Abstract
Substitution box is a vital and the only nonlinear component of modern encryption algorithm. S-box is introduced as a confusion component to resist against differential cryptanalysis. Chaos-based encryption is well liked because it exhibits similarity like cryptography. However, chaotic S-boxes possess high maximum differential approximation probability, measured using difference distribution table (DDT) for differential cryptanalysis. Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. DDT within the design loop is used to optimize differential approximation probability. The proposed S-box shows very low differential approximation probability as compared to other chaos-based S-box designed recently, while maintaining good cryptographic properties and high value of linear approximation probability. The strength of the proposed cryptographically strong S-box is vetted in the practical implementation of multimedia encryption.
Similar content being viewed by others
References
Adams C, Tavares S (1990) Good S-boxes are easy to find advances in cryptology—CRYPTO’ 89 proceedings. In: Brassard G (ed) Lecture notes in computer science, vol 435. Springer, Berlin, pp 612–615. https://doi.org/10.1007/0-387-34805-0_56
Ahmad M, Ahmad F, Nasim Z, Bano Z, Zafar S (2015) Designing chaos based strong substitution box. In: 2015 eighth international conference on contemporary computing (IC3), 20–22 Aug 2015, pp 97–100. https://doi.org/10.1109/ic3.2015.7346660
Ahmad M, Mittal N, Garg P, Khan MM (2016) Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspect Sci 8:465–468
Amigó JM, Kocarev L, Szczepanski J (2007) Theory and practice of chaotic cryptography. Phys Lett A 366:211–216. https://doi.org/10.1016/j.physleta.2007.02.021
Asim M, Jeoti V (2007a) Hybrid chaotic image encryption scheme based on S-box and ciphertext feedback. In: 2007 international conference on intelligent and advanced systems, ICIAS 2007, pp 736–741
Asim M, Jeoti V (2007b) On image encryption: comparison between AES and a novel chaotic encryption scheme. In: Proceedings of ICSCN 2007: international conference on signal processing communications and networking, pp 65–69
Asim M, Jeoti V (2008) Efficient and simple method for designing chaotic S-boxes. ETRI J 30:170
Behnia S, Akhshani A, Ahadpour S, Mahmodi H, Akhavan A (2007) A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys Lett A 366:391–396. https://doi.org/10.1016/j.physleta.2007.01.081
Belazi A, Rhouma R, Belghith S (2015) A novel approach to construct S-box based on Rossler system. In: 2015 international wireless communications and mobile computing conference (IWCMC), 24–28 Aug 2015, pp 611–615. https://doi.org/10.1109/iwcmc.2015.7289153
Biham E, Shamir A (1993) Differential cryptanalysis of the full 16-round DES. Springer, Berlin
Biryukov A, Perrin L (2015) On reverse-engineering S-boxes with hidden design criteria or structure. In: Gennaro R, Robshaw M (eds) Advances in cryptology—CRYPTO 2015: 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20 2015, proceedings, part I. Springer, Berlin, pp 116–140. https://doi.org/10.1007/978-3-662-47989-6_6
Chen G (2008) A novel heuristic method for obtaining S-boxes. Chaos, Solitons Fractals 36:1028–1036. https://doi.org/10.1016/j.chaos.2006.08.003
Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos, Solitons Fractals 31:571–579. https://doi.org/10.1016/j.chaos.2005.10.022
Clark JA, Jacob JL, Stepney S (2005) The design of S-boxes by simulated annealing. New Gener Comput 23:219–231. https://doi.org/10.1007/bf03037656
Dawson MH, Tavares SE (1991a) An expanded set of design criteria for substitution boxes and their use in strengthening DES-like cryptosystems. In: IEEE pacific rim conference on communications, computers and signal processing, 1991, 9–10 May 1991, vol 191, pp 191–195. https://doi.org/10.1109/pacrim.1991.160713
Dawson MH, Tavares SE (1991b) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Paper presented at the proceedings of the 10th annual international conference on theory and application of cryptographic techniques, Brighton, UK
El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Sig Process Image Commun 41:144–157. https://doi.org/10.1016/j.image.2015.10.004
Fuller J, Millan W, Dawson E (2005) Multi-objective optimisation of bijective s-boxes. New Gener Comput 23:201–218. https://doi.org/10.1007/bf03037655
Gang X, Geng Z, Lequan M (2009) An extended method for obtaining S-boxes based on discrete chaos map system. In: International conference on computational intelligence and security, 2009. CIS ‘09, 11–14 Dec 2009, pp 298–302. https://doi.org/10.1109/cis.2009.146
Hao Y, Longyan L, Yong W (2010) An S-box construction algorithm based on spatiotemporal chaos. In: 2010 international conference on communications and mobile computing (CMC), 12–14 April 2010, pp 61–65. https://doi.org/10.1109/cmc.2010.48
Heys HM (2002) A tutorial on linear and differential cryptanalysis. Cryptologia 26:189–221. https://doi.org/10.1080/0161-110291890885
Hilborn RC (1994) Chaos and nonlinear dynamics, vol 2. Oxford University Press, New York
Hussain I, Shah T, Mahmood H, Gondal MA (2012) Construction of S8 Liu J S-boxes and their applications. Comput Math Appl 64:2450–2458. https://doi.org/10.1016/j.camwa.2012.05.017
