cycles in the isogeny graph and a second bigger application for generating S-boxes for image encryption.
The structure of the paper is as follows: Section 2 shows the preliminaries for supersingular elliptic curves and Section 3 shows the preliminaries for heuristic search. The main results will be found in Section 4, while the applications will be found in Section 5 and Section 6. At the end will be Section 9 for conclusions.

2. Preliminaries for Supersingular Elliptic Curves

This section presents some basic concepts that help understand the work’s supersingular elliptic curve part.

2.1. Elliptic Curves over a Finite Field

An elliptic curve E over a finite field F q , with q = p m and p prime, is defined as:
y 2 = x 3 + a x + b
where a , b F q and 4 a 3 + 27 b 2 0 . The set of points ( x , y ) F q × F q satisfying this equation together with a point at infinity is the set of points of the curve, denoted by E / F q . An additional binary operation given by the chord-tangent method endows the set of points of the curve E with an Abelian group structure [29,30,31,32,33].
The j-invariant of the elliptic curve E / F q is given by
j ( E / F q ) = 1728 4 a 3 4 a 3 + 27 b 2
Two Elliptic curves defined over the field F q have the same j-invariant if and only if they are isomorphic over the algebraic closure of the field.

2.2. Supersingular Criteria

An elliptic curve E over a finite field F q is supersingular when the prime p divides the trace t of the Frobenius endomorphism. Otherwise, the curve is said to be ordinary. If E / F q is supersingular, then j ( E / F q ) F p 2 . Such a curve can be expressed using a Legendre equation
E λ : y 2 = x ( x 1 ) ( x λ ) , λ F p 2
Therefore, its j-invariant is given by
j ( E λ ) = 2 8 ( λ 2 λ + 1 ) 3 λ 2 ( λ 1 ) 2 .
Proposition 2.1 in [34], ensures the following necessary condition: If E λ it is supersingular, then λ is a square in F p 2 .
The number of supersingular curves in the space of elliptic curves over F p 2 is approximately p / 12 (see [35] Theorem V4.1). This suggests that the probability of finding one becomes small when p increases.
In this paper, we focus on the condition that q = p 2 . And we will refer to an elliptic curve E / F q simply as E.

4. Results and Discussion

In this section, we present the results and discussion.

4.1. Space Dimension

We analyze the space dimension of F p 2 about 16!. Table 1 shows that starting in prime p = 5,000,077, the solution space has a size greater than 16! So, in the rest of the work, we will focus on some primes between 5,000,077 and 100,000,081.
Table 1. Space the dimension comparison.

4.2. Random Search

We applied iterative random search over the space, checking the supersingular criteria. We executed our code in a SageMath script, we used the E l l i p t i c C u r v e ( K , j = n + w m ) constructor to build the curve, and we checked the criteria with the i s _ s u p e r s i n g u l a r method. The election of this constructor, instead of the polynomial one, was because we performed a performance comparison and the j-invariant constructor is faster. Also, it helps to keep n and m as integers.
Table 2 shows that iterative naive random search is incapable of giving supersingular elliptic curves, even in primes lower than 5,000,077. For the primes with 6 digits, we started at 50,000 iterations and grew up to 250,000, which gave us the sense that changing the number of iterations does not have too much influence on near primes. Then, we decided to go directly to p = 5,000,077. In this particular case, we increased the number of iterations up to 30,000,000, and still no supersingular curve was found.
Table 2. Random search results.

Random Search Improvement

Our improvement in random search is the use of the necessary conditions. We ensure that the j-invariant passed to the constructor came from a λ square, instead of directly constructing an elliptic curve and then evaluating the i s _ s u p e r s i n g u l a r method.
In Table 3, it can be seen that we found an elliptic curve in the 5,000,0772 space in less than 30,000,000 iterations. However, no curve was found for p > = 60,000,013.
Table 3. Random Search results using necessary conditions.

