On the Enlargement of Robust Region of Chaotic Tent Map for the Use in Key Based Substitution-Box (S-Box)

Robust chaotic maps with wide robust region are favored in cryptography as it extends the key length. Chaotic tent map has robust chaos for control parameter µ = 2. Perturbation of control parameter values beyond control parameter 2, results in orbit diverging towards infinity and trajectories vanish. Thus, to avoid trajectories diverging to infinity and to keep trajectories chaotic beyond parameter value 2, a new technique is proposed that makes use of modulo and scaling operators. The parameter space of non-smooth maps is never considered for enlargement. Herein, modified tent map results in larger parameter space that in turn can be used to design key based S-box. The recently published chaotic key based S-box with chaotic map’s parameter space does not achieve large key space. For modified tent map, the modulo operation keeps trajectories in domain (0, 1) while scaling allows for uniform distribution of points in domain (0, 1). These operations keep chaotic orbits globally stable and robust. In results, the robustness of chaotic tent map and modified chaotic tent map is compared using bifurcation diagram. The improved robust region of tent map justifies the effectiveness of proposed method that results to design key based S-box.

[1]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[2]  Ahmet Bedri Ozer,et al.  A method for designing strong S-Boxes based on chaotic Lorenz system , 2010 .

[3]  Yong Wang,et al.  A method for designing S-box based on chaotic neural network , 2010, 2010 Sixth International Conference on Natural Computation.

[4]  Xiaofeng Liao,et al.  A Novel Approach for Designing Dynamical S-Boxes Using Hyperchaotic System , 2012, Int. J. Cogn. Informatics Nat. Intell..

[5]  L. Kocarev,et al.  Logistic map as a block encryption algorithm , 2001 .

[6]  X. Liao,et al.  A block cipher with dynamic S-boxes based on tent map , 2009 .

[7]  Wen-Wei Lin,et al.  Digital Secure-Communication Using Robust Hyper-Chaotic Systems , 2008, Int. J. Bifurc. Chaos.

[8]  Jian Wang,et al.  Designing key-dependent chaotic S-box with larger key space , 2009 .

[9]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[10]  Xiaofeng Liao,et al.  A method for designing dynamical S-boxes based on discretized chaotic map , 2005 .

[11]  Ljupco Kocarev,et al.  Theory and practice of chaotic cryptography , 2007 .

[12]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[13]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[14]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[15]  Yong Wang,et al.  A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..

[16]  Carlisle M. Adams,et al.  Good S-Boxes Are Easy To Find , 1989, CRYPTO.