Skip to main content
Log in

Design and application of an S-box using complete Latin square

  • Original paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Since a substitution box (S-box) is the nonlinearity part of a symmetric key encryption scheme, it directly determines the performance and security level of the encryption scheme. Thus, generating S-box with high performance and efficiency is attracting. This paper proposes a novel method to construct S-box using the complete Latin square and chaotic system. First, a complete Latin square is generated using the chaotic sequences produced by a chaotic system. Then an S-box is constructed using the complete Latin square. Performance analyses show that the S-box generated by our proposed method has a high performance and can achieve strong ability to resist many security attacks such as the linear attack, differential attack and so on. To show the efficiency of the constructed S-box, this paper further applies the S-box to image encryption application. Security analyses show that the developed image encryption algorithm is able to encrypt different kinds of images into cipher images with uniformly distributed histograms. Performance evaluations demonstrate that it has a high security level and can outperform several state-of-the-art encryption algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Alawida, M., Samsudin, A., Teh, J.S., Alkhawaldeh, R.S.: A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160, 45–58 (2019)

    Google Scholar 

  2. Anees, A., Ahmed, Z.: A technique for designing substitution box based on Van der Pol oscillator. Wirel. Pers. Commun. 82(3), 1497–1503 (2015)

    Google Scholar 

  3. Bao, H., Hua, Z., Wang, N., Zhu, L., Chen, M., Bao, B.C.: Initials-boosted coexisting chaos in a 2D sine map and its hardware implementation. IEEE Trans. Ind. Inform. (2020)

  4. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)

    MathSciNet  MATH  Google Scholar 

  5. Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process. 143, 122–133 (2018)

    Google Scholar 

  6. Castro, J.C.H., Sierra, J.M., Seznec, A., Izquierdo, A., Ribagorda, A.: The strict avalanche criterion randomness test. Math. Comput. Simul. 68(1), 1–7 (2005)

    MathSciNet  MATH  Google Scholar 

  7. Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos Solitons Fractals 31(3), 571–579 (2007)

    MathSciNet  MATH  Google Scholar 

  8. Chen, J., Han, F., Qian, W., Yao, Y.D., Zhu, Z.I.: Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map. Nonlinear Dyn. 93(4), 2399–2413 (2018)

    Google Scholar 

  9. Guesmi, R., Farah, M.A.B., Kachouri, A., Samet, M.: A novel design of chaos based S-boxes using genetic algorithm techniques. In: 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA). IEEE, pp 678–684 (2014)

  10. Hua, Z., Zhang, Y., Zhou, Y.: Two-dimensional modular chaotification system for improving chaos complexity. IEEE Trans. Signal Process. 68, 1937–1949 (2020)

    MathSciNet  Google Scholar 

  11. Hua, Z., Zhou, B., Zhou, Y.: Sine chaotification model for enhancing chaos and its hardware implementation. IEEE Trans. Ind. Electron. 66(2), 1273–1284 (2018)

    Google Scholar 

  12. Hua, Z., Zhou, Y.: Design of image cipher using block-based scrambling and image filtering. Inf. Sci. 396, 97–113 (2017)

    MATH  Google Scholar 

  13. Hua, Z., Zhou, Y., Pun, C.M., Chen, C.P.: Image encryption using 2D Logistic-Sine chaotic map. In: 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 3229–3234. IEEE (2014)

  14. Hua, Z., Zhu, Z., Yi, S., Zhang, Z., Huang, H.: Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf. Sci. 546, 1063–1083 (2021)

    MathSciNet  Google Scholar 

  15. Huang, X., Dong, Y., Jiao, K., Ye, G.: Asymmetric pixel confusion algorithm for images based on RSA and Arnold transform. Front. Inf. Technol. Electron. Eng. 21(12), 1783–1794 (2020). https://doi.org/10.1631/FITEE.2000241

    Article  Google Scholar 

  16. Hussain, I., Shah, T., Gondal, M.A., Khan, W.A.: Construction of cryptographically strong \(8 \times 8\) S-boxes. World Appl. Sci. J. 13(11), 2389–2395 (2011)