Hussain I, Gondal M, Hussain A (2015) Construction of substitution box based on piecewise linear chaotic map and S8 group. 3D Res 6:1–5. https://doi.org/10.1007/s13319-014-0032-5
Jing Q, Xiaofeng L, Ping W (2007) A method to construct dynamic S-box based on chaotic map. In: Eighth ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing, 2007. SNPD 2007, 30 July 2007–1 Aug 2007, pp 522–525. https://doi.org/10.1109/snpd.2007.317
Khan MI, Jeoti V (2010) A blind watermarking scheme using bitplane of DC component for JPEG compressed images. In: Proceedings—2010 6th international conference on emerging technologies, ICET 2010, pp 150–154
Khan MA, Jeoti V (2014) A novel design of chaos based S-box using difference distribution table (CD S-box). In: Martínez Pérez G, Thampi SM, Ko R, Shu L (eds) Recent trends in computer networks and distributed systems security: second international conference, SNDS 2014, Trivandrum, India, 13–14 March 2014, proceedings. Springer, Berlin, pp 223–230. https://doi.org/10.1007/978-3-642-54525-2_20
Khan MI, Jeoti V, Malik AS (2010a) Designing a joint perceptual encryption and blind watermarking scheme compliant with JPEG compression standard. In: ICCAIE 2010–2010 international conference on computer applications and industrial electronics, pp 688–691
Khan MI, Jeoti V, Malik AS (2010b) On perceptual encryption: variants of DCT block scrambling scheme for JPEG compressed images, vol 123 CCIS
Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1:6–21. https://doi.org/10.1109/7384.963463
Kocarev L, Jakimoski G (2001) Logistic map as a block encryption algorithm. Phys Lett A 289:199–206. https://doi.org/10.1016/s0375-9601(01)00609-0
Laskari EC, Meletiou GC, Vrahatis MN (2006) Utilizing evolutionary computation methods for the design of S-boxes. In: International conference on computational intelligence and security, 2006, 3–6 Nov 2006, pp 1299–1302. https://doi.org/10.1109/iccias.2006.295267
Mamadolimov A, Isa H, Mohamad MS (2010) Bijective substitution box. WO Patent 2,010,151,103
Masuda N, Aihara K (2002) Cryptosystems with discretized chaotic maps. IEEE Trans Circuits Syst I Fundam Theory Appl 49:28–40. https://doi.org/10.1109/81.974872
Matsui M (1994) Linear cryptanalysis method for DES cipher advances in cryptology—EUROCRYPT’93. In: Helleseth T (ed) Lecture notes in computer science, vol 765. Springer, Berlin, pp 386–397. https://doi.org/10.1007/3-540-48285-7_33
Millan W (1998) How to improve the nonlinearity of bijective S-boxes information security and privacy. In: Boyd C, Dawson E (eds) Lecture notes in computer science, vol 1438. Springer, Berlin, pp 181–192. https://doi.org/10.1007/bfb0053732
Özkaynak F, Özer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett A 374:3733–3738. https://doi.org/10.1016/j.physleta.2010.07.019
Parvees MYM, Samath JA, Bose BP (2016) Secured medical images—a chaotic pixel scrambling approach. J Med Syst 40:1–11. https://doi.org/10.1007/s10916-016-0611-5
Peng J, Liao X, Zhang D (2012) A novel approach for designing dynamical S-boxes using hyperchaotic system. Int J Cogn Inform Nat Intell 6:100–119. https://doi.org/10.4018/jcini.2012010105
Shannon CE (1949) Communication theory of secrecy systems*. Bell Syst Tech J 28:656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Soni AK, Lobiyal DK, Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design. Procedia Comput Sci 57:572–580. https://doi.org/10.1016/j.procs.2015.07.394
Szczepanski J, Amigo JM, Michalek T, Kocarev L (2005) Cryptographically secure substitutions based on the approximation of mixing maps. IEEE Trans Circuits Syst I Regul Pap 52:443–453. https://doi.org/10.1109/tcsi.2004.841602
Tang G, Liao X (2005) A method for designing dynamical S-boxes based on discretized chaotic map. Chaos, Solitons Fractals 23:1901–1909. https://doi.org/10.1016/j.chaos.2004.07.033
Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons Fractals 23:413–419. https://doi.org/10.1016/j.chaos.2004.04.023
Wang Y (2015) A method for constructing bijective S-box with high nonlinearity based on chaos and optimization. Int J Bifurc Chaos 25:15. https://doi.org/10.1142/S0218127415501278
Wang Y, Wong K-W, Liao X, Xiang T (2009) A block cipher with dynamic S-boxes based on tent map. Commun Nonlinear Sci Numer Simul 14:3089–3099. https://doi.org/10.1016/j.cnsns.2008.12.005
Wang Y, Wong K-W, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A 376:827–833. https://doi.org/10.1016/j.physleta.2012.01.009
Webster AF, Tavares SE (1986) On the design of S-boxes. Paper presented at the Advances in Cryptology
Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2015) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng. https://doi.org/10.1016/j.compeleceng.2015.11.008
Zaibi G, Peyrard F, Kachouri A, Fournier-Prunaret D, Samet M (2010) A new design of dynamic S-box based on two chaotic maps. Paper presented at the proceedings of the ACS/IEEE international conference on computer systems and applications—AICCSA 2010
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Khan, M.A., Ali, A., Jeoti, V. et al. A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP). Iran J Sci Technol Trans Electr Eng 42, 219–238 (2018). https://doi.org/10.1007/s40998-018-0061-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40998-018-0061-9