4.3. Objective Function for Supersingular Criteria

We define a new property for an elliptic curve. The NonMultiplicity Distance (NMD) of an elliptic curve E over F p 2 is calculated by:
N M D ( E ) = m i n ( t mod p , p ( t mod p ) )
where t is the trace of Frobenius.
The objective function will have a value between 0 and p / 2 . When N M D ( E ) = 0 , then t is a multiple of p, which implies that the elliptic curve is supersingular. So, finding supersingular elliptic curves in the search space could be performed by minimizing an objective function f = N M D .
We ran 1,000,000 iterations of random search with p = 5,000,077, and we measured the value of the objective function. The minimum value was 3 and the maximum value was 2,500,037, so there is a big range of objective function values when the random search is used; also, the minimum value is very near to 0. We also ran 1,000,000 iterations with p = 100,000,081; the minimum value was 61 and the maximum value was 50,000,020. In Figure 1 and Figure 2, the respective two histograms with 100 bins show an almost uniform distribution of the objective function value, with a little degradation for small ones. This approximation of the uniform distribution indicates that searching for good solutions randomly is as good as searching for bad solutions.
Figure 1. Histogram of the objective function values in random search: 1,000,000 iterations with p = 5,000,077.
Figure 2. Histogram of the objective function values in random search: 1,000,000 iterations with p = 100,000,081.

4.4. Local Search

Our local search algorithm starts in a random curve and at each attempt, it checks if a neighbor improves the value of that actual N M D ; in that case, we update the curve.
All the curves are represented in the same way as in a random search, by the j-invariant in the form j = n + w m. The neighbor in improvement attempt k will be deduced from the actual curve using j = ( n + k ) + w ( m + k ) .
We applied one run of the local search algorithm to the space of prime 400,009, with 2,000,000 attempts at improvement. We did not find any supersingular elliptic curves. This was a first sight that the method did not perform well. If we compare with iterative random search necessary condition, the prime, 400,009 is below the bound that we set for a minimal space size (p = 5,000,077). Moreover, the number of objective function evaluations in the local search was 4,000,000 = 2    2,000,000, near the number of iterations in the random search, 5,380,000.
Later, we modified the local search to include the necessary conditions. In this case, all the curves are represented by the j-invariant in the form of λ 2 where λ = n + w m . The neighbor in iteration k will be deduced from the actual curve using a new λ = ( n + k ) + w ( y + m ) .
Table 4 shows that even with the necessary condition, one run of the local search algorithm was not able to find a curve for prime 5,000,077. So, we can apply a similar analysis as the last one, compared with the iterative random search - necessary condition -.
Table 4. Local search (one run) results using necessary condition.
However, using the local search with the necessary conditions is better than the iterative naive random search for p = 5,000,077. Different from iterative random search, increasing the number of attempts in local search does not produce the same effect because the search could be stuck around a local optimum. In this case, it is better to perform several runs. For example, 30 runs will be equivalent to 120,000,000 = 30 4,000,000 objective function evaluations.
After applying 34 runs in a new experiment of the local search—necessary condition—, we found five supersingular elliptic curves. The minimum value of the objective function was 0, the maximum value was 6 and the average was 2.2. One of the elliptic curves found was y 2 = x 3 + ( 3,402,052 w + 1,513,899 ) x + ( 2,671,589 w + 3,715,944). Moreover, Table 5 shows the comparison of the mentioned results with the results of other two experiments that follow the same structure but different ways of calculating neighborhood, in which five supersingular elliptic curves were also found and with an average of the objective function 2.4 and 2.7 respectively.
Table 5. Local search comparison.
Still, we think that even in this case of rounds of experiments, the results were not better than the ones on iterative random search with the necessary conditions. The neighborhoods that we defined are simple, intuitive, and integer-related. The neighborhood change did not produce too much value in exploitation or exploration. In the case of exploration, the same number of supersingular elliptic curves were found, while in the case of exploitation, the average of the objective function does not differ too much. We conclude that just keeping the + operator is sufficient to apply the local search method.

