ArticlePDF Available

New Dynamical Key Dependent S-Box based on chaotic maps

Authors:
  • Al-Mustansiriya UniversityBaghdad,Iraq

Abstract and Figures

The strength and security of cryptographic algorithms is determined by substitution non-linear S-boxes, so the construction of cryptographically strong S-boxes is important in the design of secure cryptosystems. In In this paper, an efficient method for designing dynamical key dependent S-boxes based on 2D logistic map and 2D cross map. S-box is a nonlinear transformation where each byte of the State is replaced by another byte using the substitution table. Each individual byte of State is mapped into a new byte by using 2D cat map. One S-box is used for each message. The aim of the proposed approach is to generate more secure S-boxes. The generated S-boxes will increase the complexity and has better results in security analysis. The new S-box is analyzed and tested for the following criteria: avalanche effect, strict avalanche effect, key sensitivity, differential and linear cryptanalysis. All the results have shown that the proposed method is a good candidate for designing dynamical S-boxes that can be widely used in block cipher.
Content may be subject to copyright.
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. IV (July Aug. 2015), PP 91-101
www.iosrjournals.org
DOI: 10.9790/0661-174491101 www.iosrjournals.org 91 | Page
New Dynamical Key Dependent S-Box based on chaotic maps
F. J. Luma1, H. S. Hilal1 and A. Ekhlas2
1, Department of Computer Science, University of Technology,
P.O Box 35092, Baghdad, www.uotechnology.edu.iq
2 Department of Computer Science, Mustansiriyah University, baghdad, Iraq,
Abstract: The strength and security of cryptographic algorithms is determined by substitution non-linear S-
boxes, so the construction of cryptographically strong S-boxes is important in the design of secure
cryptosystems. In In this paper, an efficient method for designing dynamical key dependent S-boxes based on 2D
logistic map and 2D cross map. S-box is a nonlinear transformation where each byte of the State is replaced by
another byte using the substitution table. Each individual byte of State is mapped into a new byte by using 2D
cat map. One S-box is used for each message. The aim of the proposed approach is to generate more secure S-
boxes. The generated S-boxes will increase the complexity and has better results in security analysis. The new S-
box is analyzed and tested for the following criteria: avalanche effect, strict avalanche effect, key sensitivity,
differential and linear cryptanalysis. All the results have shown that the proposed method is a good candidate
for designing dynamical S-boxes that can be widely used in block cipher.
Keyword: Dynamical S-Box, Block Cipher, Key-Dependence, 2D logistic map, 2D cross map, 2D cat map.
I. Introduction
The S-box is the core component of most block ciphers, such as the Data Encryption Standard (DES),
the Advanced Encryption Standard (AES) and so on. A strong block cipher should be resistant to various
attacks, such as linear and differential cryptanalysis. This is generally achieved if the S-boxes used satisfy a
number of criteria, such as the bijection, avalanche effect, the strict avalanche criteria (SAC) and so on. S-boxes
are fixed and they used in SPN cipher systems as the important nonlinear component. The S-box used in
encryption process could be chosen under the control of key, instead of being fixed.
According to the chaotic systems properties such as the ergodic, mixing and random-like behavior, it
seems to be convenient and simple to obtain "good"
S-Boxes by modifying slightly the initial conditions or system parameters. Many approaches for obtaining S-
Boxes based on chaos have been
presented:-
Jakimoski and Kocarev, 2001 were presented the first chaotic S-boxes. They have proposed a four-step
method to create Sboxes by using chaotic maps, which includes choosing a chaotic map, discretizing the
chaotic map, key Two well-known chaotic maps (exponential and logistic) are used to generate the S-boxes,
and suggested key-dependent chaotic S-boxes to enhance the security, in which the parameters and the
number of iterations of the discretized exponential map were considered as the keys [1]. Their methodology
includes N-th iteration of chaotic for each logistic map, where they choose N=1000.
In 2005, Tang et al., proposed a method based on baker map. In this method, by iterating a chaotic logistic
map, a 8-bit sequence of binary random variables is generated from a real value trajectory obtained and turn
it to a decimal integer on the range of 0-2, then an integer table can be obtained. Then a key-dependent
permuting is used to shuffle the table nonlinear by a Baker map [2].
In [3], another method proposed by Tang and Liao that is based on discretized chaotic map. This method
consists of: First, an integer sequence that can be regarded as secret key K, K= X0= {1, 2, ..., 2 }, is
obtained in an arbitrary way. Second, for a given M = 2n and A, the chaotic map iterates more than k times
with the initial value X0, one can obtain a permuted integer sequence {X}. Finally, by translating the {X} to
a 2n/2×2n/2 table, the S-box is obtained.
In 2007, Chen et al., proposed another method for designing S-boxes based on three-dimensional baker map
which has more intensive chaotic characters than the two-dimensional one [4].
