A novel heuristic method for obtaining S-boxes

Abstract An efficient algorithm named chaotic multi-swapping and simulated annealing (CMSSA) for obtaining cryptographically strong 8 × 8 S -boxes is presented. The method is based on chaotic maps and simulated annealing. In addition, cryptographic properties such as bijectivity, strict avalanche criterion, nonlinearity, output bits independence criterion and equiprobable input/output XOR distribution are analyzed in detail for the S -box produced. The results of numerical analysis show that the box has nearly fulfilled the criteria for a cryptographically strong S -box and can effectively resist several attacks.

[1]  Xiaofeng Liao,et al.  A novel method for designing S-boxes based on chaotic maps , 2005 .

[2]  Huanwen Tang,et al.  Application of chaos in simulated annealing , 2004 .

[3]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[4]  Xiaofeng Liao,et al.  A method for designing dynamical S-boxes based on discretized chaotic map , 2005 .

[5]  Susan Stepney,et al.  The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[6]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[7]  X. Liao,et al.  An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps , 2007 .

[8]  Carlisle M. Adams,et al.  Good S-Boxes Are Easy To Find , 1989, CRYPTO.

[9]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[10]  Stafford E. Tavares,et al.  Constructing Large Cryptographically Strong S-boxes , 1992, AUSCRYPT.

[11]  Xiaofeng Liao,et al.  A digital secure image communication scheme based on the chaotic Chebyshev map , 2004, Int. J. Commun. Syst..

[12]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[13]  T. Kohda,et al.  Statistics of chaotic binary sequences , 1997, IEEE Trans. Inf. Theory.

[14]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[15]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[16]  Stafford E. Tavares,et al.  An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks , 1991, EUROCRYPT.