A Novel Design of Chaos Based S-Box Using Difference Distribution Table (CD S-Box)

This research work reports the design methodology of a novel chaotic substitution box that is dynamically designed by systematically optimizing using DDT. DDT is a tool that helps in differential cryptanalysis of S-box. The proposed S-box shows very low differential probability as compared to other chaos based deigned S-box recently, while maintaining good cryptographic properties and linear approximation probability. Our proposed CD S-box achieves very low differential approximation probability of 8/256.

[1]  Xiaofeng Liao,et al.  A method for designing dynamical S-boxes based on discretized chaotic map , 2005 .

[2]  L. Kocarev,et al.  Logistic map as a block encryption algorithm , 2001 .

[3]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[4]  Amitava Banerjee,et al.  A Near Optimal S-Box Design , 2007, ICISS.

[5]  Babak Sadeghiyan,et al.  Finding the differential characteristics of block ciphers with neural networks , 2008, Inf. Sci..

[6]  William Millan,et al.  How to Improve the Nonlinearity of Bijective S-Boxes , 1998, ACISP.

[7]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[8]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[9]  Tariq Shah,et al.  Construction of S8 Liu J S-boxes and their applications , 2012, Comput. Math. Appl..

[10]  Yang Li,et al.  A novel method to design S-box based on chaotic map and genetic algorithm , 2012 .

[11]  Tor Helleseth,et al.  Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.

[12]  M. N. Vrahatis,et al.  Utilizing Evolutionary Computation Methods for the Design of S-Boxes , 2006, 2006 International Conference on Computational Intelligence and Security.

[13]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[14]  K. Aihara,et al.  Cryptosystems with discretized chaotic maps , 2002 .

[15]  William Millan,et al.  Multi-objective optimisation of bijective s-boxes , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[16]  Ljupco Kocarev,et al.  Theory and practice of chaotic cryptography , 2007 .

[17]  X. Liao,et al.  An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps , 2007 .

[18]  Guo Chen,et al.  A novel heuristic method for obtaining S-boxes , 2008 .

[19]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[20]  Ljupco Kocarev,et al.  Cryptographically secure substitutions based on the approximation of mixing maps , 2005, IEEE Transactions on Circuits and Systems I: Regular Papers.

[21]  Information Security and Privacy , 1996, Lecture Notes in Computer Science.

[22]  Ahmet Bedri Ozer,et al.  A method for designing strong S-Boxes based on chaotic Lorenz system , 2010 .

[23]  Xiaofeng Liao,et al.  A novel method for designing S-boxes based on chaotic maps , 2005 .

[24]  Varun Jeoti,et al.  Efficient and Simple Method for Designing Chaotic S‐Boxes , 2008 .

[25]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[26]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[27]  Susan Stepney,et al.  The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).