Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map

This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4 ≤ n ≤ 8) based on a recent optimization algorithm known as sine-cosine algorithm (SCA). The paper also proposes a new 1D chaotic map, which owns enhanced dynamics compared to conventional chaotic map, for generating initial population of S-boxes and facilitating the optimization mechanism of SCA. The proposed method applies the SCA with enhanced chaotic map to explore and exploit the search space for obtaining optimized S-boxes on the basis of maximization of nonlinearity as fitness function. The S-box construction involves three phases such as initialization of population, optimization, and adjustment. The simulation and performance analyses are done using standard measures of nonlinearity, strict avalanche criterion, bits independence criterion, differential uniformity, linear approximation probability, and autocorrelation function. The obtained experimental results are compared with some immediate optimization-based and other S-boxes to show the strength of proposed method for constructing bijective S-boxes of salient cryptographic features.

[1]  A.M. Youssef,et al.  On some probabilistic approximations for AES-like s-boxes , 2006, Discret. Math..

[2]  William Millan,et al.  How to Improve the Nonlinearity of Bijective S-Boxes , 1998, ACISP.

[3]  Selçuk Kavut,et al.  Results on rotation-symmetric S-boxes , 2012, Inf. Sci..

[4]  Ye Tian,et al.  Chaotic S-Box: Intertwining Logistic Map and Bacterial Foraging Optimization , 2017 .

[5]  Musheer Ahmad,et al.  A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map , 2018, Neural Computing and Applications.

[6]  Tong Zhang,et al.  Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators , 2018, IEEE Transactions on Cybernetics.

[7]  Safya Belghith,et al.  A novel method for designing S-box based on chaotic map and Teaching–Learning-Based Optimization , 2016, Nonlinear Dynamics.

[8]  Yuliang Zheng,et al.  GAC - the Criterion for Global Avalance Characteristics of Cryptographic Functions , 1995, J. Univers. Comput. Sci..

[9]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[10]  M. Zarebnia,et al.  A combination chaotic system and application in color image encryption , 2017, ArXiv.

[11]  Tariq Shah,et al.  A Watermarking Technique with Chaotic Fractional S-Box Transformation , 2016, Wirel. Pers. Commun..

[12]  Yicong Zhou,et al.  A new 1D chaotic system for image encryption , 2014, Signal Process..

[13]  Zeeshan Asghar,et al.  A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation , 2016, Neural Computing and Applications.

[14]  Yang Li,et al.  A novel method to design S-box based on chaotic map and genetic algorithm , 2012 .

[15]  Gregory V. Bard,et al.  Algebraic Cryptanalysis , 2009 .

[16]  C. Adams A formal and practical design procedure for substitution-permutation network cryptosystems , 1992 .

[17]  H. Feistel Cryptography and Computer Privacy , 1973 .

[18]  Verónica Fernández Mármol,et al.  On the inadequacy of the logistic map for cryptographic applications , 2008, 0805.4355.

[19]  Lilian Huang,et al.  A new color image encryption using combination of the 1D chaotic map , 2017, Signal Process..

[20]  Wang Yong,et al.  An Improved Method to Obtaining S-Box Based on Chaos and Genetic Algorithm , 2012 .

[21]  Abdennaceur Kachouri,et al.  A novel design of Chaos based S-Boxes using genetic algorithm techniques , 2014, 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA).

[22]  Amir Akhavan,et al.  Chaotic Cryptographic Scheme Based on Composition Maps , 2006, Int. J. Bifurc. Chaos.

[23]  Musheer Ahmad,et al.  A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes , 2018, Entropy.

[24]  M. N. Vrahatis,et al.  Utilizing Evolutionary Computation Methods for the Design of S-Boxes , 2006, 2006 International Conference on Computational Intelligence and Security.

[25]  Nasir Siddiqui,et al.  A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map , 2017, Secur. Commun. Networks.

[26]  Tariq Shah,et al.  Construction of S-box based on chaotic Boolean functions and its application in image encryption , 2015, Neural Computing and Applications.

[27]  Seyedali Mirjalili,et al.  SCA: A Sine Cosine Algorithm for solving optimization problems , 2016, Knowl. Based Syst..

[28]  Tian Ye,et al.  Chaotic S-box: six-dimensional fractional Lorenz–Duffing chaotic system and O-shaped path scrambling , 2018 .

[29]  Stjepan Picek,et al.  A New Cost Function for Evolution of S-Boxes , 2016, Evolutionary Computation.

[30]  Tariq Shah,et al.  A novel construction of substitution box using a combination of chaotic maps with improved chaotic range , 2017, Nonlinear Dynamics.

[31]  Musheer Ahmad,et al.  A Novel Ant Colony Optimization Based Scheme for Substitution Box Design , 2015 .

[32]  Ye Tian,et al.  S-box: six-dimensional compound hyperchaotic map and artificial bee colony algorithm , 2016 .

[33]  Shouming Zhong,et al.  A new 4D hyperchaotic system with high complexity , 2018, Math. Comput. Simul..

[34]  Marjan Mernik,et al.  Exploration and exploitation in evolutionary algorithms: A survey , 2013, CSUR.

[35]  Musheer Ahmad,et al.  ABC Optimization Based Construction of Strong Substitution-Boxes , 2018, Wirel. Pers. Commun..

[36]  S M Pincus,et al.  Approximate entropy as a measure of system complexity. , 1991, Proceedings of the National Academy of Sciences of the United States of America.

[37]  Muhammad Asif,et al.  A Method of Generating 8 × 8 Substitution Boxes Based on Elliptic Curves , 2018, Wireless Personal Communications.

[38]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[39]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[40]  Cunsheng Ding,et al.  Nonlinearities of S-boxes , 2007, Finite Fields Their Appl..

[41]  Musheer Ahmad,et al.  Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos , 2017, ArXiv.

[42]  Zeeshan Ahmed,et al.  A Technique for Designing Substitution Box Based on Van der Pol Oscillator , 2015, Wirel. Pers. Commun..

[43]  William Millan,et al.  Multi-objective optimisation of bijective s-boxes , 2004, IEEE Congress on Evolutionary Computation.

[44]  Dragan Lambić,et al.  A novel method of S-box design based on discrete chaotic map , 2017 .

[45]  Carlisle M. Adams,et al.  The structured design of cryptographically good s-boxes , 1990, Journal of Cryptology.

[46]  Paulo S. L. M. Barreto,et al.  Rotation symmetry in algebraically generated cryptographic substitution tables , 2008, Inf. Process. Lett..

[47]  P. Tesar A New Method for Generating High Non-linearity S-Boxes , 2010 .

[48]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[49]  Musheer Ahmad,et al.  A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes , 2018, IEEE Access.

[50]  Vincent Rijmen,et al.  Algebraic Construction and Cryptographic Properties of Rijndael Substitution Box , 2012 .

[51]  Cunsheng Ding,et al.  The Stability Theory of Stream Ciphers , 1991, Lecture Notes in Computer Science.

[52]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[53]  L. Burnett,et al.  Heuristic Optimization of Boolean Functions andSubstitution Boxes for Cryptography , 2005 .