    Google Scholar 

  17. Hussain, I., Shah, T., Gondal, M.A., Khan, W.A., Mahmood, H.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 23(1), 97–104 (2013)

    Google Scholar 

  18. Jamal, S.S., Khan, M.U., Shah, T.: A watermarking technique with chaotic fractional S-box transformation. Wirel. Pers. Commun. 90(4), 2033–2049 (2016)

    Google Scholar 

  19. Jia, Y., Yin, Z., Zhang, X., Luo, Y.: Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Process. 163, 238–246 (2019)

    Google Scholar 

  20. Khairullin, I., Bobrov, V.: On cryptographic properties of some lightweight algorithms and its application to the construction of S-boxes. In: 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 1807–1810. IEEE (2019)

  21. Khan, M., Asghar, Z.: A novel construction of substitution box for image encryption applications with gingerbreadman chaotic map and \({{\rm {S}}}_8\) permutation. Neural Comput. Appl. 29(4), 993–999 (2018)

    Google Scholar 

  22. Khan, M., Shah, T., Batool, S.I.: Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput. Appl. 27(3), 677–685 (2016)

    Google Scholar 

  23. Li, C., Lin, D., Lü, J.: Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE Multimed. 24(3), 64–71 (2017)

    Google Scholar 

  24. Li, C., Zhang, Y., Xie, E.Y.: When an attacker meets a cipher-image in 2018: a year in review. J. Inf. Sec. Appl. 48, 102361 (2019)

    Google Scholar 

  25. Li, H., Hua, Z., Bao, H., Zhu, L., Chen, M., Bao, B.: Two-dimensional memristive hyperchaotic maps and application in secure communication. IEEE Trans. Ind, Electron (2020)

    Google Scholar 

  26. Liu, H., Kadir, A., Xu, C.: Cryptanalysis and constructing S-box based on chaotic map and backtracking. Appl. Math. Comput. 376, 125 (2020)

    MathSciNet  MATH  Google Scholar 

  27. Liu, L., Lei, Z.: An approach for constructing the S-box using the CML system. J. Phys. Conf. Ser. 1303, 012090 (2019)

    Google Scholar 

  28. Liu, W., Sun, K., Zhu, C.: A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 84, 26–36 (2016)

    Google Scholar 

  29. Liu, Z., Wang, Y., Zhao, Y., Zhang, L.Y.: A stream cipher algorithm based on 2D coupled map lattice and partitioned cellular automata. Nonlinear Dyn. 101, 1383–1396 (2020)

    Google Scholar 

  30. Luo, Y., Du, M., Liu, J.: A symmetrical image encryption scheme in wavelet and time domain. Commun. Nonlinear Sci. Numer. Simul. 20(2), 447–460 (2015)

    Google Scholar 

  31. Naseer, A., Siddiqui, N.: A novel approach for construction of S-box using modified Pascal’s triangle. Int. J. Comput. Sci. Inf. Sec. 18(1) (2020)

  32. Özkaynak, F., Çelik, V., Özer, A.B.: A new S-box construction method based on the fractional-order chaotic Chen system. Signal Image Video Process. 11(4), 659–664 (2017)

    Google Scholar 

  33. Özkaynak, F., Yavuz, S.: Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn. 74(3), 551–557 (2013)

    MathSciNet  MATH  Google Scholar 

  34. Ping, P., Xu, F., Mao, Y., Wang, Z.: Designing permutation-substitution image encryption networks with Henon map. Neurocomputing 283, 53–63 (2018)

    Google Scholar 

  35. Qin, F., Wang, C., Li, Z., Kim, H.s., Zhou, Y., Wu, Y.: Lift: a low-overhead practical information flow tracking system for detecting security attacks. In: 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO’06), pp. 135–148. IEEE (2006)

  36. Song, Y., Zhu, Z., Zhang, W., Guo, L., Yang, X., Yu, H.: Joint image compression-encryption scheme using entropy coding and compressive sensing. Nonlinear Dyn. 95(3), 2235–2261 (2019)

    MATH  Google Scholar 

  37. Sosa, P.M.: Calculating nonlinearity of Boolean functions with Walsh–Hadamard Transform, pp. 1–4. UCSB, Santa Barbara (2016)

