Multimedia Tools and Applications

, Volume 78, Issue 22, pp 32467–32484 | Cite as

A scheme based on algebraic and chaotic structures for the construction of substitution box

  • Atta UllahEmail author
  • Adnan Javeed
  • Tariq Shah


The use of nonlinear (chaotic) transformations in cryptography to generate confusion in the course of encryption procedure is the recent trend. In this article, a novel chaotic system is presented based on the existing chaotic maps. A proficient cryptosystem technique is proposed for constructing substitution box using this novel 1D chaotic structure. The key based dynamical feature of the chaotic system to synthesize strong substitution boxes is the main advantage of the suggested scheme. Then, the constructed component of the block cipher is evaluated using statistical and algebraic analyses. The outcomes of theses analyses certify that the proposed cryptosystem has great potential and superior performance for noticeable dominance in various cryptographic applications in comparison with the existing procedures.


Chaotic map Substitution box (S-box) Encryption Substitution 


Compliance with ethical standards

Conflict of interest

There is no conflict of interest among the authors of this article.


  1. 1.
    Arroyo D, Diaz J, Rodriguez FB (2013) Cryptanalysis of a one round chaos-based substitution permutation network. Signal Process 93(5):1358–1364CrossRefGoogle Scholar
  2. 2.
    Belazi A, Khan MA, El-Latif AA, Belghith S (2016) Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn:337–361Google Scholar
  3. 3.
    Biham E, Shamir A (1991) Differential cryptanalysis of DES like cryptosystems. J Cryptol 4(1):3–72MathSciNetCrossRefGoogle Scholar
  4. 4.
    Brown R, Chua LO (1996) Clarifying chaos: examples and counter examples. Int J Bifurcat Chaos 6(2):219–242CrossRefGoogle Scholar
  5. 5.
    Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on 3-dimensional chaotic baker maps. Chaos, Solitons Fractals 31(3):571–579MathSciNetCrossRefGoogle Scholar
  6. 6.
    Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Trans Circuits Syst 48(12):1498–1509MathSciNetCrossRefGoogle Scholar
  7. 7.
    Feistel H (1973) Cryptography and computer privacy. Sci Am 228:15–23CrossRefGoogle Scholar
  8. 8.
    Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(6):1259–1284MathSciNetCrossRefGoogle Scholar
  9. 9.
    Hao B (1993) Starting with parabolas: an introduction to chaotic dynamics. Shanghai Scientific and Technological Education Publishing House, ShanghaiGoogle Scholar
  10. 10.
    Hussain I, Shah T, Gondal MA (2012) A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyn 70(3):1791–1794MathSciNetCrossRefGoogle Scholar
  11. 11.
    Hussain I, Shah T, Gondal MA, Mahmood H (2012) Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z Naturforsch A 67a:282–288CrossRefGoogle Scholar
  12. 12.
    Hussain I, Shah T, Gondal MA, Mahmood H (2013) An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dyn 71:133–140MathSciNetCrossRefGoogle Scholar
  13. 13.
    Hussain I, Shah T, Gondal MA, Mahmood H (2013) A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput Applic 22(6):1085–1093CrossRefGoogle Scholar
  14. 14.
    Hussain I, Shah T, Mahmood H, Gondal M (2012) A. Construction of S 8 Liu J S-boxes and their applications. Comput Math Appl 64(8):2450–2458MathSciNetCrossRefGoogle Scholar
  15. 15.
    Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers. IEEE Trans Circuits Syst I Fundam Theory Appl 48(2):163–169CrossRefGoogle Scholar
  16. 16.
    Khan M, Shah T (2014) A novel image encryption technique based on Henon chaotic map and S8 symmetric group. Neural Comput Applic 25(7):1717–1722CrossRefGoogle Scholar
  17. 17.
    Khan M, Shah T, Batool SI (2016) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput Applic 27(3):677–685CrossRefGoogle Scholar
  18. 18.
    Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi chaotic systems. Nonlinear Dyn 71(3):489–492MathSciNetCrossRefGoogle Scholar
  19. 19.
    Khan M, Shah T, Mahmood H, Gondal MA, Hussain I (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70(3):2303–2311MathSciNetCrossRefGoogle Scholar
  20. 20.
    Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circ Syst 1:6–21CrossRefGoogle Scholar
  21. 21.
    Li X, Wang L, Yan Y, Liu P (2016) An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems. Opt Int J Light Electron Opt 127(5):2558–2565CrossRefGoogle Scholar
  22. 22.
    Matsui M Linear cryptanalysis method of DES cipher. Advances in cryptology, proceeding of the Eurocrypt’93. Lect Notes Comput Sci 765:386–397Google Scholar
  23. 23.
    Özkaynak F, Özer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett A 374(36):3733–3738CrossRefGoogle Scholar
  24. 24.
    Shah T, Qamar A, Hussain I (2013) Substitution Box on Maximal Cyclic Subgroup of Units of a Galois Ring. Z Naturforsch 68a:567–572CrossRefGoogle Scholar
  25. 25.
    Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715MathSciNetCrossRefGoogle Scholar
  26. 26.
    Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons Fractals 23(2):413–419CrossRefGoogle Scholar
  27. 27.
    Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn.
  28. 28.
    Webster AF, Tavares S (1986) On the design of S-boxes. In: Advances in Cryptology: Proceedings of CRYPTO’85. Lect Notes Comput Sci:523–534Google Scholar
  29. 29.
    Zhang Y, Xiao D (2014) Self-adaptive permutation and combined global diffusion or chaotic color image encryption. Int J Electron Commun 68(4):361–368CrossRefGoogle Scholar
  30. 30.
    Zhang W, Yu H, Zhao Y, Zhu Z (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50CrossRefGoogle Scholar
  31. 31.
    Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of MathematicsQuaid-i-Azam UniversityIslamabadPakistan

Personalised recommendations