4.5. Genetic Algorithm

We performed the genetic algorithm in the same way that we applied local search. The only difference here was the measure of the percent of solutions where N M D < 10 , taking into account that all belong to a population under an evolutionary process.
First, we ran a simple genetic algorithm with integer encoding, three-tournament selection, and 51 candidates. We selected a low population size, low number of tournaments, and low mutation rate to keep a simple setting and not have too much computational effort in the personal computer. See Table 6. This algorithm performs better than the iterative naive random method. With a few numbers of evolutions, for p = 300,073 and p = 400,009, 100 percent of the solutions have a very low objective function value.
Table 6. Genetic Algorithm results.
Later, we ran the genetic algorithm using the necessary conditions. We kept the same number of evolutions for all the primes. See Table 7. Making a comparison against the iterative random search under the necessary condition, we can see that for p = 60,000,013, several 30,000,000 random iterations (function evaluations) cannot produce any supersingular elliptic curves; however, the genetic algorithm in ( 51 + 500,000 17 ) = 8,500,051 function evaluations produces 3 % of elliptic curves with N M D < 10 and a success rate was also reached for p < 60,000,013. That made us think it will be possible to find the supersingular ones if we increase the exploitation or increase the function evaluations.
Table 7. Genetic algorithm results with necessary condition.
Then, we reduced the population size from 51 to 48, decreasing the initial exploration (to increase the tournament exploitation), and for the case p = 100,000,081, we found the elliptic curve defined by y 2 = x 3 + ( 81,651,727 w + 28,754,642 ) x + ( 65,536,260 w + 83,652,983 ) over a finite field in w of size 100000081 2 . Still, we did not reach exploitation. As can be seen in Figure 3, where 1 represents the experiment with a population size of 51 and 2 represents the experiment with a population size of 48, there was more exploration than exploitation for the second experiment. The objective function values were very near to 0 in both cases if we remark that the value of p is high.
Figure 3. Boxplots of the objective function values for the respective population sizes 51 and 48. Number of evolutions is 500,000.
Again, in comparison with the iterative random search, the genetic algorithm found a supersingular elliptic curve with only 8,500,051 function evaluations, whereas 30,000,000 random iterations did not.
Moreover, we repeated the experiment with population size 48 and p = 60,000,013, but now with 750,000 evolutions. We found the elliptic curve defined by y 2 = x 3 + ( 59,843,081 w + 21,626,179 ) x + ( 46,755,621 w + 18,166,067 ) over a finite field in w of size 60,000,0132. In Figure 4, the second boxplot represents the results for the population with 48 candidates, and it shows the success of the exploitation in comparison with boxplot 1, and 12% of the objective function values were under 10.
Figure 4. Boxplots of the objective function values for the respective population sizes 51 and 48. Number of evolutions is 750,000.

5. The Search of Cycles into the Isogeny Graph

As we mention in the introduction section, supersingular elliptic curves are starting points to search cycles in the isogeny graph. We took the elliptic curve defined by y 2 = x 3 + ( 3,744,971 w + 4,908,640 ) x + ( 1,644,933 w + ( 1,464,646 ) over a finite field in w of size 5,000,077 2 , and we applied the classical method for constructing cycles using random walks [39]. We found the following cycle:
y 2 = x 3 + ( 4,597,586 w + 3,476,831 ) x + ( 4,073,147 w + 420,949 ) y 2 = x 3 + ( 1,166,616 w + 1,205,981 ) x + ( 78,929 w + 4,456,086 ) y 2 = x 3 + ( 2,012,293 w + 1,520,436 ) x + ( 503,709 w + 3,020,123 ) y 2 = x 3 + ( 3,665,625 w + 4,295,465 ) x + ( 51,379 w + 185,115 ) y 2 = x 3 + ( 1,963,921 w + 55,030 ) x + ( 3,353,240 w + 4,180,616 ) y 2 = x 3 + ( 4,597,586 w + 3,476,831 ) x + ( 4,073,147 w + 420,949 ) y 2 = x 3 + ( 900,251 w + 2,000,925 ) x + ( 1,087,049 w + 2,536,901 ) y 2 = x 3 + ( 3,560,298 w + 628,449 ) x + ( 677,404 w + 1,940,351 ) y 2 = x 3 + ( 1,015,030 w + 2202 ) x + ( 86,534 w + 516,926 ) y 2 = x 3 + ( 1,963,921 w + 55,030 ) x + ( 3,353,240 w + 4,180,616 )
This cycle is the remaining intersection of the random walks. Above it can be seen two paths that have the same start and end, but only those curves are shared.

