A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)

Substitution box is a vital and the only nonlinear component of modern encryption algorithm. S-box is introduced as a confusion component to resist against differential cryptanalysis. Chaos-based encryption is well liked because it exhibits similarity like cryptography. However, chaotic S-boxes possess high maximum differential approximation probability, measured using difference distribution table (DDT) for differential cryptanalysis. Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. DDT within the design loop is used to optimize differential approximation probability. The proposed S-box shows very low differential approximation probability as compared to other chaos-based S-box designed recently, while maintaining good cryptographic properties and high value of linear approximation probability. The strength of the proposed cryptographically strong S-box is vetted in the practical implementation of multimedia encryption.

[1]  Xiaofeng Liao,et al.  A novel method for designing S-boxes based on chaotic maps , 2005 .

[2]  L. Kocarev,et al.  Logistic map as a block encryption algorithm , 2001 .

[3]  Xiaofeng Liao,et al.  A Novel Approach for Designing Dynamical S-Boxes Using Hyperchaotic System , 2012, Int. J. Cogn. Informatics Nat. Intell..

[4]  William Millan,et al.  How to Improve the Nonlinearity of Bijective S-Boxes , 1998, ACISP.

[5]  X. Liao,et al.  A block cipher with dynamic S-boxes based on tent map , 2009 .

[6]  X. Liao,et al.  An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps , 2007 .

[7]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[8]  Iqtadar Hussain,et al.  Construction of Substitution Box Based on Piecewise Linear Chaotic Map and S8 Group , 2015 .

[9]  Ahmet Bedri Ozer,et al.  A method for designing strong S-Boxes based on chaotic Lorenz system , 2010 .

[10]  Bajrang Bansal,et al.  TD Analysis of Transmission through a Building with Multilayer Wall Structure for UWB Signals , 2015 .

[11]  Yong Wang,et al.  A Method for Constructing Bijective S-Box with High Nonlinearity Based on Chaos and Optimization , 2015, Int. J. Bifurc. Chaos.

[12]  Panos Nasiopoulos,et al.  The Effect of Frame Rate on 3D Video Quality and Bitrate , 2015, 1803.04826.

[13]  Yong Wang,et al.  An S-box Construction Algorithm Based on Spatiotemporal Chaos , 2010, 2010 International Conference on Communications and Mobile Computing.

[14]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[15]  Ljupco Kocarev,et al.  Cryptographically secure substitutions based on the approximation of mixing maps , 2005, IEEE Transactions on Circuits and Systems I: Regular Papers.

[16]  Eli Biham,et al.  Differential Cryptanalysis of the Full 16-Round DES , 1992, CRYPTO.

[17]  Erdem Yavuz,et al.  A chaos-based image encryption algorithm with simple logical functions , 2016, Comput. Electr. Eng..

[18]  Lequan Min,et al.  An Extended Method for Obtaining S-Boxes Based on Discrete Chaos Map System , 2009, 2009 International Conference on Computational Intelligence and Security.

[19]  S. E. Tavares,et al.  An expanded set of design criteria for substitution boxes and their use in strengthening DES-like cryptosystems , 1991, [1991] IEEE Pacific Rim Conference on Communications, Computers and Signal Processing Conference Proceedings.

[20]  K. Aihara,et al.  Cryptosystems with discretized chaotic maps , 2002 .

[21]  Safwan El Assad,et al.  A new chaos-based image encryption system , 2016, Signal Process. Image Commun..

[22]  Musheer Ahmad,et al.  Designing chaos based strong substitution box , 2015, 2015 Eighth International Conference on Contemporary Computing (IC3).

[23]  Guo Chen,et al.  A novel heuristic method for obtaining S-boxes , 2008 .

[24]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[25]  Safya Belghith,et al.  A novel approach to construct S-box based on Rossler system , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[26]  Aamir Saeed Malik,et al.  On Perceptual Encryption: Variants of DCT Block Scrambling Scheme for JPEG Compressed Images , 2010, FGIT-SIP/MulGraB.

[27]  Howard M. Heys,et al.  A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS , 2002, Cryptologia.

[28]  Varun Jeoti,et al.  Efficient and Simple Method for Designing Chaotic S‐Boxes , 2008 .

[29]  V. Jeoti,et al.  Hybrid chaotic image encryption scheme based on S-box and ciphertext feedback , 2007, 2007 International Conference on Intelligent and Advanced Systems.

[30]  Abdennaceur Kachouri,et al.  A new design of dynamic S-Box based on two chaotic maps , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.

[31]  Musheer Ahmad,et al.  Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos , 2017, ArXiv.

[32]  Carlisle M. Adams,et al.  Good S-Boxes Are Easy To Find , 1989, CRYPTO.

[33]  Ljupco Kocarev,et al.  Theory and practice of chaotic cryptography , 2007 .

[34]  Yang Li,et al.  A novel method to design S-box based on chaotic map and genetic algorithm , 2012 .

[35]  Susan Stepney,et al.  The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[36]  Alex Biryukov,et al.  On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure , 2015, CRYPTO.

[37]  Xiaofeng Liao,et al.  A method for designing dynamical S-boxes based on discretized chaotic map , 2005 .

[38]  Aamir Saeed Malik,et al.  Designing a joint perceptual encryption and blind watermarking scheme compliant with JPEG compression standard , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.

[39]  M. N. Vrahatis,et al.  Utilizing Evolutionary Computation Methods for the Design of S-Boxes , 2006, 2006 International Conference on Computational Intelligence and Security.

[40]  Varun Jeoti,et al.  A blind watermarking scheme using bitplane of DC component for JPEG Compressed images , 2010, 2010 6th International Conference on Emerging Technologies (ICET).

[41]  J. Abdul Samath,et al.  Secured Medical Images - a Chaotic Pixel Scrambling Approach , 2016, Journal of Medical Systems.

[42]  William Millan,et al.  Multi-objective optimisation of bijective s-boxes , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[43]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[44]  Min Song,et al.  Incorporating a PMF-Based Injury Model into a Multi-Agent Representation of Crowd Behavior , 2007 .

[45]  V. Jeoti,et al.  On Image Encryption: Comparison between AES and a Novel Chaotic Encryption Scheme , 2007, 2007 International Conference on Signal Processing, Communications and Networking.

[46]  Musheer Ahmad,et al.  A Novel Ant Colony Optimization Based Scheme for Substitution Box Design , 2015 .

[47]  Varun Jeoti,et al.  A Novel Design of Chaos Based S-Box Using Difference Distribution Table (CD S-Box) , 2014, SNDS.

[48]  Tariq Shah,et al.  Construction of S8 Liu J S-boxes and their applications , 2012, Comput. Math. Appl..