Muhammad Asim et al, 2007 propose method based on the mixing property of the piecewise linear chaotic
map (PLCM). In this method, the output range [0.1, 0.9] is divided into 256 intervals of equal length. Label
each region sequentially from 0 to m, where m is equal to 255. Iterate the PLCM using the selected initial
condition.
Whenever the PLCM visits a particular region, store that number in an array S [5].
In 2009, R.Yin, propose a new key-dependent S-box based on the iteration of continuous logistic chaotic
maps. Since S-boxes operate in the discrete state space, they making a mapping between these discrete
New Dynamical Key Dependent S-Box based on chaotic maps
DOI: 10.9790/0661-174491101 www.iosrjournals.org 92 | Page
states and the continuous states of chaotic systems [6].
J. Peng, S. Jin, L. Lei, R. Jia, 2012 propose a method for generating dynamical key-dependent S-boxes
based on hyperchaotic Chen system . The secret key first is mapped to the initial condition and control
parameter for the hyperchaotic system. Then, iterate the Chen system to generate a hyperchaotic sequence
which is subsequently used to construct the S-box [7].
Mona Dara and Kooroush Manochehri, 2013 propose a new method based on chaotic logistic map that uses
cipher key to generate initial value. They use cipher key to generate initial value of logistic map (X0) and
outputs of logistic map as the values dynamic S-box [8].
Cristian-Iulian Rîncu, Vasile-Gabriel IANA, 2014 combine simple chaotic maps, which are frequently used
in chaos based cryptography.
They use three of the chaotic maps Logistic map, Tent map and Piece-Wise Linear Chaotic Map. These
maps will be iterated starting from the initial condition x0, the output becoming the next initial condition. a
number of iterations of the three chaotic maps are performed, equal to the value of the S -box dimension, in
order to ensure the beginning of a normal chaotic operating mode. Then the iteration of the three chaotic
dynamical systems is continuing and at each iteration the real value is kept of each system. The three real values
are transformed into integer values [9]. In this paper, we propose new method based on the mixing property of
the chaotic maps (2D logistic map, 2D cross map) to design dynamical dependent key S-box. One S-box is used
to encrypt each message. Each byte is permuted using 2D cat map before substituted with the byte in the
proposed S-box.
The remaining part of the paper is organized as follows: the chaotic functions analysis is given in
Section 2. The description of the algorithm is
given in Section 3. Section 4 presents the criteria for a ‗‗good n × n bit a cryptographically S-box. Section 5
presents the experiment results of the
propose S-box.
II. Basic Theory.
In this paper we used three chaotic maps: 2D cross map, 2D logistic map and 2D cat map to construct the new
S-box.
2.1 2D cross map.
(1)
Where μ and k are the control parameters of the system, respectively. When μ=2 and k=6, this system exhibits a
great variety of dynamics behavior 10][.
Manisha Raj1, Shelly Garg [11] proposed a new image encryption algorithm based on DNA sequence addition
and five chaotic maps (Logistic Map, Cross Chaotic Map, Duffing map, Tinkerbell map, Gingerbreadman map).
The chaotic maps are compared through the simulation results, histogram analysis and correlation analysis.
They have found out that Cross Chaotic Map, showed best results than other chaotic maps. It is sensitive to the
secret keys, it has larger key space, and it gives best encrypted image.
2.2 2D logistic map.
One of the most known and widely used chaotic systems is the 1 D Logistic map, which is defined as follows
[11] :
(2)
where µ is the control parameter. The system is in chaos on condition that 3.569<μ<4.0.
New Dynamical Key Dependent S-Box based on chaotic maps
DOI: 10.9790/0661-174491101 www.iosrjournals.org 93 | Page
The 2D logistic map is an extension of 1D logistic map. It increases the key space as well as the dependency on
control parameters. In 2D logistic map, it is bit harder to guess the secret information. It also exhibits greater
amount of chaotic behavior on the generation of sequence [12]. In overall, it increases the complexity of the
algorithm.
(3)
Where (xi,yi) is the pair-wise point at the ith iteration and μ1, μ2, μ2, γ1 and γ2 are the system parameters.
When 2.75 <μ1<=3.4, 2.75 < μ2<=3.45, 0.15 <γ1<=0.21, 0.13 <γ2<=0. 15, the system is in chaotic state and can
generate two chaotic sequences in the region (0, 1].
The 2D logistic map has a higher complexity compared to the conventional 1D logistic map. The
complexities of the 1D and 2D logistic maps can be measured by using various means such Information Entropy
and Lyapunov Exponent with respect to different pairs of initial values [13]. By this comparison they found that
the 2D logistic map has a higher information entropy scores than 1D logistic map, which implies that its
trajectory is more random-like. Meanwhile, the 2D logistic map also has a larger Lyapunov exponent than the
1D logistic map, which implies that the 2D logistic map is more dynamic.
2.3 2D Cat Map.
