A Chaotic Key Expansion Algorithm Based on Genetic Algorithm

The key expansion algorithm is a critical factor that affects the encryption performance of block cipher. In view of the digital chaotic sequence, there are obvious degradation of the dynamic characteristics and the phenomenon of local periodicity, a chaotic key expansion algorithm based on genetic algorithm according to the genetic mechanism that survival of the fittest is proposed in this paper. Taking the digital chaotic sequence as the initial population, using the fitness function to evaluate the merits and demerits of the individual sequence, and performing the operations of the selection, crossover, and mutation, so that the generation and expansion of the key are realized through the generation-by-generation evolution. The simulation and test results show that the key expansion algorithm is safe and efficient, which is easy to implement and can better meet the encryption requirements of lightweight block cipher.

[1]  Xu Guobao Logistic Mapping Digital-flow Chaos Strange Attractor and Its Parameter Analysis , 2002 .

[2]  Chien-Ming Chen,et al.  On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol , 2016, J. Netw. Intell..

[3]  Priyanka Kaushal,et al.  A Review on Information Security , 2018 .

[4]  Neil Genzlinger A. and Q , 2006 .

[5]  Shaozhen Chen,et al.  Cryptanalysis of full PRIDE block cipher , 2015, Science China Information Sciences.

[6]  Takanori Isobe,et al.  A Single-Key Attack on the Full GOST Block Cipher , 2011, Journal of Cryptology.

[7]  Juan Wang,et al.  Excellent Performances of The Third-level Disturbed Chaos in The Cryptography Algorithm and The Spread Spectrum Communication , 2016, J. Inf. Hiding Multim. Signal Process..

[8]  Qun Ding,et al.  ARM-embedded Implementation of H.264 Selective Encryption Based on Chaotic Stream Cipher , 2018, J. Netw. Intell..

[9]  Raphael C.-W. Phan,et al.  On the Existence of Related-Key Oracles in Cryptosystems Based on Block Ciphers , 2006, OTM Workshops.

[10]  Xiqin Wang,et al.  Weak key analysis for chaotic cipher based on randomness properties , 2012, Science China Information Sciences.

[11]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[12]  Zhang Wei,et al.  Novel Piecewise Logistic Chaotic Spread Spectrum Communication Algorithm , 2013 .

[13]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[14]  Chien-Ming Chen,et al.  On the Security of a Three-party Authenticated Key Agreement Protocol based on Chaotic Maps , 2017 .

[15]  Lu Hai-dong Genetic algorithm and its application , 2005 .