Design of block ciphers by simple chaotic functions

The relationships of chaotic functions and cryptography are investigated in this paper. 128-bit symmetric keys are derived from some chaotic function, called simple logistic function (SLF), for suitable parameters. An improved algorithm of discretization of SLF is introduced and applied to the design of block encryption ciphers and key schedules with proper parameters and initial values. These are chosen by the Lyapunov exponent method for testing chaos. Dynamic S- Boxes of such block ciphers are generated. Security analysis is also given to these S-Boxes.

[1]  Z. Kotulski,et al.  APPLICATION OF DISCRETE CHAOTIC DYNAMICAL SYSTEMS IN CRYPTOGRAPHY — DCC METHOD , 1999 .

[2]  L. Kocarev,et al.  Logistic map as a block encryption algorithm , 2001 .

[3]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[4]  Robert L. Devaney,et al.  A First Course in Chaotic Dynamical Systems , 2020 .

[5]  Ljupco Kocarev,et al.  Cryptographically secure substitutions based on the approximation of mixing maps , 2005, IEEE Transactions on Circuits and Systems I: Regular Papers.

[6]  P. Holmes,et al.  Nonlinear Oscillations, Dynamical Systems, and Bifurcations of Vector Fields , 1983, Applied Mathematical Sciences.

[7]  Jinde Cao,et al.  Cryptography based on delayed chaotic neural networks , 2006 .

[8]  S. A. Robertson,et al.  NONLINEAR OSCILLATIONS, DYNAMICAL SYSTEMS, AND BIFURCATIONS OF VECTOR FIELDS (Applied Mathematical Sciences, 42) , 1984 .

[9]  Ljupco Kocarev,et al.  Discrete Lyapunov Exponent and Resistance to Differential Cryptanalysis , 2007, IEEE Transactions on Circuits and Systems II: Express Briefs.

[10]  Iwao Sasase,et al.  A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.

[11]  M. Baptista Cryptography with chaos , 1998 .

[12]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[13]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[14]  Shin'ichi Oishi,et al.  PSEUDO-RANDOM NUMBER GENERATORS AND CHAOS. , 1982 .

[15]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[16]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[17]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[18]  Mats Svensson A Simple Secure Communications System Utilizing Chaotic Functions to Control the Encryption and Decr , 1996 .