A novel design for the construction of safe S-boxes based on TDERC sequence

Abstract The focus of this article is to construct substitution box based on tangent delay for elliptic cavity chaotic sequence and a particular permutation of symmetric group of permutations. The analysis result shows that the proposed S-box is very good against differential and linear type of attacks.

[1]  Ralph C. Merkle,et al.  Fast Software Encryption Functions , 1990, CRYPTO.

[2]  Pulak Mishra,et al.  Mergers, Acquisitions and Export Competitive- ness: Experience of Indian Manufacturing Sector , 2012 .

[3]  Sajjad Shaukat Jamal,et al.  An efficient scheme for digital watermarking using chaotic map , 2013 .

[4]  Tariq Shah,et al.  Substitution Box on Maximal Cyclic Subgroup of Units of a Galois Ring , 2013 .

[5]  Iqtadar Hussain,et al.  Application of Mean of Absolute Deviation Method for the Selection of Best Nonlinear Component Based on Video Encryption , 2013 .

[6]  Iqtadar Hussain,et al.  A technique for digital steganography using chaotic maps , 2014 .

[7]  Tariq Shah,et al.  A projective general linear group based algorithm for the construction of substitution box for block ciphers , 2012, Neural Computing and Applications.

[8]  T. Kohda,et al.  Statistics of chaotic binary sequences , 1997, IEEE Trans. Inf. Theory.

[9]  Sheng Liyuan,et al.  Pseudo-random number generator based on TD-ERCS chaos and its statistic characteristics analysis , 2005 .

[10]  Jennifer Seberry,et al.  LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications , 1990, AUSCRYPT.

[11]  Amir Anees,et al.  Analysis of optimized signal processing algorithms for smart antenna system , 2012, Neural Computing and Applications.

[12]  Tariq Shah,et al.  Application of S-box and chaotic map for image encryption , 2013, Math. Comput. Model..

[13]  Tariq Shah,et al.  Literature survey on nonlinear components and chaotic nonlinear components of block ciphers , 2013, Nonlinear Dynamics.

[14]  Stafford E. Tavares,et al.  Constructing Large Cryptographically Strong S-boxes , 1992, AUSCRYPT.

[15]  Tariq Shah,et al.  A group theoretic approach to construct cryptographically strong substitution boxes , 2012, Neural Computing and Applications.

[16]  Tariq Shah,et al.  A novel image encryption algorithm based on chaotic maps and GF(28) exponent transformation , 2013 .

[17]  Tariq Shah,et al.  Efficient method for designing chaotic S-boxes based on generalized Baker’s map and TDERC chaotic sequence , 2013 .

[18]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[19]  Sheng Liyuan,et al.  Study of a discrete chaotic system based on tangent-delay for elliptic reflecting cavity and its properties , 2005 .

[20]  Tariq Shah,et al.  A novel method for designing nonlinear component for block cipher based on TD-ERCS chaotic sequence , 2013 .

[21]  Tariq Shah,et al.  Stego optical encryption based on chaotic S-box transformation , 2014 .

[22]  Mohammed Yakoob Siyal,et al.  A Noisy Channel Tolerant Image Encryption Scheme , 2014, Wireless Personal Communications.

[23]  Tariq Shah,et al.  An efficient approach for the construction of LFT S-boxes using chaotic logistic map , 2012, Nonlinear Dynamics.

[24]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[25]  Iqtadar Hussain,et al.  An extended image encryption using chaotic coupled map and S-box transformation , 2014, Nonlinear Dynamics.

[26]  Iqtadar Hussain,et al.  A novel approach of audio watermarking based on S-box transformation , 2013, Math. Comput. Model..

[27]  Adil Masood Siddiqui,et al.  Chaotic substitution for highly autocorrelated data in encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..

[28]  Josef Pieprzyk,et al.  Towards effective nonlinear cryptosystem design , 1988 .