A 2D Cat map is first presented by V.I. Arnold in the research of ergodic theory. Let the coordinates of a
positions P = {(x, y) | x, y = 1, 2, 3. . . N}, a 2D Cat map with two control parameters [14] is as follows:
(4)
Where, a, b are positive integers which are control parameters and (x‘, y‘) is the new position of the original
pixel position (x, y) of N x N plain-image when cat map is applied once to the original. By replacing the
position of the image pixel points with new coordinate, cat map permutes/shuffles the organization of pixels of
plain-image. After several iterations, the correlation among the adjacent pixels is disturbed completely and the
image appears distorted and meaningless.
Inverse transformation for deciphering is given as follows: -
(5)
III. Design Dynamical Key Dependent S-Box.
Substitution is a nonlinear transformation which performs confusion of bits. A nonlinear transformation
is essential for every modern encryption algorithm and is proved to be a strong cryptographic primitive against
linear and differential cryptanalysis. Nonlinear transformations are implemented as lookup tables (S-boxes). The
central idea of the proposed S-box is based on the mixing property of chaotic nonlinear dynamical systems. The
proposed S-box is a table of 16 × 16 integer values (256 bytes). The S-box is created by using 2d logistic map
and cross map. The main idea of the proposed S-box consists of the following major steps:-
Step1:- the initial condition (x0 and y0) is input to the 2D cross map and 2D logistic map. These numbers are
floating point numbers where the precision is 1016 for each of x0 and y0, considered as the keys of the proposed
S-box.
Step2:- Iterate the cross map and logistic map 100 times and ignore the results, in order to eliminate the
transient effect of chaotic map.
Step3:- Iterate the cross map and logistic map one time. The two outputs of cross map(x1 and y1 ) are Xored
with the two outputs of logistic map (x2 and y2 ) :-
New Dynamical Key Dependent S-Box based on chaotic maps
DOI: 10.9790/0661-174491101 www.iosrjournals.org 94 | Page
(6)
Step4:- the new outputs (nx and ny) are translated to integer numbers belong [0..255] by using the following
equation:-
(7)
Step5: the two integer numbers 1 2 are inserted to the S-box table while they are not found in the S-box table in
order to avoid repeating the same numbers.
Step6:- repeat from step 2 until the S-box contains a permutation of all possible 256 byte values.
Table (1) shows an example of S-box created from the initial conditions (x0 = 0.2376589876543123 and y0=
0.9765432786554125).
S-box is a nonlinear transformation where each byte of the State is replaced by another byte using the
substitution table. Each individual byte of State is mapped into a new byte in the following way (as shown in
figure (1-a)): The leftmost 4 bits of the byte are used as a row value and the rightmost 4 bits are used as a
column value. These row and column values are permuted to anther values for row and column by using the cat
chaotic map eq(4).
The byte in the new row and column is then served as indexes into the S-box to select a unique byte output
value.
For example, if S-box in figure 1 is used to substitute the byte (190) which
is 10111110 in binary, the leftmost 4 bits (R=1011 = 11=b) is the row value and the rightmost 4
bits(C=1110=14=e) is the column value.
This row and column values are diffuses using cat map eq(4) (with the
control parameters a =41and b=68) as follows;
(8)
Finally, use the new row (9) and column (2) as index to find the substituted byte in the S-box (in table 1) which
is the byte (102).
The inverse substitute byte transformation is performed in the following way (as shown in figure (1-
b)): the byte is search in the S-box table and take its
row and column. These row and column values are return to their real value by using the inverse of cat map.
Then the new row and column is
concatenate to make the original byte.
For example, the substituted byte (102) from previous example can be return to its original byte value in the
following way: search the S-box table to find the byte (102) and take its row (9) and column (2). This row and
column values input to inverse cat map to produce the original row and column as follows:
(9)
So, the row (11) which is in binary (1011) and column (14) which is in binary (1110) are concatenating to
produce the original byte
(10111110=190).
New Dynamical Key Dependent S-Box based on chaotic maps
DOI: 10.9790/0661-174491101 www.iosrjournals.org 95 | Page
Table(1): S-box created from the 2d logistic map and cross map using the proposed procedure.
New Dynamical Key Dependent S-Box based on chaotic maps
DOI: 10.9790/0661-174491101 www.iosrjournals.org 96 | Page
IV. Criteria for a ‘‘good n × n bit a cryptographically S-box.
The only nonlinear components in cryptosystems are the S -boxes. The differential cryptanalysis was
introduced by Biham and Shamir for DES-like
cryptosystems [15]. After that Dawson and Tavares [16] expanded S-boxes‘ design criteria based on information
theory and revealed how S-boxes
provided immunity to the differential attack. In general, some cryptographic properties are widely accepted as
the essential properties for ―good‖ S-boxes
and can be used to evaluate the S-box [18,17,8, 9, 6, 7,4] .
There are several properties which are cryptographically desirable in an s-box. They are:-
The Bijective Property.
The avalanche effect.
The strict avalanche criteria (SAC).
Differential attacks.
