Abstract
In cryptographic systems, the encryption process relies on the nonlinear mapping of original data or plaintext to the secure data. The mapping of data is facilitated by the application of the substitution process embedded in the cipher. It is desirable to have resistance against differential cryptanalysis, which assists in providing clues about the composition of keys, and linear secret system, where a simple approximation is created to emulate the original cipher characteristics. In this work, we propose the use of nonlinear functional chaos-based substitution process which employs a continuous time Lorenz system. The proposed substitution system eliminates the need of independent round keys in a substitution-permutation network. The performance of the new substitution box is evaluated by nonlinearity analysis, strict avalanche criterion, bit independence criterion, linear approximation probability, and differential approximation probability.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
The objectives of a cryptographic system are to obscure information present in the plain text in order to secure the encrypted data. The integral part of creating confusion is the introduction of randomness in data at the output [37]. The random behavior of chaotic systems exhibits desirable properties suitable for nonlinear dynamic systems such as the substitution process in a cipher without independent round keys. The chaotic systems are highly sensitive to initial conditions and exhibit random behavior, which is deterministic if the initial information is available, and in the absence of this initial information, the system appears to be random to an observer. These properties are desirable and attractive in the design of cryptographic systems. The application of chaotic sequences to the construction of substitution boxes, used in Advanced Encryption Standard (AES), is capable of creating confusion and applying diffusion to the original data [2–7, 9, 10, 12–36, 38–40].
The substitution process in the AES encryption process is the only nonlinear part, which creates confusion and obscures the data. The substitution process is accomplished by the use of the substitution box (S-box) that is an array of size n×n and is defined as S:{0,1}n→{0,1}n.
Several methodologies for the construction of cryptographically strong S-boxes have been seen in literature. In [1], a method is proposed which relies on an exhaustive search to construct a new S-box. Although the proposed method yields good results, the construction of new S-boxes with large values of n is computationally complex and impractical. Keeping in view the methods used by cryptanalysis [41], an S-box of size 5×5 is presented in [11] with strong resistance to differential cryptanalysis. In addition, results show that only odd values of dimension n yield S-boxes with acceptable properties. Recently, the theory of chaos is also employed for the construction of S-boxes. In [12, 28], chaotic maps are used to generate S-boxes in multiple steps. In another construction method based on chaotic techniques [9], a three-dimensional chaotic Baker map is used to generate an 8×8 S-box. This method exhibited some attractive properties pertaining to robustness and resistance to cryptanalysis; the implementation aspects were not addressed in detail [39]. This method is further improved by the use of a continuous-time chaotic Lorenz system [32]. In order to obtain discrete data from the chaotic system, the system trajectory values are converted to digital numbers for selected time steps and a linear functional algorithm [20] is applied to these coded discrete outputs. This method exhibits cryptographically strong properties as compared to other algorithms, which synthesize S-boxes based on chaotic methods. In this paper, we mainly relate our chaotic system with linear functional transformation in order to generate a strong S-box.
The remaining sections of this paper are organized as follows: In Sect. 2, we present the mathematical background for the chaotic Lorenz system. The behavior of the trajectory based on the initial condition is also presented in this section. In Sect. 3, the performance analysis results for the new S-box. Section 4 is devoted to results and discussions. The last section presents the conclusion.
2 Chaotic Lorenz system
The Lorenz system is used to design atmospheric model in 1950 [32] and is the first numerical study of chaos. The system dynamics are represented by the following equations:
The space plots resulting from the equations in (1) are shown in Figs. 1, 2, 3, 4. The values of the parameters are α=10, β=28 and γ=8/3. The intervals used in the states of the system are −40≤x≤40, −40≤y≤40, and −40≤z≤40. The system exhibits chaotic behavior for the selected parameters and intervals.
