A new chaotic substitution box design for block ciphers

An efficient S-box with sound cryptographic features is of utmost significance for the development of strong cryptographic system. Designing cryptographically strong S-boxes is a key challenge. This paper put forward a method to synthesize an efficient 8×8 S-box. The method employed one-dimensional chaotic Logistic and Cubic maps in a way to modulate their normal system trajectories. The modulated trajectories are recorded and preprocessed, and one is dynamically selected to adjudge its suitability as an S-box cell. The proposed chaotic S-box design methodology is examined against various analytical tests such as bijectivity property, nonlinearity, strict avalanche criterion and equiprobable input/output XOR distribution. These statistical tests results ascertain the excellent performance of proposed method and prove it to be a promising choice as a nonlinear component in the design of a strong block cipher.

[1]  Gregory V. Bard,et al.  Algebraic Cryptanalysis , 2009 .

[2]  Ahmet Bedri Ozer,et al.  A method for designing strong S-Boxes based on chaotic Lorenz system , 2010 .

[3]  X. Liao,et al.  An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps , 2007 .

[4]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[5]  X. Liao,et al.  A block cipher with dynamic S-boxes based on tent map , 2009 .

[6]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[7]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[8]  Jian Wang,et al.  Designing key-dependent chaotic S-box with larger key space , 2009 .

[9]  A.M. Youssef,et al.  On some probabilistic approximations for AES-like s-boxes , 2006, Discret. Math..

[10]  Varun Jeoti,et al.  Efficient and Simple Method for Designing Chaotic S‐Boxes , 2008 .

[11]  Franciszek Seredynski,et al.  Designing cryptographically strong S-boxes with the use of cellular automata , 2008, Ann. UMCS Informatica.

[12]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[13]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[14]  Pantelimon Stanica,et al.  Cryptographic Boolean Functions and Applications , 2009 .

[15]  Guo Chen,et al.  A novel heuristic method for obtaining S-boxes , 2008 .

[16]  Ion Tutanescu,et al.  A new method to determine algebraic expression of power mapping based S-boxes , 2013, Inf. Process. Lett..

[17]  Stafford E. Tavares,et al.  An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks , 1991, EUROCRYPT.