6. Application in S-Box Generation

Building robust and adaptable S-boxes is essential for developing significant cryptographic systems since they are used to carry out nonlinear transformations that measure the efficiency of well-designed encryption algorithms. Consequently, creating dynamic S-boxes with the best cryptographic properties is very important in contemporary cryptography. To overcome the drawbacks of existing S-box creation techniques and produce a set of S-boxes, a new strategy based on supersingular elliptic curves (ECs) over Galois fields and the algebraic operations that go along with them is introduced. The improvement gained from using this strategy relies on the large number of points that the supersingular curve provides due to the big prime. The proposed algorithm can be described in the following steps:
  • Choose a supersingular elliptic curve over y 2 = x 3 + ( 3,744,971 w + 4,908,640 ) x + ( 1,644,933 w + 1,464,646 ) over a finite field in w of size 5,000,077 2 .
  • Generate elliptic curve points ( x , y ) , which satisfy the equation of the curve.
  • Define the function f ( x , y ) = y where ( x , y ) F p 2 × F p 2 satisfying curve.
  • Apply modulo 256 on y to reduce entries in set { 0 , 1 , 2 , , 255 } and convert into the elements of the Galois field using the primitive irreducible polynomial p ( t ) = t 8 + t 5 + t 3 + t 2 + 1 .
  • Define the function ζ on the y coordinates by ζ ( t ) = 1 a t + b : t b a 0 : t = b a .
  • Fix a = 8 , b = 9 and reshape the images of ζ into a 16 × 16 matrix.

7. Performance Analysis of Proposed S-Box

Using well-established metrics like nonlinearity (NL), strict avalanche criteria (SAC), bit independence criteria (BIC), linear approximation probability (LP), and differential approximation probability (DAP), the cryptographic strength of the S-boxes created for the encryption process was assessed. These outcomes are often used to evaluate how successful S-boxes are. The performance indices of the created S-boxes are shown below.

7.1. Nonlinearity

Pieprzyk and Finkelstein introduced the concept of “nonlinearity” in 1988. This concept determines the difference between the set of all affine functions with n variables and the n-variable Boolean function. For S-boxes created using G F ( 2 8 ) , the highest possible nonlinearity is 120. The literature shows that the highest nonlinearity achieved until now is 112, which is also attained by our proposed S-box of Table 8. The nonlinearity of all constituent Boolean functions of an S-box can be computed by using the following formula:
N L ( f ) = 2 n 1 m a x | W H T f | 2
where W H T f represents the Walsh–Hadmard transformation of the polarity truth table of Boolean function f.
Table 8. S-box.

7.2. Strict Avalanche Criteria

The strict avalanche criteria (SAC) are used to evaluate the degree to which changes in the input of an S-box propagate through the output of the S-box or in other words, how well an S-box demonstrates the avalanche effect. The avalanche effect describes the tendency for little adjustments to the input of a cryptographic function to have a big impact on the function’s output. The rigorous avalanche conditions for S-boxes stipulate that flipping a single input bit of an S-box should on average flip half of the output bits. To calculate the dependence matrix D of the SAC, we can use the following equation.
D ( k ) = i = 1 8 f ( k ) f ( k c i ) 256
where H W T ( c i ) = 1 and i = 1 , 2 , 3 8 . SAC is considered satisfied if all entries in the SAC matrix are within a small neighborhood of 0.5 . Table 9 displays the SAC findings of the suggested S-box, together with comparisons to current schemes, proving that the proposed S-box satisfies the SAC.
Table 9. Analysis and comparison of proposed S-box.

