Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption

CryptographicSubstitution-boxesaresourceofnonlinearityinmodernblockencryptionsystems. Therobustnessandconfusionimpartedthroughthesesystemsheavilyrelyonthestrengthoftheir S-boxes.ThisbringsnewchallengestodesigncryptographicallypotentS-boxestodevelopstrong encryptionsystems.Inthispaper,aneffectivemethodtodesignefficient8×8S-boxisproposed. The design methodology incorporates piece-wise linear chaotic map based random search. The S-boxobtainedbytheproposedmethodologyistestedagainststandardstatisticaltestslikebijective property, strict avalanche criteria, nonlinearity, differential uniformity, bits independent criteria, andlinearapproximationprobability,revealingitsoutstandingperformance.TheproposedS-boxis comparedwithsomerecentchaos-based8×8S-boxes.Moreover,theproposedS-boxisappliedto encryptplain-imagewithproposedS-boxtransformationtounveilandhighlightitsinherentgreat encryptionstrength.Theresultsconfirmthatthedesignisconsistentandsuitableforbuildingstrong encryptionsystemsforsecurecommunication. KEywoRDS Chaotic System, Image Encryption, Random Search, Secure Communication, Security, Substitution-Box

[1]  M. N. Vrahatis,et al.  Utilizing Evolutionary Computation Methods for the Design of S-Boxes , 2006, 2006 International Conference on Computational Intelligence and Security.

[2]  Hongjun Liu,et al.  A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise , 2015 .

[3]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[4]  Liu Yang,et al.  A new pseudorandom number generator based on a complex number chaotic equation , 2012 .

[5]  Ali Kanso,et al.  Keyed hash function based on a chaotic map , 2012, Inf. Sci..

[6]  Musheer Ahmad,et al.  Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption , 2013, J. Inf. Process. Syst..

[7]  Musheer Ahmad,et al.  A Chaos Based Method for Efficient Cryptographic S-box Design , 2013, SSCC.

[8]  X. Liao,et al.  A block cipher with dynamic S-boxes based on tent map , 2009 .

[9]  Majid Khan,et al.  An efficient method for the construction of block cipher with multi-chaotic systems , 2013 .

[10]  Iqtadar Hussain,et al.  A Scheme for Obtaining Secure S-Boxes Based on Chaotic Baker’s Map , 2014 .

[11]  Sirma Yavuz,et al.  Designing chaotic S-boxes based on time-delay chaotic system , 2013 .

[12]  Musheer Ahmad,et al.  Designing chaos based strong substitution box , 2015, 2015 Eighth International Conference on Contemporary Computing (IC3).

[13]  Jian Wang,et al.  Designing key-dependent chaotic S-box with larger key space , 2009 .

[14]  Musheer Ahmad,et al.  A new chaotic substitution box design for block ciphers , 2014, 2014 International Conference on Signal Processing and Integrated Networks (SPIN).

[15]  Musheer Ahmad,et al.  A Novel Ant Colony Optimization Based Scheme for Substitution Box Design , 2015 .

[16]  Guo Chen,et al.  A novel heuristic method for obtaining S-boxes , 2008 .

[17]  Xiaofeng Liao,et al.  A novel method for designing S-boxes based on chaotic maps , 2005 .

[18]  Varun Jeoti,et al.  Efficient and Simple Method for Designing Chaotic S‐Boxes , 2008 .

[19]  Stafford E. Tavares,et al.  An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks , 1991, EUROCRYPT.

[20]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[21]  Susan Stepney,et al.  The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[22]  Nilanjan Dey,et al.  Highly Secured Multilayered Motion Vector Watermarking , 2014, AMLTA.

[23]  Yahui Yu,et al.  The Exponential Diophantine Equation 2x + b y = c z , 2014, TheScientificWorldJournal.

[24]  V. Jeoti,et al.  Hybrid chaotic image encryption scheme based on S-box and ciphertext feedback , 2007, 2007 International Conference on Intelligent and Advanced Systems.

[25]  Nilanjan Dey,et al.  Rough Set Based Ad Hoc Network: A Review , 2014, Int. J. Serv. Sci. Manag. Eng. Technol..

[26]  X. Liao,et al.  An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps , 2007 .

[27]  Zhijian Wang,et al.  An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm , 2014, TheScientificWorldJournal.

[28]  Nilanjan Dey,et al.  Image Segmentation Using Rough Set Theory: A Review , 2014, Int. J. Rough Sets Data Anal..

[29]  Vishal Bhatnagar,et al.  Olympics Big Data Prognostications , 2016, Int. J. Rough Sets Data Anal..

[30]  Zhongmeng Zhao,et al.  An efficient chaotic image encryption based on alternate circular S-boxes , 2014, Nonlinear Dynamics.

[31]  Yang Li,et al.  A novel method to design S-box based on chaotic map and genetic algorithm , 2012 .

[32]  Nilanjan Dey,et al.  Unmanned aerial system for post disaster identification , 2014, International Conference on Circuits, Communication, Control and Computing.

[33]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[34]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[35]  Ahmet Bedri Ozer,et al.  A method for designing strong S-Boxes based on chaotic Lorenz system , 2010 .

[36]  Tariq Shah,et al.  An efficient construction of substitution box with fractional chaotic system , 2015, Signal Image Video Process..

[37]  Musheer Ahmad,et al.  A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique , 2014, SNDS.

[38]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[39]  Safya Belghith,et al.  Improvement of an image encryption algorithm based on hyper-chaos , 2011, Telecommunication Systems.

[40]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[41]  Hongjun Liu,et al.  Chaos-based color image block encryption scheme using S-box , 2014 .

[42]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[43]  Vipin Kumar,et al.  Key Dependent Image Steganography Using Edge Detection , 2014, 2014 Fourth International Conference on Advanced Computing & Communication Technologies.

[44]  Tariq Shah,et al.  Application of S-box and chaotic map for image encryption , 2013, Math. Comput. Model..

[45]  Nilanjan Dey,et al.  Image mining framework and techniques: a review , 2015 .