Nonlinearity.
Key sensitivity.
4.1 The Bijective Property.
An n x n bit s-box need to be a bijection that is, that every possible input
vector x maps to a unique output vector y. The bijective property is checked by using the method introduced in
the literature [18, 19]. If the Boolean function f(x)=(f1,f2,….,fn) of an S-box such that: -
(8)
,where ai ϵ {0,1} , (a1,a2,…,an)=(0,0,…,0) and wt () is the Hamming weight (the Hamming weight is the
number of "1" bits in the binary sequence, the S-box is bijective.
New Dynamical Key Dependent S-Box based on chaotic maps
DOI: 10.9790/0661-174491101 www.iosrjournals.org 97 | Page
4.2 The avalanche effect.
Any secure component in a cryptographic algorithm has one of the key characteristic representatives
which is the avalanche effect [9]. By presenting this characteristic, we can sure that half of the S-box output bits
will be modified when complementing a single bit in the input vector. These characteristics are tested according
to the avalanche vectors by using [9]:
(9)
Where the difference between x and xi lies only in i bit. When the
complementing of any unique input bit determined the modification of N/2 output bits on average, the avalanche
effect is fulfilled.
4.3 The strict avalanche criteria (SAC).
The strict avalanche criterion (SAC) was introduced by A.F. Webster and
Tavares in 1985.SAC is satisfied when single input bit in an S-box is changed, each output bit should change
with a probability of one half. The
SAC of an S-box is tested by constructing the dependence matrix. If each element and the mean value of the
matrix are both close to the ideal value 0.5, the S-box is considered as nearly fulfills the SAC. The dependence
matrix should be calculated According to [20] by following those steps: -
1. Let x a random vector of an n-bits and its m-bits ciphertext y, y=s(x).
2. A set of n-vectors (xl,x2, ... ,xn), such that x and xj differ only in one bit j, for all j 1 j n . Another set
of vectors (y1,y2, ... ,yn) is created such that yj=s(xj).
3. The avalanche vectors (v ,v ,..,v ) is calculated by:
(10)
4. The bit i of vj is added to element aij of m x n dependence matrix A.
5. Repeat these steps for k random vector x.
6. Each element of the matrix A is divided by k.
The value of each element in A (aij) varies from 0 to 1 which gives an idea about plaintext bit j and
ciphertext bit i. If aij is close to 1 then indicate that if bit j is complemented then bit i should change its value. If
all element of the matrix A have a value close to 0.5, then the S-box satisfies the SAC criterion.
4.4 Differential attacks.
Differential cryptanalysis was introduced the first time by Biham and Shamir in [15]. The S-box should
have the differential uniformity to resist the differential cryptanalysis. This mean the nonlinear transformation S-
box should ideally have differential uniformity. The differential approximation probability of a given S-box,
DPs, is a measure for differential uniformity and is defined as [17]: -
(11)
Where where X is the set of all possible input values, elements, x is the input differential and y is the
intruder first calculates differential pairs (x, y) fory input differential x and the output differential
2n is the number of its output differential. The each=s( xS)-boxs(xwhere⨁△ thex),then find the result of DPs.
This equation means that the DPs is the maximum probability of the output
differential y when the nonzero input differential is x. Ideally, a nonlinear S-Box should have a differential
uniformity: an input differential x is mapped to a unique output differential y.
4.5 Nonlinearity.
Linear cryptanalysis studies linear probability approximations of the cryptosystem. The S-box must
resistant to this type of attack. The goal is to construct linear equations between input plaintext and output cipher
text and enumerate all linear approximations of the S-Box in a linear approximation table. Otherwise, the
nonlinearity is measured by calculating probability approximation (LPs) [17]: -
New Dynamical Key Dependent S-Box based on chaotic maps
DOI: 10.9790/0661-174491101 www.iosrjournals.org 98 | Page
(12)
Where a, b ϵ {I, 2, .., 2n-1}, x.a is the parity of the binary product of x and a. To increase linear attack
complexity, the value of LPs must be decreased.
4.6 Key sensitivity.
Sensitivity analysis is the study of how the uncertainty in the output of a model can be apportioned to
different sources of uncertainty in the model input [21]. An essential factor for the S-Box is the sensitivity on
the key. In other words, a small changing in the keys should cause a large change in the S-Box. This means that
a small difference on key values, the created S-boxes should be completely uncorrelated.
To ensure the sensitivity of the key, the analysis is done using Pearson's correlation coefficients.
Consider a pair of S-boxes given by: S1 = [x1, . . . , xN] and S2 = [y1, . . . , yN]. Therefore, the corresponding
correlation coefficient is:
To ensure the sensitivity of the key, the analysis is done using Pearson's
value of CS1, S2 is to ±1, the stronger the correlation between the two S-boxes. In the case of two independent
S-boxes, the value of CS1,S2 is equal to0.