7.3. Bit Independence Criteria (BIC)

Let f a and f b be two-bit outputs of an S-box if f a f b ( a b , 1 a , b n ) is highly nonlinear and satisfies the strict avalanche criteria; then, the S-box satisfies the BIC. This indicates that if one input bit is reversed, the correlation coefficient for each output bit may approach zero and the S-box satisfies the BIC. To put it another way, the bit independence criteria (BIC) is a feature of an S-box that ensures each output bit is statistically independent of each input bit and output bit. If the values in the BIC matrix of an S-box are near 0.5 , it satisfies the BIC criteria. Table 9 displays the BIC findings of the suggested S-box and a few chosen S-boxes that already exist.

7.4. Linear Approximation Probability (LAP)

Given a particular number of input-output pairs, the probability of linear approximation for an S-box is the likelihood that its inputs will approximate its outputs linearly. A higher linear approximation probability indicates a weaker S-box, as it makes the S-box more vulnerable to linear attacks. On the other hand, a lower linear approximation probability indicates a stronger S-box. Due to this, the S-box exhibits greater resilience against linear attacks. The following formula can be used to calculate linear approximation probability:
L P S = max α , β 0 | | { u G F ( 2 m ) | α . S ( u ) = β . S ( v ) } | 2 m 1 2 m |
considering u , v to be the input and output masks, respectively. Table 9 presents the results of the LP analysis, which show that the suggested S-box successfully thwarts linear cryptanalysis.

7.5. Differential Approximation Probability (DAP)

A measure of how likely an S-box is to propagate a difference in its inputs to a corresponding difference in its outputs is called the differential approximation probability. By comparing the number of input-output pairs with the specific input difference and output difference to the number of input-output pairs without that specific difference, the probability of differential approximation for an S-box is determined. It is calculated by
D P ( Δ u , Δ v ) = | { u G F ( 2 m ) | S ( u ) S ( u Δ u ) = Δ v } | 2 m ,
where Δ u is the input and Δ v is the output differential. As seen in Table 9, the DAP analysis of the suggested S-boxes shows almost optimal values.

8. Majority Logic Criterion

In this part, we will encrypt photos using the suggested S-box and the majority logic criterion will be used to evaluate the effectiveness of the image encryption method. We substituted the suggested S-box for the AES S-box when encrypting images using the CBC mode of the AES Algorithm 2. The assessment procedure will include calculating several metrics for the plain and cipher images, including entropy, correlation, homogeneity, energy, and contrast, and then comparing the findings with a few commonly used S-boxes. We have used four images: Lena, F-16, Cameraman, and Baboon for encryption as shown in Figure 5. Figure 6 represents the cipher images of Lena, F-16, Cameraman, and Baboon, while Figure 7, Figure 8, Figure 9 and Figure 10 represent the histogram of plain and corresponding cipher images. The results of the MLC are shown in Table 10.
Figure 5. Host images of Lena, F-16, Cameraman, and Mandrill Baboon.
Figure 6. Cipher Images of (a) Lena. (b) F-16. (c) Cameraman. (d) Mandrill Baboon.
Figure 7. Lena.
Figure 8. F-16.
Figure 9. Cameraman.
Figure 10. Baboon.
Table 10. Results of majority logic criterion for host and cipher images.
Algorithm 2: Grayscale Image Encryption Process
1:
Initialization and Setup 
2:
Load the grayscale image data
3:
Generate a random 256-bit encryption key
4:
Define a custom S-box and MixColumns transformation matrix
5:
Preparation
6:
Flatten the image into a one-dimensional array of byte values
7:
Apply padding to ensure the length is a multiple of 16 bytes
8:
Divide the padded data into 128-bit segments for processing
9:
Encryption Process
10:
Initialize a “previous block” with random bytes for CBC mode
11:
for each 128-bit block in the image data do
12:
   Perform XOR between the current block and the previous block (CBC mode)
13:
   Add the round key to the current block
14:
   Perform byte substitution on the block using the S-box
15:
   Apply the row-shifting transformation
16:
   Execute column mixing using the predefined matrix
17:
   Set the “previous block” to the current encrypted block for the next iteration
18:
end for
19:
Post-processing
20:
Combine the encrypted blocks back into a single data array
21:
Reshape the array to match the original grayscale image dimensions
22:
The final encrypted image is the resulting processed data

