Linear Cryptoanalysis of the Simplified AES Cipher Modified by Chaotic Sequences

This article introduces new symmetric key architectures based on a randomized version of the Simplified Advanced Encryption Standard (SAES). It is proposed a new technique to randomize the S-boxes of the original SAES employing chaotic sequences. Then, we study the linear criptanalysis of the proposed schemes. It is shown that, with the introduction of chaotic sequences, the adversary needs a larger number of pairs of plaintext and ciphertext to discover the bits of the key compared to the required by the SAES. Given these results, it is possible to evaluate the improvement of the proposed technique against linear cryptanalysis as compared to the original AES algorithm.

[1]  Christof Paar,et al.  Understanding Cryptography , 2018, Springer Berlin Heidelberg.

[2]  Kun-Lin Tsai,et al.  AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments , 2018, IEEE Access.

[3]  Fang-Yie Leu,et al.  A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).

[4]  Edward F. Schaefer,et al.  A SIMPLIFIED AES ALGORITHM AND ITS LINEAR AND DIFFERENTIAL CRYPTANALYSES , 2003, Cryptologia.

[5]  Cecilio Pimentel,et al.  Emitter-coupled pair chaotic generator circuit , 2017 .

[6]  Mitsuru Matsui,et al.  A New Method for Known Plaintext Attack of FEAL Cipher , 1992, EUROCRYPT.

[7]  Stefan Katzenbeisser,et al.  Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[8]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[9]  Xingyuan Wang,et al.  A novel and effective image encryption algorithm based on chaos and DNA encoding , 2017, Multimedia Tools and Applications.

[10]  Jing-Ming Guo,et al.  Improved Beta Chaotic Image Encryption for Multiple Secret Sharing , 2018, IEEE Access.

[11]  H. Li Efficient and flexible architecture for AES , 2006 .

[12]  Jongsung Kim,et al.  Impossible differential cryptanalysis using matrix method , 2010, Discret. Math..