5. Experiment results.
In this section, we construct 100 dynamical key dependent S-Box from nearby or successive keys and
the Criteria for good S-box results are as
follows: -
1. The Bijective Property: -All the S-boxes are bijective. The value of all generated S-box is 128, which is
the same as the ideal value. This mean that in each S-box every possible input vector x maps to a unique
output vector y.
2. The avalanche effect: - we test the avalanche effect for the S-box in table (1). Figure (2) shows the
frequency of the number of the modified bits belonging to the output values obtained after changing each of
the input N positions for all of the S-box elements in table(1). Because the complementing of any unique
input bit determined the modification of N/2 (8/2=4) output bits on average, the avalanche effect is
considered fulfilled. We found that all the 100 created S-boxes are fulfilled the avalanche effect.
New Dynamical Key Dependent S-Box based on chaotic maps
DOI: 10.9790/0661-174491101 www.iosrjournals.org 99 | Page
Figure (2): The results of the avalanche effect test.
3. The strict avalanche criteria (SAC):- the dependence matrix for the S-box in table (1), with 8 input bits, it
is not difficult to compute a complete dependence matrix containing the elements for all the 2N input
vectors that can appear, is calculated and shown in table (2). The mean value is 0.51342 which is close to
ideal value (0.5). All the mean values of the dependence matrixes of 100 S-boxes are located within [0.46,
0.53], which are also close to the ideal value 0.5, indicating that all the S-boxes have excellent SAC
property.
4. Differential attacks: - The DPs of the S-Box in table (1) is calculated and the result is 12/256 which is close
to the ideal value (2-6 DPAES-SBox 2-4). All the DPs of 100 S-boxes are located within [10/256, 12/256],
which are also close to the ideal value, indicating that all the S-boxes have good immunity against differential
attacks.
New Dynamical Key Dependent S-Box based on chaotic maps
DOI: 10.9790/0661-174491101 www.iosrjournals.org 100 | Page
5. Nonlinearity: - The linear approximation probability of the S-Box in table (1) is evaluated to LPs=0.07910.
Linear approximation probability of statistic AES S-Box varies from 2-2 to 2-3, so decreasing LPs, leads to
increasing linear attack complexity. All the LPs of 100 S-Box are calculated and the average of LPs is
0.0760089. This means that all the S-boxes can resistant to this type of attack.
6. Key sensitivity: - In order to investigate the S-box‘s sensitivity to the secret keys, the Pearson's correlation
coefficients between the S-boxes in table (1) and table (3) with the key1 and key2 are calculated. In here, key1
is set to
x0 = 0.2376589876543123 and y0= 0.9765432786554125 key2 is set to
x0 = 0.2376589876543124 and y0= 0.9765432786554126
Where the key1 is slightly changed to key2. The S-boxes generated by key1 and key2 are shown in table (1) and
table (2), respectively, and the correlation coefficient between them -0.0199495, indicating that the S-boxes are
very sensitive to the keys.
Table (2): S-box created from the 2d logistic map and cross map using the proposed procedure.
New Dynamical Key Dependent S-Box based on chaotic maps
DOI: 10.9790/0661-174491101 www.iosrjournals.org 101 | Page
V. Conclusions
The S-box is the core component of most block ciphers. In this paper, new
method for creating dynamical key-dependent S-boxes based on 2D logistic map and 2D cross map is presented.
The results show that generated S- Boxes have very low linear and differential probabilities and satisfy also the
avalanche criterion and strict avalanche criterion (SAC). In addition, the S-box‘s sensitivity to the keys is
investigated by the correlation coefficient. The algorithm used to generate S-boxes and the selected chaotic
maps ensure a simple and quick implementation using simple digital computing systems. Because the proposed
S-box is satisfied all the criteria of good S-box, we can used for designing block cipher with dynamical S-boxes.
References
[1]. Jakimoski G, Kocarev L. ―Chaos and cryptography: block encryption ciphers‖. IEEE Trans Circ SystI 2001;48(2):1639 boxes
based on chaotic maps, Chaos Solitons Fractals, 23(2): 413-419.
[2]. Tang, G., X. Liao and Y. C hen, 2005. ―A novel method cryptography for designing S-boxes based on chaotic maps‖, Chaos 40(1):
505-519. Solitons Fractals, 23(2): 413-419.
[3]. Tang, G. and X. Liao, 2005. ―A method for dynamical S-boxes based on discretized chaotic map‖, Chaos Solitons Fractals, 23(5):
1901-1909.
[4]. Chen, G., Y. Chen and X. Liao, 2007. ―An extended method for obtaining S -boxes based on three- dimensional chaotic baker maps‖,
Chaos Solitons Fractals, 31(3): 571-579.
[5]. Muhammad Asim et al. "Efficient and Simple Method for Designing Chaotic S-Boxes‖, ETRI Journal, Volume 30, Number 1,
February 2008.
[6]. Ruming Yin, Jian Yuan, Jian Wang, Xiuming Shan, Xiqin Wang, ―Designing key-dependent chaotic S-box with larger key space‖,
Chaos, Solitons and Fractals 42 (2009) 25822589.