9. Conclusions and Outlook

The search for supersingular elliptic curves over F p 2 is an interesting problem. The solution space has exponential size, the probability of finding an optimum is small, and a naive random search is not suitable to apply. As can be seen in this work, the use of an objective function considerably helps in the search for supersingular elliptic curves; it brings value to every curve in the space, and the notion of supersingular provides a new way of generating curves about the testing approach [17,18,44]. In the case of metaheuristics, the local search does not perform well, and our improved random search has good results. On the other hand, the genetic algorithm seems to be a good meta-heuristic for solving this problem too. The curves found could be used to generate cycles in the isogeny graph and to generate S-boxes for image encryption with good properties. Future research could be focused on the search for paths of supersingular curves in the isogeny graph. Also, we think that the search space can be reduced to the λ squares space, which will imply the creation of new binary and unary operations between lambdas. Finally, if a hybrid approach of metaheuristics is designed, it will provide a better balance between exploration and exploitation; the found curves should be considered for sequence generation.

Author Contributions

Conceptualization, I.M.-D.; Methodology, M.K.J.; Validation, R.A.; Formal analysis, I.M.-D.; Investigation, I.M.-D. and R.A.; Writing—original draft, I.M.-D.; Writing—review & editing, I.M.-D. and M.K.J.; Supervision, M.K.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The findings of this study are not supported by any data.

Conflicts of Interest

There are no perceived biases due to personal affiliations among the authors.