2.1 Chaos based algorithm for S-box design
The algorithm of the chaos based S-box design is presented in Fig. 5. This algorithm is divided into two parts: diffusion and substitution. The first two steps describe the diffusion process, whereas the remaining portion depicts the realization of the S-box.
Algorithm
-
A.1:
System trajectories are obtained by solving the Lorenz system with selected initial conditions and chaotic parameter values employing the four-step Runge–Kutta method.
-
A.2:
Selected trajectory is sampled at every (number of data/256) step.
-
A.3:
Use the linear functional transformation [20]. Outputs corresponding to each sample is coded starting from 0 to 255.
-
A.4:
We select the distinct first 256 values from these chaotic random sequences to generate chaos-based S-box.
In the diffusion process, the system trajectories are evaluated by the solution of the Lorenz chaotic system. The number of orbits obtained depends on the dimension of the system, and is selected as a design parameter. The initial conditions of the system are selected at this stage. The Runge–Kutta method is applied to generate the chaotic parameters. A trajectory is selected and sampled at 8-bit resolution. The objective is to construct an S-box capable of substituting 8 bits of data; as a result, 256 samples are generated. Thus, coded samples used in the S-box range from 0 to 255. The entries in the S-box are populated by using the codes generated by the samples obtained from the selected system trajectory. A coding table is used to map the sampled values from the output of the Lorenz system to an entry in S-box (see Table 1).
In this work, the system trajectory is generated for 1,000 data samples while keeping the values of initial conditions as x=1, y=0, z=0. In order to ignore the transients of the chaotic system, first 1,000 samples are ignored. The system trajectory along xy-axes is shown in Fig. 1. The resulting S-box based on the chaotic system is presented in Table 1.
3 Analysis of the proposed chaotic S-boxes
It is vital to assess the performance of the proposed S-box in an effort to establish its usefulness in encryption. Several properties are listed in the literature, which indicate the strength of any S-box [1]. Among some of the prevailing methods used by cryptanalysis include differential analysis used for the analysis of DES [8] and information theoretic analysis with excerpts from the original concepts presented by Shannon [37]. In this work, we analyze the proposed S-box for five different properties, which include nonlinearity, strict avalanche criterion (SAC), bit independence criterion (BIC), linear approximation probability (LP), and differential approximation probability (DP). In order to determine the strength of the proposed S-box, the results of these analyses are prudently analyzed. In the following subsections, we present the details of these analyses and discuss the results pertaining to the strength the S-box under analysis.
3.1 Nonlinearity
In the nonlinearity analysis, the constituent Boolean functions are assessed with reference to the behavior of the input/output bit patterns. The set of all affine functions is used to compare the distance from the given Boolean function. Once the initial distance is determined, the bits in the truth table of the Boolean function are modified to approximate to the closest affine function. The number of modifications required to reach the closest affine functions bears useful characteristics in determining the nonlinearity of the transformation used in the encryption process. The measure of nonlinearity is bounded by [23],
The Walsh spectrum, S (g)(w) is defined as
The results of the non-linearity analysis are shown in Table 2.
3.2 Strict Avalanche Criterion Analytically
In strict avalanche criterion, the behavior of the output bits is analyzed that results from a change at the input bit applied to the nonlinear S-box transformation. It is desired that almost half of the output bits change their value or simply toggle their state in response to a single change at the input. The change in the output bit patterns cause a series of variations in the entire substitution–permutation network (S–P network), and thus causes an avalanche effect. The extent of these changes assists in determining the resistance to cryptanalysis and the strength of the cipher. The results of the strict avalanche criterion is shown in Table 3. A comparison of the SAC for different S-boxes is listed in Table 4.
3.3 Bit Independent Criterion
The bit independence criterion (BIC) also relies on the changes at the input bits and the properties exhibited by the independence behavior of pairwise input/output variables of avalanche vectors [23–25]. This criterion is analyzed by modifying single input bit from the plaintext.