[7]. J. Peng, S. Jin, L. Lei, R. Jia, ― A Novel Method for D esigning Dynamical Key-Dependent S-Boxes based on Hyperchaotic System‖,
International Journal of Advancements in Computing Technology(IJACT)
[8]. Volume4, Number18,October. 2012, doi:10.4156/ijact.vol4.issue18.33.
[9]. Mona Dara and 2Koorou sh Manochehri, ―A Novel Method for Designing S-Boxes Based on Chaotic Logistic Maps Using Cipher
Key‖, World Applied Sciences Journal 28 (12): 2003 -2009, 2013 ISSN 1818-4952.
[10]. Cristian-Iulian Rîncu, Vasile-Gabriel IANA, ―S-Box Design Based on Chaotic Maps Combination‖, 978-1-4799-2385-4/14/$31.00
©2014 IEEE.
[11]. Ling Wang, Quen Ye Yaoqiang, Yongxing zou , Bo Zang, ―An Image Encryption Scheme based on cross chaotic map‖ 2008 IEEE.
[12]. Manisha Raj , Shelly Garg , ― An Innovative Approach: Image Encryption with Chaotic Maps using DNA Addition Operation‖,
International Association of Scientific Innovation and Research (IASIR), IJSWS 14-337; © 2014, IJSWS All Rights Reserved.
[13]. Musheer Ahmad and M. Shamsher Alam, ―A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping‖,
Musheer
[14]. Ahmad et al /International Journal on Computer Science and Engineering, Vol.2(1), 2009, 46-50.
[15]. Yue Wu, Gelan Yang, Huixia Jin and Joseph P. Noonan, ―Image Encryption using the Two -dimensional Logistic Chaotic Map‖,
[16]. Li S, Mou X and Cai Y, ―Pseudo random bit generator based on couple chaotic systems and its application in stream cipher
cryptography‖, Lecture notes in computer science, 2247, 2001, 316-329, Springer-Verlag, Berlin.
[17]. Biham E, Shamir A. ―Differential cryptanalysis of DES-like cryptosystems‖. J Cryptol 1991; 4(1): 3 – 72.
[18]. Dawson M, Tavares SE. ―An expanded set of S -box design criteria based on information theory and its relation to differential- like
attacks‖. In: Advances in cryptology: Proc of Eurocrypt 91. New York: Springer- Verlag; 1991. pp. 35267.
[19]. Ghada Zaibi, Abdennaceur Kachouri, Fabrice Peyrard and Daniele Foumier-Prunaret. ―On Dynamic chaotic S-BOX‖, 978-1-4244-
4624-7/09/$25.00 ©2009 IEEE.
[20]. Carlisle Adams and Sta fford Tavares and Stafford. ―The Structured Design of Cryptographically Good S-Boxes‖. Jour nal of
Cryptology (1990) 3:27-41 International Association for Cryptologic Research.
[21]. Adamas C, Tavares S. ―Good S-boxes are easy to find‖. In: Advances in cryptology: Proc. of CRYPTO 89. In: Lecture notes in
computer science; 1989. pp. 6125.
[22]. A. F. Webster and S. E. Tavares, "On the Design of S-Boxes", in Advances in Cryptology: Proc. of CRYPTO '85, Springer-Verlag ,
Berlin,1986, pp. 523-534.
[23]. Ascough II, J.C., T.R. Gr een, L. Ma, and L.R. Ahjua. ―Key Criteria and Selection of Sensitivity Analysis Methods Applied to N atural
Resource Models‖. 1USDA-ARS, Great Plains Systems Research Unit, Fort Collins, CO 80526.
... The purpose of using chaos refers to its basic characteristic settings (random-behaviour, sensitivity to initial conditions and control parameters) to meet the classic Shannon provisions of confusion and diffusion [2]. Many chaotic maps [3][4][5], their improvements [6][7][8] and their mixed modes [9][10][11] have been previously presented, such as logistic map, cat map, uniform map and Arnold map. This work focused on the discretetime logistic map, which functions as the mathematical core to secret-key encryption algorithms for image data. ...
... Many chaotic cryptosystems [3][4][5][6][7][8][9][10][11] have been previously suggested in the research literature. These systems can generally be divided into two categories: chaotic block-ciphers and chaotic stream-ciphers. ...
... According to [9,19,20], an encryption system requires more than a 2 100 strong secret key, which is capable of generating chaotic results to avoid bruteforce attacks. In the proposed work, the key space is [2 128 ], due to the used 128-bit secret-key size, in the initialization step. ...
