Abstract
A substitution box (S-box) plays a central role in cryptographic algorithms. In this paper, an efficient method for designing S-boxes based on chaotic maps is proposed. The proposed method is based on the NCA (nonlinear chaotic algorithm) chaotic maps. The S-box so constructed has very optimal nonlinearity, bit independence criterion (BIC), strict avalanche criterion (SAC), differential and linear approximation probabilities. The proposed S-box is more secure against differential and linear cryptanalysis compared to recently proposed chaotic S-boxes.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
Substitution boxes (S-boxes) have been extensively used in almost all conventional cryptographic algorithms, such as data encryption standard (DES) and advanced encryption standard (AES). S-boxes are the only nonlinear components in these cryptosystems. The strength of cryptographic algorithms is determined by these nonlinear S-boxes, so the construction of cryptographically strong S-boxes is important in the design of secure cryptosystems. S-boxes are usually designed using the nonlinearity criteria of [1–17], inspired by linear and differential cryptanalysis [18, 19]. It is the objective of most designs to keep the maximum differential and linear approximation probabilities of an S-box as small as possible [20]. Recently, chaos has attracted significant attention of researchers in the design of new cryptosystems [21–24]. Many methods have been proposed to design S-boxes based on chaos. In this letter, we compare our results with the latest results of studies by [26] and [27]. In [21], Jackimoski and Kocarev proposed a method for designing chaotic S-boxes based on the chaotic logistic map. The four-step process is based on the N-th iteration of a chaotic logistic map, where they choose N=1000. In [25], Chen et al. proposed another method to obtain 8×8 S-boxes in three steps by employing a Chebyshev map and a 3D Baker map. We propose a method based on the NCA chaotic map. The remainder of this paper is organized as follows. Section 2 gives a detailed description of our method of constructing the S-box. Section 3 presents an analysis of the resulting S-box, and the conclusion follows in Sect. 4.
2 The proposed scheme
The method proposed is as follows. An 8-bit sequence of binary random variables is generated and is turned into a decimal integer; if the integer exists then we will iterate the NCA chaotic sequence successively. In this way, an integer table in the range of 0–28 can be obtained. The mathematical expression of the proposed scheme is in the following.
Boolean function is a function that returns values 0 or 1. Generally, one takes a sequence of bits as an input and produces 1 bit as an output. In [28], an approach to generate an NCA sequence is proposed, which can be seen as a Boolean function. The procedure is as follows.
NCAS system was projected by Professor Yuan Sheng Lee, who proposed a two-dimensional chaotic system [29] in 2004; the two-dimensional chaotic system is a new domain-wide discrete chaotic system with zero correlation and a stable probability distribution [29, 30]. The mapping equation is
The ith bit d i (X) can be expressed as
where \(\chi_{(g/2^{i})}(X)\) is a threshold function which is defined as
As a result of a binary sequence,
where
The ranges of parameters λ, α and β are discussed in the following. Firstly, they are positive. Secondly, the absolute value of the slope of the curve at a fixed point should not be less than 1 [3], and x N+1>x N when X N =1/(1+β), therefore λ may be defined as
Finally, a parameter μ is obtained by experimental analysis: μ=1−β −4. So the NCA map is defined as:
where x n ∈(0,1),α∈(0,1.4],β∈[5,43], or x n ∈(0,1),α∈(1.4,1.5],β∈[9,38], or x n ∈(0,1),α∈(1.5,1.57],β∈[3,15]. The ranges of and β are obtained by iteration experimental analysis. In [20], many experiments have been done to show that the NCA map is truly chaotic.
3 Analysis
In this section, a detailed analysis of the S-box created using the method described in Sect. 2 is presented and compared with those presented in [26, 27]. The proposed S-box very close satisfies all the criterions to the optimal value as compared with Refs. [26] and [27]. The strength of proposed substitution box of Table 1 are shown in Table 2.
4 Conclusion
In this letter, we proposed a novel method for constructing cryptographically strong S-boxes based on the NCA chaotic systems. The maximum differential and linear approximation probabilities of the constructed S-box, calculated for a typical initial condition, are very low compared to recently proposed chaotic S-boxes [21, 25]. Our method is also very simple in comparison. We compare the nonlinearity, strict avalanche criterion, bit independence criterion, differential approximation probability and linear approximation probability of proposed S-box with [26] and [27], and conclude that the proposed box is much more secure than the ones in [26] and [27]. Although the overall distribution of differentials is not uniform, like that of differentials of an AES S-box, the linear approximation probability of the S-box constructed by our method is even lower than that of the AES S-box, although the differential approximation probability is slightly higher.