3.4 Linear approximation probability
The imbalance of an event between input and output bits is quantified by the linear approximation probability test [34, 35]. In this method, the parity of the input bits given by a certain mask Ωk and the parity of the output bits Ωl are used to determine the linear probability of bits given as
where Ωk and Ωl are the input/output masks used in determining the linear approximation probability. The total number of elements is given by 2m and K is the set of all possible inputs.
3.5 Differential approximation probability
It is desirable that the nonlinear transformation exhibits differential uniformity. In order to ensure the uniform mapping, a differential at the input, given as Δk i , uniquely maps to an output differential Δl i for all i. The differential approximation probability is mathematically defined as
The proposed chaotic S-box is evaluated by differential approximation probability test. The results show that the performance of the new chaotic S-box is comparable to some of the commonly used S-boxes.
4 Results and discussions
The comparison of the strong encryption capabilities shows that the performance of the proposed S-box is comparable or superior to some prevailing S-boxes used in the area of cryptography. The nonlinearity analysis depicts that the properties are comparable to the S-boxes use as a benchmark in this work. Table 2 presents a list of results of nonlinearity analysis. The result of SAC is very close to 0.5 which assures the acceptability of this S-box to encryption application (see Table 4). In Table 7, a comparison of BIC is presented between the proposed S-box and AES, APA, Gray, and Prime S-boxes [20–26]. The results are in agreement with the desired range. In further analysis, the linear approximation analysis shows that the new S-box conforms to the range of values specified for the good nonlinear components used in encryption applications. The results are shown in Table 8. Finally, the differential approximation probability analysis is presented in Table 9 and the comparison with already existing S-boxes are shown in Table 10. In this test, it is observed that the performance of the chaotic S-box is comparable to the existing well-known S-boxes used as benchmarks in this paper.
5 Conclusion
In this paper, we present a method to construct a new S-box with the application of the Lorenz system of differential equations. In order to evaluate the performance of the proposed S-box, a comparison is presented by the application of strict avalanche criterion, linear approximation probability, differential approximation probability, bit independent criterion, and nonlinearity analysis. The existing S-boxes, which are used for the purpose of benchmarking, include AES, APA, Gray, and Prime S-boxes. The results yield that the new S-box have desirable properties suitable for encryption applications for secure communications.
References
Adams, C., Tavares, S.: In: Advances in Cryptology: Proceedings of CRYPTO. Lect. Notes. Comput., vol. 89, pp. 612–615 (1989)
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys. Lett. A 319, 334–339 (2000)
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a chaotic secure communication system. Phys. Lett. A 306, 200–205 (2003)
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys. Lett. A 319, 334–339 (2003)
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys. Lett. A 326, 211–218 (2004)
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Comments on “Modified Baptista type chaotic cryptosystem via matrix secret key” [Phys. Lett. A 372 (2008) 5427]. Phys. Lett. A 373, 3398–3400 (2009)
Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240, 50–54 (1998)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)
Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos Solitons Fractals 31, 571–577 (2007)
Dawson, M., Tavares, S.: In: Advances in Cryptology: Proceedings of EURO-CRYPT. Lect. Notes. Comput., vol. 91, pp. 352–367 (1991)
Detombe, J., Tavares, S.: In: Advances in Cryptology: Proceedings of CRYPTO. Lecture Notes in Comput. Sci., vol. 92, pp. 165–181 (1992)
Guoping, T., Xiaofeng, L., Yong, C.: A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fractals 23, 413–419 (2005)