Article
Full-text available
Recently, chaos theory has appeared as the core of many applications in cryptography, information hiding and forensics. One of these chaotic maps is the logistic map. Usually, the secret key (initial condition and control parameter), must be greater than 214 bytes to avoid any cryptographic attack. However, remembering such a long key proves impractical. An ID-based random number generator is used to generate TRNG or PRNG. In this work, I propose an FPTRNG to be used as the secret key for the logistic map. To address the design need, a symmetric logistic-map-based cryptographic system is implemented using confusion and diffusion. The design is tested with image data types. The experiment analyses the following parameters: key space, key sensitivity, sensitivity, autocorrelation, histograms, information entropy, randomness and execution speed. The results show the effectiveness of the proposed technique for secure image data and applicability to multimedia security.
... According to [9, 19, 20], they used randomness tests to determine if the encryption is a good score for randomness or not. The results of these tests used the ...
... The purpose of using chaos refers to its basic characteristic settings (random-behaviour, sensitivity to initial conditions and control parameters) to meet the classic Shannon provisions of confusion and diffusion [2]. Many chaotic maps [3][4][5], their improvements [6][7][8] and their mixed modes [9][10][11] have been previously presented, such as logistic map, cat map, uniform map and Arnold map. This work focused on the discretetime logistic map, which functions as the mathematical core to secret-key encryption algorithms for image data. ...
... Many chaotic cryptosystems [3][4][5][6][7][8][9][10][11] have been previously suggested in the research literature. These systems can generally be divided into two categories: chaotic block-ciphers and chaotic stream-ciphers. ...
... First permutation transformation permits the audio block by using standard map. Each byte in the resulted block is substituted by the byte in Dynamical Key Dependent Sbox that is generated based on chaotic maps in reference [14]. Then the block is Xored with the key. ...
... The substitution S-box is a nonlinear transformation where every byte of the input is supplanted by an alternate byte utilizing the S-box table. Dynamical Key Dependent S-box is created by using the algorithm proposed in reference [14]. The substitution S-box is a table of 16 × 16 integer values (256 bytes). ...
Conference Paper
Full-text available
In this paper, novel block encryption algorithm for audio file is proposed based on two chaotic maps: 2d Standard map and 2D Baker map.. The proposed algorithm encrypts and decrypts a block size of 256 bytes. Each block is input into four transformations: First permutation, Xor adding, Substitution and Last permutation. In First and Last permutation transformations the audio block is permuted using chaotic 2D Standard map. Then the resulted block is Xored with the key block and then the resulted block is substituted using chaotic substitution S-box. This S-box is permitted one time for only even audio block by using chaotic 2D Baker map. This algorithm was performed and analyzed with audio files of varies sizes of a wave file extension. The result from key space analysis, statistical analysis, MSE (mean square error) analyses, PSNR (Peak signal to noise ratio) analyses and entropy analyses showed that the algorithm is not vulnerable to brute force attacks, statistical attacks and achieve higher level of security.
... Although current cryptosystems offer various S-box solutions (Ahmad et al., 2015;Kumar, Munjal & Sharma, 2011;Sasi, Dixon & Wilson, 2014;Ebrahim, Khan & Khalid, 2014), all these S-box solutions are not optimally effective in dynamic and randomized properties at the time of generating dynamic S-box matrix with all 256 values at different positions. As the technology is evolving day by day (Niksaz, 2015;Tewari & Verma, 2016;Wang & Liu, 2014;Shoukat et al., 2020a) for the purpose of resisting differential and linear attacks as discussed in Ara, Shah & Prabhakar (2018) and Luma, Hilal & Ekhlas (2015). The cryptographic strength of ciphers can be increased by generating S-boxes dynamically, as stated in Hosseinkhani & Haj Seyyed Javadi (2012) and Shoukat et al. (2020b) because the encryption key is the only secret and changing parameter during encryption process (Agarwal, Singh & Kilicman, 2018;Ahmed & Elkamchouchi, 2013). ...
Article
Full-text available
The biggest challenge for symmetric cryptosystems is to replace their static substitution with dynamic substitution, because static substitution S-boxes make the symmetric block ciphers more vulnerable to attacks. Previous well-known dynamic key-dependent S-boxes are lacking in dynamicity and do not provide optimal security for symmetric block ciphers. Therefore, this research aims to contribute an effective and secure method for designing key-dependent dynamic S-box with dynamic permutations to make the symmetric block ciphers optimally secure. The proposed S-box method has been experimentally evaluated through several measures such as bit independence criteria, non-linearity, hamming distance, balanced output, strict avalanche criteria including differential and linear approximation probabilities. Moreover, the randomness properties of proposed method have also been evaluated through several standard statistical tests as recommended by the National Institute of Standards and Technology (NIST). Thus, the results show that the proposed method, not only retains effective randomness properties but it also contains, good avalanche effect (up to 62.32%) which is significantly improved than others. Therefore, the proposed substitution method is highly sensitive to the secret key because, only a single bit change in key generates an entirely new S-box with all 256 values at different positions. Thus, the overall evaluation shows that the proposed substitution method is optimally secure and outperforming as compared to the existing S-box techniques. In future, the proposed method can be extended for different key sizes (192-256 bits) or even more.