References
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0870-0
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Analysis of S-box in image encryption using root mean square error method. Z. Naturforsch. A 67a, 327–332 (2012)
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z. Naturforsch. A 67a, 282–288 (2012)
Hussain, I., Shah, T., Mahmood, H.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0914-5
Hussain, I., Shah, T., Gondal, M.A.: Image encryption algorithm based on PGL(2,GF(2∧8)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dyn. (2012). doi:10.1007/s11071-012-0440-0
Hussain, I., Shah, T.: S8 affine power affine S-boxes and their application. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-1036-9
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Construction of S8 Lui J S-boxes and their application. Comput. Math. Appl. (2012). doi:10.1016/j.camwa.2012.05.017
Hussain, I., Shah, T., Gondal, M.A.: An efficient image encryption algorithm based on S8 S-box transformation and NCA map. Opt. Commun. (2012). doi:10.1016/j.optcom.2012.06.011
Hussain, I., Shah, T., Gondal, M.A., Wang, Y.: Analyses of SKIPJACK S-box. World Appl. Sci. J. 13(11), 2385–2388 (2011)
Hussain, I., Shah, T., Gondal, M.A., Khan, W.A.: Construction of cryptographically strong 8×8 S-boxes. World Appl. Sci. J. 13(11), 2389–2395 (2011)
Hussain, I., Shah, T., Gondal, M.A., Khan, W.A., Khan, M.: Construction of new S-box using a linear fractional transformation. World Appl. Sci. J. 14(12), 1779–1785 (2011)
Shah, T., Hussain, I., Gondal, M.A., Mahmood, H.: Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int. J. Phys. Sci. 6(16), 4110–4127 (2011)
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Some analysis of S-Box based on residue of prime number. Proc. Pak. Acad. Sci. 48(2), 111–115 (2011)
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A new algorithm to construct secure keys for AES. Int. J. Contemp. Math. Sci. 5(26), 1263–1270 (2010)
Hussain, I., Shah, T., Mahmood, H., Afzal, M.: Comparative analysis of S-boxes based on graphical SAC. Int. J. Comput. Appl. 2(5), 975–8887 (2010)
Hussain, I., Shah, T., Aslam, K.S.: Graphical Sac analysis of S8 APA S-box. Adv. Algebra 3(1), 57–62 (2010)
Daemen, J., Rijmen, V.: The Design of Rijndael-AES: The Advanced Encryption Standard. Springer, Berlin (2002)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)
Matsui, M.: Linear cryptanalysis method of DES cipher. In: Advances in Cryptology, Proc. Eurocrypt’93. LNCS, vol. 765, pp. 386–397. Springer, Berlin (1994)
Nyberg, K.: Differentially uniform mappings for cryptography. In: Advances in Cryptology, Proc. Eurocrypt’93. LNCS, vol. 765, pp. 55–64. Springer, Berlin (1994)
Jakimoski, G., Kocarev, L.: Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. I 48(2), 163–169 (2001)
Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos 15(10), 3119–3151 (2005)
Peitegen, H.-O., Jürgens, H., Saupe, D.: Chaos and Fractals: New Frontiers of Science, 2nd edn. Springer, Berlin (2004)
Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(8), 2129–2151 (2006)
Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31, 571–579 (2007)
Tang, G., Liao, X., Chen, Y.: A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fractals 23, 413–419 (2005)
Asim, M., Jeoti, V.: Efficient and simple method for designing chaotic S-boxes. ETRI J. 30, 170–172 (2008)
Kohda, T., Tsuneda, A.: Statistics of chaotic binary sequences. IEEE Trans. Inf. Theory 43, 104–120 (1997)
Sheng, L., Sun, K., Li, C.: Study of a discrete chaotic system based on tangent-delay for elliptic reflecting cavity and its properties. Acta Phys. Sin. 53, 2871–2876 (2004)
Sheng, L., Cao, L., Sun, K.: Pseudo-random number generator based on NCAS chaos and its statistic characteristics analysis. Acta Phys. Sin. 54, 4031–4037 (2005)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hussain, I., Shah, T. & Gondal, M.A. A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyn 70, 1791–1794 (2012). https://doi.org/10.1007/s11071-012-0573-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-012-0573-1