  38. Tang, G., Liao, X.: A method for designing dynamical S-boxes based on discretized chaotic map. Chaos Solitons Fractals 23(5), 1901–1909 (2005)

    MathSciNet  MATH  Google Scholar 

  39. Tang, G., Liao, X., Chen, Y.: A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fractals 23(2), 413–419 (2005)

    MATH  Google Scholar 

  40. Tanyildizi, E., Özkaynak, F.: A new chaotic S-box generation method using parameter optimization of one dimensional chaotic maps. IEEE Access 7, 117829–117838 (2019)

    Google Scholar 

  41. Ullah, A., Jamal, S.S., Shah, T.: A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn. 91(1), 359–370 (2018)

    MathSciNet  Google Scholar 

  42. Wang, S., Wang, C., Xu, C.: An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm. Opt. Lasers Eng. 128, 105995 (2020)

    Google Scholar 

  43. Webster, A., Tavares, S.E.: On the design of S-boxes. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 523–534. Springer (1985)

  44. Wen, W., Wei, K., Zhang, Y., Fang, Y., Li, M.: Colour light field image encryption based on DNA sequences and chaotic systems. Nonlinear Dyn. 99(2), 1587–1600 (2020)

    Google Scholar 

  45. Williams, E.: Experimental designs balanced for the estimation of residual effects of treatments. Aust. J. Chem. 2(2), 149–168 (1949)

    MathSciNet  Google Scholar 

  46. Wu, Y., Noonan, J.P., Agaian, S., et al.: NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J. Sel. Areas Telecommun. (JSAT) 1(2), 31–38 (2011)

  47. Xia, Z., Wang, X., Zhou, W., Li, R., Wang, C., Zhang, C.: Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process. 157, 108–118 (2019)

    Google Scholar 

  48. Xu, C., Sun, J., Wang, C.: An image encryption algorithm based on random walk and hyperchaotic systems. Int. J. Bifurc. Chaos 30(4), 2050060 (2020)

    MathSciNet  Google Scholar 

  49. Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)

    Google Scholar 

  50. Xu, Y.M., Yao, Z., Hobiny, A., Ma, J.: Differential coupling contributes to synchronization via a capacitor connection between chaotic circuits. Front. Inf. Technol. Electron. Eng. 20(4), 571–583 (2019)

    Google Scholar 

  51. Yang, L., Lv, X.: Image encryptionalgorithm based on complete Latin square. Appl. Res. Comput. 32(11), 3435–3438 (2015)

    Google Scholar 

  52. Ye, G., Pan, C., Huang, X., Mei, Q.: An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn. 94(1), 745–756 (2018)

    Google Scholar 

  53. Zhang, Y., Li, Y., Wen, W., Wu, Y., Chen, J.X.: Deciphering an image cipher based on 3-cell chaotic map and biological operations. Nonlinear Dyn. 82(4), 1831–1837 (2015)

    MathSciNet  MATH  Google Scholar 

  54. Zhang, Y., Ren, G., Hobiny, A., Ahmad, B., Ma, J.: Mode transition in a memristive dynamical system and its application in image encryption. Int. J. Mod. Phys. B 34(27), 2050244 (2020)

    MathSciNet  MATH  Google Scholar 

  55. Zhao, C.F., Ren, H.P.: Image encryption based on hyper-chaotic multi-attractors. Nonlinear Dyn. 100, 679–698 (2020)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Natural Scientific Research Innovation Foundation in Harbin Institute of Technology under Grant HIT.NSRIF.2020077, in part by the National Natural Science Foundation of China under Grants 62071142 and 62002301, in part by the Natural Science Foundation of Chongqing under Grant cstc2019jcyj-msxmX0393, and in part by the Education Committee foundation of Chongqing under Grant KJQN201900305.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhongyun Hua.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hua, Z., Li, J., Chen, Y. et al. Design and application of an S-box using complete Latin square. Nonlinear Dyn 104, 807–825 (2021). https://doi.org/10.1007/s11071-021-06308-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-021-06308-3

Keywords

Navigation