Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System

The security strengths of block ciphers greatly rely on the confusion components which have the tendency to transform the data nonlinearly into the perplexed form. This paper proposes to put forward a novel scheme of generating cryptographically strong nonlinear confusion components of block ciphers, usually termed as substitution-boxes (S-boxes). The anticipated S-box design scheme is based on a novel five-dimensional (5-D) chaotic system analyzed in this paper. The proposed 5-D dynamical system consists of hyperchaotic phenomenon, KY dimension, conservativity, unstable equilibrium point, and complex phase attractors which are suited for cryptographic applications. The S-box based on hyperchaotic system is made to evolve in order to generate an optimized S-box for high nonlinearity score to make it robust against many linear attacks. The performance analysis of proposed S-box demonstrates that it has bijectivity, high nonlinearity; satisfied strict avalanche criterion and bits independent criterion; low differential and linear probabilities. Moreover, performance appraisal of proposed S-box justifies its better strength and features over many recently investigated S-boxes.

[1]  Musheer Ahmad,et al.  ABC Optimization Based Construction of Strong Substitution-Boxes , 2018, Wirel. Pers. Commun..

[2]  I. Pehlivan,et al.  A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system , 2017 .

[3]  V. Arnold Mathematical Methods of Classical Mechanics , 1974 .

[4]  Waqar Ahmad,et al.  Highly dispersive substitution box (S‐box) design using chaos , 2020, ETRI Journal.

[5]  Ahmet Bedri Ozer,et al.  A method for designing strong S-Boxes based on chaotic Lorenz system , 2010 .

[6]  Seyyed Hossein Soleymani,et al.  WACA: a new blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation , 2019, Multimedia Tools and Applications.

[7]  Ramadhan J. Mstafa,et al.  A New Video Steganography Scheme Based on Shi-Tomasi Corner Detector , 2020, IEEE Access.

[8]  Sergej Celikovský,et al.  Hyperchaotic encryption based on multi-scroll piecewise linear systems , 2015, Appl. Math. Comput..

[9]  Nasir Siddiqui,et al.  A Novel Scheme of Substitution-Box Design Based on Modified Pascal’s Triangle and Elliptic Curve , 2020, Wireless Personal Communications.

[10]  Arambam Neelima,et al.  A (k, n) multi-secret image sharing scheme based on Chinese remainder theorem and Arnold cat map , 2021, J. Electronic Imaging.

[11]  Musheer Ahmad,et al.  A new chaotic substitution box design for block ciphers , 2014, 2014 International Conference on Signal Processing and Integrated Networks (SPIN).

[12]  Pantelimon Stanica,et al.  Cryptographic Boolean Functions and Applications , 2009 .

[13]  Musheer Ahmad,et al.  A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm , 2020, Multimedia Tools and Applications.

[14]  Ahmed A. Abd El-Latif,et al.  A novel image steganography technique based on quantum substitution boxes , 2019, Optics & Laser Technology.

[15]  Faiz Ul Islam,et al.  Designing S-Box Based on 4D-4Wing Hyperchaotic System , 2017 .

[16]  A. Kanso,et al.  A novel image encryption algorithm based on a 3D chaotic map , 2012 .

[17]  Sirma Yavuz,et al.  Designing chaotic S-boxes based on time-delay chaotic system , 2013 .

[18]  M. García-Martínez,et al.  Pseudo-random bit generator based on multi-modal maps , 2015 .

[19]  E. Campos-Cantón,et al.  Generation of Dynamical S-Boxes for Block Ciphers via Extended Logistic Map , 2020 .

[20]  Musheer Ahmad,et al.  A Novel Modular Approach Based Substitution-Box Design for Image Encryption , 2020, IEEE Access.

[21]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[22]  Ying-Qian Zhang,et al.  An Efficient Image Encryption Scheme Based on S-Boxes and Fractional-Order Differential Logistic Map , 2020, IEEE Access.