He, D., Chen, Y., Chen, J.: Nonlinear dynamics, cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. (2012). doi:10.1007/s11071-012-0335-0
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A new algorithm to construct secure keys for AES. Int. J. Contemp. Math. Sci. 5(26), 1263–1270 (2010)
Hussain, I., Shah, T., Mahmood, H., Afzal, M.: Comparative analysis of S-boxes based on graphical SAC. Int. J. Comput. Appl. 2(5), 975–8887 (2010)
Hussain, I., Shah, T., Gondal, M.A., Khan, W.A.: Construction of new S-box using a linear fractional transformation. World Appl. Sci. J. 14(12), 1779–1785 (2011)
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Some analysis of S-box based on residue of prime number. Proc. Pak. Acad. Sci. 48(2), 111–115 (2011)
Hussain, I., Shah, T., Gondal, M.A., Wang, Y.: Analyses of SKIPJACK S-box. World Appl. Sci. J. 13(11), 2385–2388 (2011)
Hussain, I., Shah, T., Gondal, M.A.: An efficient image encryption algorithm based on S8 S-box transformation and NCA map. Opt. Commun. (2012). doi:10.1016/j.optcom. 2012.06.011
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0870-0
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Analysis of S-box in image encryption using root mean square error method. Z. Naturforsch. A 67a, 327–332 (2012)
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z. Naturforsch. A 67a, 282–288 (2012)
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Construction of S8 Lui J S-boxes and their application. Comput. Math. Appl. (2012). doi:10.1016/j.camwa.2012.05.017
Hussain, I., Shah, T., Mahmood, H., Gondal, M.A.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0870-0
Hussain, I., Shah, T., Mahmood, H., Gondal, M.A.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0914-5
Hussain, I., Shah, T., Mahmood, H., Gondal, M.A.: S8 affine power affine S-boxes and their application. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-1036-9
Ivancevic, T., Jain, L., Pattison, J., Hariz, A.: Nonlinear dynamics and chaos methods in neuro-dynamics and complex data analysis. Nonlinear Dyn. 56, 23–44 (2009)
Jakimoski, G., Kocarev, L.: Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. 48(2), 163 (2001)
Lee, C.-C., Chen, C.-L., Wu, C.-Y., Huang, S.-Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. (2011). doi:10.1007/s11071-011-0247-4
Li, S., Mou, X., Ji, Z., Zhang, J., Cai, Y.: Improving security of a chaotic encryption approach. Phys. Lett. A 290, 127–160 (2001)
Maccari, A.: A perturbation method for nonlinear two-dimensional maps. Nonlinear Dyn. 19, 295–312 (1999)
Özkaynak, F., Özer, A.B.: A method for designing strong S-boxes based on chaotic Lorenz system. Phys. Lett. A 374, 3733–3738 (2010)
Pieprzyk, J., Finkelsten, G.: Towards effective nonlinear cryptosystem design. IEE Proc. E 135, 325–335 (1988)
Shah, T., Hussain, I., Gondal, M.A., Khan, W.A.: Construction of cryptographically strong 8×8 S-boxes. World Appl. Sci. J. 13(11), 2389–2395 (2011)
Shah, T., Hussain, I., Gondal, M.A., Mahmood, H.: Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int. J. Phys. Sci. 6(16), 4110–4127 (2011)
Shah, T., Hussain, I., Gondal, M.A.: Image encryption algorithm based on PGL(2,GF(2∧8)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dyn. (2012). doi:10.1007/s11071-012-0440-0
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(656), 715 (1949)
Wang, G.: Chaos synchronization of discrete-time dynamic systems with a limited capacity communication channel. Nonlinear Dyn. 63, 277–283 (2011)
Wang, Y., Wong, K.W., Liao, X., Xiang, T.: A block cipher with dynamic S-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 14, 3089–3099 (2009)
Wang, Y., Wong, K.W., Li, C., Li, Y.: A novel method to design S-box based on chaotic map and genetic algorithm. Phys. Lett. A 376, 827–833 (2012)
Webster, A.F., Tavares, S.: In: Advances in Cryptology: Proceedings of CRYPTO. Lect. Notes. Comput. Sci., vol. 85, pp. 523–534 (1986)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Khan, M., Shah, T., Mahmood, H. et al. A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70, 2303–2311 (2012). https://doi.org/10.1007/s11071-012-0621-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-012-0621-x