... Literature [25] proposed a DNA based key-dependent ShiftRows transformation approach for AES. Another key dependent S-boxes based on 2D logistic map and 2D cross map was proposed in literature [21]. SHIPHER is different from all of them because it does not use S-boxes and the chunk length varies while the length of S-boxes is fixed in other block ciphers. ...
Conference Paper
Full-text available
In this paper, we describe a family of block ciphers named SHIPHER. We present a symmetric encryption framework based on a cryptographic hash function and dynamic operators controlled by small random numbers. This dynamic operator mixes operations from different algebraic groups like IDEA [1]. However, unlike IDEA and extended IDEA ([2-3]), modular addition is the only calculation in this framework and this makes SHIPHER highly efficient. The round function was chosen to provide confusion and diffusion to facilitate hardware implementations. This framework can provide families of secure, flexible, and variable-key-length block ciphers. \emph{Any block size can be achieved.} We have extensively investigated our encryption framework. We can easily control the computational cost by selecting block size, implementation method, and a hash function. Also, this framework offers excellent performance and it is flexible and generic enough to admit a variety of implementations on different dynamic operators. In this paper, we provide one implementation, show its performance, and discuss possible extensions of similar dynamic operators.
Article
Full-text available
Chaos maps and chaotic systems have been proved to be useful and effective for cryptography. In our study, the two-dimensional logistic map with complicated basin structures and attractors are first used for image encryption. The proposed method adopts the classic framework of the permutation-substitution network in cryptography and thus ensures both confusion and diffusion properties for a secure cipher. The proposed method is able to encrypt an intelligible image into a random-like one from the statistical point of view and the human visual system point of view. Extensive simulation results using test images from the USC-SIPI image database demonstrate the effectiveness and robustness of the proposed method. Security analysis results of using both the conventional and the most recent tests show that the encryption quality of the proposed method reaches or excels the current state-of-the-art methods. Similar encryption ideas can be applied to digital data in other formats (e.g., digital audio and video). We also publish the cipher MATLAB open-source-code under the web page https://sites.google.com/site/tuftsyuewu/source-code.
Article
Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. Substitution boxes (S-boxes) are keystone of modern symmetric cryptosystems. They bring nonlinearity to cryptosystems and strengthen their cryptographic security. The S-box component that used in classic AES is fixed. If we generate this S-box dynamically, the cryptographic strength of AES cipher system would be increased. In this paper we use Chaotic Logistic Map to generate S-box for AES using its cipher key. The purpose of the proposed approach is to generate more secure S-boxes. The generated S-boxes will increase the complexity and also has better results in security analysis. Proposed S-box is analyzed and tested for the following criteria: avalanche effect, strict avalanche effect, bit independency criterion, nonlinearity, equiprobable input/output XOR distribution and key sensitivity. The results pass all of them which justify that the proposed algorithm is effective in generating strong S-boxes.
Article
The substitution box (S-box) is found in many block cipher, and it is a very important component. Since the chaotic system has several significant advantageous properties desirable for cryptosystem, the design of S-box using chaos has attracted a great deal of attention in recent years. In this paper, a novel method for designing key-dependent S-boxes based on a four-dimensional hyperchaotic Chen system has been presented. The design process for constructing S-boxes is described in detail and the results of numerical analysis indicate that all the criteria for S-boxes including bijection, nonlinearity, SAC, BIC and differential approximation probability can be fulfilled. Furthermore, the S-box's sensitivity to the secret key is also conducted. All the results in this paper have shown that the presented method is a good candidate for designing dynamical S-boxes that can be widely used in block cipher.
Conference Paper
Ensuring good confusion and diffusion in symmetrical cryptosystems substitution is very important. Beginning with the attacks against DES, construction of good S-boxes gained more interest due to the nonlinearity necessity. During the past years, the features of the dynamical chaotic systems were exploited to design cryptographic techniques, in order to give an alternative to classic methods. In this paper we propose a solution that combines three simple chaotic maps in order to achieve S-box with good results regarding most of the validating tests.
Article
A substitution box (S-box) plays a central role in cryptographic algorithms. In this paper, an efficient method for designing S-boxes based on chaotic maps is proposed. The proposed method is based on the mixing property of piecewise linear chaotic maps. The S-box so constructed has very low differential and linear approximation probabilities. The proposed S-box is more secure against differential and linear cryptanalysis compared to recently proposed chaotic S-boxes.
Article
The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.
Article
The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Bureau of Standards in the mid 1970s, and has successfully withstood all the attacks published so far in the open literature. In this paper we develop a new type of cryptanalytic attack which can break the reduced variant of DES with eight rounds in a few minutes on a personal computer and can break any reduced variant of DES (with up to 15 rounds) using less than 256 operations and chosen plaintexts. The new attack can be applied to a variety of DES-like substitution/permutation cryptosystems, and demonstrates the crucial role of the (unpublished) design rules.