References

  1. Charles, D.X.; Goren, E.Z.; Lauter, K.E. Cryptographic Hash Functions from Expander Graphs. J. Cryptol. 2009, 22, 93–113. [Google Scholar] [CrossRef]
  2. De Feo, L.; Jao, D.; Plût, J. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 2014, 8, 209–247. [Google Scholar] [CrossRef]
  3. NIST. NIST Post-Quantum Cryptography Standardization Process. Second Round Candidates. 2017. Available online: https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-2-submissions (accessed on 20 November 2024).
  4. Azarderakhsh, R.; Campagna, M.; Costello, C.; De Feo, L.; Hess, B.; Jalali, A.; Jao, D.; Koziel, B.; LaMacchia, B.; Longa, P.; et al. Supersingular Isogeny Key Encapsulation. Third Round Candidate of the NIST’s Post-Quantum Cryptography Standardization Process. 2020. Available online: https://sike.org/ (accessed on 20 November 2024).
  5. Bernstein, D.J.; Tanja, L. Safe Curves for Elliptic-Curve Cryptography. Cryptology ePrint Archive. 2024. Available online: https://eprint.iacr.org/2024/1265 (accessed on 20 November 2024).
  6. Smit, R. The Discrete Logarithm Problem on Supersingular Elliptic Curves. Ph.D Thesis, University of Southampton, Southampton, UK, 2020. [Google Scholar]
  7. Colò, L.; Kohel, D. Orienting supersingular isogeny graphs. J. Math. Cryptol. 2020, 14, 414–437. [Google Scholar] [CrossRef]
  8. Biham, E.; Shamir, A. Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 1991, 4, 3–72. [Google Scholar] [CrossRef]
  9. Daemen, J.; Rijmen, V. The Design of Rijndael; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2. [Google Scholar]
  10. Bogdanov, A.; Knudsen, L.R.; Leander, G.; Paar, C.; Poschmann, A.; Robshaw, M.J.B.; Seurin, Y.; Vikkelsoe, C. PRESENT: An ultra-lightweight block cipher. In Cryptographic Hardware and Embedded Systems–CHES 2007: 9th International Workshop, Vienna, Austria, 10–13 September 2007, Proceedings 9; Springer: hlBerlin/Heidelberg, Germany, 2007; pp. 450–466. [Google Scholar]
  11. Mariot, L.; Jakobovic, D.; Bäck, T.; Hernandez-Castro, J. Artificial Intelligence for the Design of Symmetric Cryptographic Primitives. In Security and Artificial Intelligence; Springer: Cham, Switzerland, 2022; pp. 3–24. [Google Scholar]
  12. Picek, S.; Jakobovic, D. Evolutionary computation and machine learning in cryptology. In Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion, Lille, France, 10–14 July 2021; pp. 1147–1173. [Google Scholar]
  13. Carlet, C.; Durašević, M.; Gasperov, B.; Jakobović, D.; Mariot, L.; Picek, S. A New Angle: On Evolving Rotation Symmetric Boolean Functions. In Applications of Evolutionary Computation (Part of EvoStar); Springer: Cham, Switzerland, 2024; pp. 287–302. [Google Scholar]
  14. Carlet, C.; Djurasevic, M.; Jakobovic, D.; Mariot, L.; Picek, S. Evolving Constructions for Balanced, Highly Nonlinear Boolean Functions. arXiv 2022, arXiv:2202.08743. [Google Scholar]
  15. Mariot, L.; Picek, S.; Jakobovic, D.; Djurasevic, M.; Leporati, A. Evolutionary Construction of Perfectly Balanced Boolean Functions. arXiv 2022, arXiv:2202.08221. [Google Scholar]
  16. Abhishek, K.; E, G.D.P.R. Computational investment in generation of elliptic curves randomly over large prime fields. Concurr. Comput. Pract. Exp. 2022, 34, e6906. [Google Scholar] [CrossRef]
  17. Abhishek, K.; Raj, E.G.D.P. Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography. arXiv 2022, arXiv:2208.01634. [Google Scholar] [CrossRef]
  18. Banegas, G.; Gilchrist, V.; Smith, B. Efficient supersingularity testing over GF(p) and CSIDH key validation. Math. Cryptol. 2022, 2, 21–35. [Google Scholar]
  19. Arshad, S. Construction of confusion component based on the isogeny of elliptic curves. Multimed. Tools Appl. 2023, 83, 47735–47749. [Google Scholar] [CrossRef]
  20. Arshad, B.; Ehatisham-ul-Haq, M.; Hussain, Z.; Asghar, A. A novel approach for designing secure substitution boxes based on Catalan number and elliptic curve. Multimed. Tools Appl. 2024, 83, 10409–10425. [Google Scholar] [CrossRef]
  21. Alali, A.S.; Rashad, A.; Jamil, M.K.; Ali, J.; Afzal, G. Dynamic S-Box Construction Using Mordell Elliptic Curves over Galois Field and Its Applications in Image Encryption. Mathematics 2024, 12, 587. [Google Scholar] [CrossRef]
  22. Rashad, A.; Javed, A.; Ping, P.; Jamil, M.K. A novel S-box generator using Frobenius automorphism and its applications in image encryption. Nonlinear Dyn. 2024, 112, 19463–19486. [Google Scholar]
