A novel method of dynamic S-box design based on combined chaotic map and fitness function

This paper introduces a method of generating a strong S-box by using combined chaotic system and fitness function. Our method presents an algorithm which has two stages: static S-box generation and dynamic S-box optimization. Chaotic sequences generation, sequences discretization are involved in the first stage. Moreover, the proposed static S-box is converted into a dynamic S-box with the help of fitness function. The optimal S-box satisfies the following criteria: bijectivity, nonlinearity, strict avalanche criteria, output bits independence criterion, equiprobable inputs/outputs XOR distribution. Extensive experiments demonstrate that the proposed algorithm has excellent performance in cryptography and attacks resistance.

[1]  Safya Belghith,et al.  Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption , 2016, Nonlinear Dynamics.

[2]  Yufeng Zhang,et al.  An extended trace identity and applications , 2008 .

[3]  Tariq Shah,et al.  A novel scheme for image encryption using substitution box and chaotic system , 2017 .

[4]  ZaibiGhada,et al.  Efficient and secure chaotic S-Box for wireless sensor network , 2014 .

[5]  P. A. W. Lewis,et al.  A Pseudo-Random Number Generator for the System/360 , 1969, IBM Syst. J..

[6]  Ahmet Bedri Özer,et al.  A new S-box construction method based on the fractional-order chaotic Chen system , 2017, Signal Image Video Process..

[7]  Xiaojun Tong,et al.  A Novel Image Encryption Scheme Based on Dynamical Multiple Chaos and Baker Map , 2012, 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science.

[8]  Yicong Zhou,et al.  A new 1D chaotic system for image encryption , 2014, Signal Process..

[9]  Xiao Chen,et al.  Adaptive medical image encryption algorithm based on multiple chaotic mapping , 2017, Saudi journal of biological sciences.

[10]  Xiangyang Xu A new genetic algorithm and tabu search for s-box optimization , 2010, 2010 International Conference On Computer Design and Applications.

[11]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[12]  Xiao-jun Tong The novel bilateral - Diffusion image encryption algorithm with dynamical compound chaos , 2012, J. Syst. Softw..

[13]  Tariq Shah,et al.  A novel construction of substitution box using a combination of chaotic maps with improved chaotic range , 2017, Nonlinear Dynamics.

[14]  Pulak Mishra,et al.  Mergers, Acquisitions and Export Competitive- ness: Experience of Indian Manufacturing Sector , 2012 .

[15]  Guo Chen,et al.  A novel heuristic method for obtaining S-boxes , 2008 .

[16]  Safya Belghith,et al.  A novel method for designing S-box based on chaotic map and Teaching–Learning-Based Optimization , 2016, Nonlinear Dynamics.

[17]  Majid Khan,et al.  An efficient method for the construction of block cipher with multi-chaotic systems , 2013 .

[18]  Majid Khan,et al.  A novel image encryption scheme based on multiple chaotic S-boxes , 2015, Nonlinear Dynamics.

[19]  Lilian Huang,et al.  A new color image encryption using combination of the 1D chaotic map , 2017, Signal Process..

[20]  Yicong Zhou,et al.  Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..

[21]  Yang Li,et al.  A novel method to design S-box based on chaotic map and genetic algorithm , 2012 .

[22]  Yide Ma,et al.  A Novel 1D Hybrid Chaotic Map-Based Image Compression and Encryption Using Compressed Sensing and Fibonacci-Lucas Transform , 2016 .

[23]  Abdennaceur Kachouri,et al.  Efficient and secure chaotic S-Box for wireless sensor network , 2014, Secur. Commun. Networks.

[24]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[25]  Zeeshan Asghar,et al.  A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation , 2016, Neural Computing and Applications.

[26]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[27]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.