A new algorithm for the construction of substitution box by using chaotic map

In the last few decades, security of digital information has become more important. This study focuses on the substitution of grayscale digital images. By using Cubic-Logistic map, a new substitution box is proposed which has been given the name Cubic-Logistic substitution box. Some substituted images have been examined which are substituted with the proposed and other existing substitution boxes. There is hardly any information in the substituted image which is substituted with the proposed substitution box, whereas patterns of the original image can be visualized in those substituted image which are substituted with other existing substitution boxes. Cubic-Logistic substitution box has also shown good statistical analysis such as strict avalanche criterion, differential approximation probability, linear approximation probability, nonlinearity, bit independent criterion, correlation and energy. These analyses of proposed Cubic-Logistic substitution box are then compared with the analysis of other existing substitution boxes such as Rijndael substitution box, Affine-Power-Affine substitution box and skipjack substitution box to show the strength of the proposed S-box.

[1]  Chuandong Li,et al.  A DNA-based security solution using aggregated chaos cross and cubic map , 2016, Int. Arab J. Inf. Technol..

[2]  Iqtadar Hussain,et al.  A Novel Method to Identify Initial Values of Chaotic Maps in Cybersecurity , 2019, Symmetry.

[3]  Aslam Muhammad,et al.  A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map , 2018, Secur. Commun. Networks.

[4]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[5]  Yi-Ping Phoebe Chen,et al.  Designing secure substitution boxes based on permutation of symmetric group , 2019, Neural Computing and Applications.

[6]  Ibrahim Sogukpinar,et al.  Analysis and Comparison of Image Encryption Algorithms , 2007 .

[7]  Tariq Shah,et al.  A novel construction of substitution box using a combination of chaotic maps with improved chaotic range , 2017, Nonlinear Dynamics.

[8]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[9]  Mohammed Yakoob Siyal,et al.  A Noisy Channel Tolerant Image Encryption Scheme , 2014, Wireless Personal Communications.

[10]  Dawei Wang,et al.  A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .

[11]  Amir Anees,et al.  An Image Encryption Scheme Based on Lorenz System for Low Profile Applications , 2015 .

[12]  Tariq Shah,et al.  Construction of new substitution boxes using linear fractional transformation and enhanced chaos , 2019, Chinese Journal of Physics.

[13]  Arslan Shafique,et al.  Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps , 2018, The European Physical Journal Plus.

[14]  Amir Anees,et al.  Analysis of optimized signal processing algorithms for smart antenna system , 2012, Neural Computing and Applications.

[15]  Iqtadar Hussain,et al.  Image encryption based on Chebyshev chaotic map and S8 S-boxes , 2019 .

[16]  Yuling Luo,et al.  A perturbation method to the tent map based on Lyapunov exponent and its application , 2015 .

[17]  Zeeshan Ahmed,et al.  A Technique for Designing Substitution Box Based on Van der Pol Oscillator , 2015, Wirel. Pers. Commun..

[18]  Baodian Wei,et al.  An AES S-box to increase complexity and cryptographic analysis , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[19]  Tariq Shah,et al.  A scheme based on algebraic and chaotic structures for the construction of substitution box , 2019, Multimedia Tools and Applications.

[20]  Adil Masood Siddiqui,et al.  A technique for digital watermarking in combined spatial and transform domains using chaotic maps , 2013, 2013 2nd National Conference on Information Assurance (NCIA).

[21]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[22]  Adil Masood Siddiqui,et al.  Chaotic substitution for highly autocorrelated data in encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..

[23]  Iqtadar Hussain,et al.  Construction of S-Box Based on Chaotic Map and Algebraic Structures , 2019, Symmetry.

[24]  Eltayeb Salih Abuelyman,et al.  An Optimized Implementation of the S-Box using Residues of Prime Numbers , 2008 .

[25]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[26]  Pulak Mishra,et al.  Mergers, Acquisitions and Export Competitive- ness: Experience of Indian Manufacturing Sector , 2012 .

[27]  Pantelimon Stanica,et al.  Cryptographic Boolean Functions and Applications , 2009 .

[28]  Iqtadar Hussain,et al.  A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps , 2018, The European Physical Journal Plus.

[29]  Iqtadar Hussain,et al.  Application of Mean of Absolute Deviation Method for the Selection of Best Nonlinear Component Based on Video Encryption , 2013 .

[30]  Fawad Ahmed,et al.  Hash-Based Authentication of Digital Images in Noisy Channels , 2015 .

[31]  M. I. Moussa,et al.  Image encryption based on new one-dimensional chaotic map , 2014, 2014 International Conference on Engineering and Technology (ICET).

[32]  A. Lloyd THE COUPLED LOGISTIC MAP : A SIMPLE MODEL FOR THE EFFECTS OF SPATIAL HETEROGENEITY ON POPULATION DYNAMICS , 1995 .

[33]  Iqtadar Hussain,et al.  A novel algorithm for thermal image encryption. , 2018, Journal of integrative neuroscience.

[34]  Tariq Shah,et al.  Statistical analysis of S-box in image encryption applications based on majority logic criterion , 2011 .

[35]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[36]  William Stallings,et al.  Cryptography and network security , 1998 .

[37]  Yong Wang,et al.  Analyses of SKIPJACK S-Box , 2011 .

[38]  Qing Liu,et al.  An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .

[39]  Stefan Winkler,et al.  Analysis of Public Image and Video Databases for Quality Assessment , 2012, IEEE Journal of Selected Topics in Signal Processing.

[40]  Kalyani Mali,et al.  A Novel Lossless Image Encryption Method using DNA Substitution and Chaotic Logistic Map , 2016 .