[23]  Sundarapandian Vaidyanathan,et al.  A 5-D hyperchaotic Rikitake dynamo system with hidden attractors , 2015 .

[24]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[25]  Chao Zhou,et al.  Construction Method and Performance Analysis of Chaotic S-Box Based on a Memorable Simulated Annealing Algorithm , 2020, Symmetry.

[26]  Dragan Lambić,et al.  A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design , 2020 .

[27]  Ye Tian,et al.  S-box: six-dimensional compound hyperchaotic map and artificial bee colony algorithm , 2016 .

[28]  Muhammad Asif,et al.  A Method of Generating 8 × 8 Substitution Boxes Based on Elliptic Curves , 2018, Wireless Personal Communications.

[29]  Xingyuan Wang,et al.  A Novel Method for Constructing the S-Box Based on Spatiotemporal Chaotic Dynamics , 2018, Applied Sciences.

[30]  Ahmed A. Abd El-Latif,et al.  Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario , 2020, IEEE Transactions on Network and Service Management.

[31]  Musheer Ahmad,et al.  A novel finite rings based algebraic scheme of evolving secure S-boxes for images encryption , 2021, Multimedia Tools and Applications.

[32]  Erdinç Avaroğlu Pseudorandom number generator based on Arnold cat map and statistical analysis , 2017 .

[33]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[34]  Qun Ding,et al.  Construction of an S-Box Based on Chaotic and Bent Functions , 2021, Symmetry.

[35]  Sanjeev Kumar,et al.  A novel fractional order chaos-based image encryption using Fisher Yates algorithm and 3-D cat map , 2018, Multimedia Tools and Applications.

[36]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[37]  Ahmed A. Abd El-Latif,et al.  Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications , 2020, Scientific Reports.

[38]  Musheer Ahmad,et al.  Globalized firefly algorithm and chaos for designing substitution box , 2020, J. Inf. Secur. Appl..

[39]  Ahmet Bedri Özer,et al.  A new S-box construction method based on the fractional-order chaotic Chen system , 2017, Signal Image Video Process..

[40]  Matthew J. B. Robshaw,et al.  The Block Cipher Companion , 2011, Information Security and Cryptography.

[41]  Tariq Shah,et al.  Non-Associative Algebra Redesigning Block Cipher with Color Image Encryption , 2021 .

[42]  Musheer Ahmad,et al.  A Chaos Based Method for Efficient Cryptographic S-box Design , 2013, SSCC.

[43]  Carlisle M. Adams,et al.  The structured design of cryptographically good s-boxes , 1990, Journal of Cryptology.

[44]  Weiwei Liu,et al.  Designing S-boxes based on 3-D four-wing autonomous chaotic system , 2015 .

[45]  Musheer Ahmad,et al.  A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes , 2018, Entropy.

[46]  Musheer Ahmad,et al.  A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map , 2018, Neural Computing and Applications.

[47]  Musheer Ahmad,et al.  A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes , 2018, IEEE Access.

[48]  M. A. Ben Farah,et al.  An image encryption scheme based on a new hybrid chaotic map and optimized substitution box , 2019, Nonlinear Dynamics.

[49]  Tabasam Rashid,et al.  Construction of Nonlinear Component of Block Cipher by Action of Modular Group PSL(2, Z) on Projective Line PL(GF(28)) , 2020, IEEE Access.

[50]  Zeeshan Asghar,et al.  A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation , 2016, Neural Computing and Applications.

[51]  Eric Campos-Cantón,et al.  Pseudo-random bit generator based on lag time series , 2014 .

[52]  Akif Akgul,et al.  A Chaotic System with Infinite Equilibria and Its S-Box Constructing Application , 2018 .

[53]  Nestor Tsafack,et al.  Robust cryptosystem using a new hyperchaotic oscillator with stricking dynamic properties , 2021, Multimedia Tools and Applications.