  23. Wang, M.; Dai, G.; Hu, H.; Pen, L. Selection of security elliptic curve based on evolution algorithm. In Proceedings of the 2009 International Conference on Computational Intelligence and Natural Computing, Wuhan, China, 6–7 June 2009; IEEE: Piscataway, NJ, USA, 2009; Volume 1, pp. 55–57. [Google Scholar]
  24. Basso, A.; Codogni, G.; Connolly, D.; De Feo, L.; Fouotsa, T.B.; Lido, G.M.; Morrison, T.; Panny, L.; Patranabis, S.; Wesolowski, B. Supersingular Curves You Can Trust. In Advances in Cryptology—EUROCRYPT 2023 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, 23–27 April 2023, Proceedings, Part II; Springer: Cham, Switzerland, 2023. [Google Scholar]
  25. Mula, M.; Murru, N.; Pintore, F. Random sampling of supersingular elliptic curves. Ann. Mat. Pura Appl. 2024, 1–43. [Google Scholar] [CrossRef]
  26. Jakobović, D.; Picek, S.; Martins, M.S.R.; Wagner, M. A characterisation of S-box fitness landscapes in cryptography. In Proceedings of the Genetic and Evolutionary Computation Conference, Prague, Czech Republic, 13–17 July 2019; pp. 285–293. [Google Scholar]
  27. Martínez-Díaz, I.; Legón-Pérez, C.M.; Rojas, O.; Sosa-Gómez, G.; Oliva, D. Local Search Trajectories over S-box space. J. Inf. Secur. Appl. 2022, 69, 103272. [Google Scholar] [CrossRef]
  28. Kuznetsov, O.; Poluyanenko, N.; Kuznetsova, K.; Frontoni, E.; Arnesano, M. Hybrid Population-Based Hill Climbing Algorithm for Generating Highly Nonlinear S-boxes. Computers 2024, 13, 320. [Google Scholar] [CrossRef]
  29. Hayat, U.; Azam, N.A. A novel image encryption scheme based on an elliptic curve. Signal Process. 2019, 155, 391–402. [Google Scholar] [CrossRef]
  30. Haider, T.; Azam, N.A.; Hayat, U. Substitution box generator with enhanced cryptographic properties and minimal computation time. Expert Syst. Appl. 2024, 241, 122779. [Google Scholar] [CrossRef]
  31. Hayat, U.; Azam, N.A.; Asif, M. A method of generating 8 × 8 substitution boxes based on elliptic curves. Wirel. Pers. Commun. 2018, 101, 439–451. [Google Scholar] [CrossRef]
  32. Azam, N.A.; Murtaza, G.; Hayat, U. A novel image encryption scheme based on elliptic curves and coupled map lattices. Optik 2023, 274, 170517. [Google Scholar] [CrossRef]
  33. Azam, N.A.; Haider, T.; Hayat, U. An optimized watermarking scheme based on genetic algorithm and elliptic curve. Swarm Evol. Comput. 2024, 91, 101723. [Google Scholar] [CrossRef]
  34. González, J. On the p-th division polynomial. J. Number Theory 2022, 233, 285–300. [Google Scholar] [CrossRef]
  35. Silverman, J.H. The Arithmetic of Elliptic Curves; Springer: New York, NY, USA, 2009; Volume 106. [Google Scholar]
  36. Delahaye, D.; Chaimatanan, S.; Mongeau, M. Simulated annealing: From basics to applications. In Handbook of Metaheuristics; Springer: Cham, Switzerland, 2019; pp. 1–35. [Google Scholar]
  37. Whitley, D. Next generation genetic algorithms: A user’s guide and tutorial. In Handbook of Metaheuristics; Springer: Cham, Switzerland, 2019; pp. 245–274. [Google Scholar]
  38. Morales-Castañeda, B.; Zaldívar, D.; Cuevas, E.; Fausto, F.; Rodríguez, A. A better balance in metaheuristic algorithms: Does it exist? Swarm Evol. Comput. 2020, 54, 100671. [Google Scholar] [CrossRef]
  39. Eisenträger, K.; Hallgren, S.; Leonardi, C.; Morrison, T.; Park, J. Computing endomorphism rings of supersingular elliptic curves and connections to path-finding in isogeny graphs. Open Book Ser. 2020, 4, 215–232. [Google Scholar] [CrossRef]
  40. Rashad, A.; Jamil, M.K.; Alali, A.S.; Ali, J.; Afzal, G. A robust S-box design using cyclic groups and image encryption. IEEE Access 2023, 11, 135880–135890. [Google Scholar]
  41. Ali, J.; Jamil, M.K.; Alali, A.S.; Rashad, A.; Afzal, G. A medical image encryption scheme based on Möbius transformation and Galois field. Heliyon 2024, 10, 23652. [Google Scholar] [CrossRef]
  42. Hazzazi, M.M.; Gulraiz; Ali, R.; Jamil, M.K.; Nooh, S.A.; Alblehai, F. Cryptanalysis of hyperchaotic S-box generation and image encryption. AIMS Math. 2024, 9, 36116–36139. [Google Scholar] [CrossRef]
  43. Ali, J.; Jamil, M.K.; Ali, R.; Gulriaz. Extended fractional transformation based S-box and applications in medical image encryption. Multimed. Tools Appl. 2025. [Google Scholar] [CrossRef]
  44. Abhishek, K.; Raj, E.G.D.P. Computation of trusted short weierstrass elliptic curves for cryptography. arXiv 2022, arXiv:2208.01635. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.