Abstract.
In this manuscript, we have proposed an encryption algorithm to encrypt any digital data. The proposed algorithm is primarily based on the substitution-permutation in which the substitution process is performed by the S8 Substitution boxes. The proposed algorithm incorporates three different chaotic maps. We have analysed the behaviour of chaos by secure communication in great length, and accordingly, we have applied those chaotic sequences in the proposed encryption algorithm. The simulation and statistical results revealed that the proposed encryption scheme is secure against different attacks. Moreover, the encryption scheme can tolerate the channel noise as well; if the encrypted data is corrupted by the unauthenticated user or by the channel noise, the decryption can still be successfully done with some distortion. The overall results confirmed that the presented work has good cryptographic features, low computational complexity and resistant to the channel noise which makes it suitable for low profile mobile applications.
Similar content being viewed by others
References
Y.-M. Chu, N.-F. Huang, S.-H. Lin, IEEE Syst. J. 8, 292 (2014)
A. Anees, Y.-P.P. Chen, Pattern Recognit. 77, 289 (2018)
I. Hussain, T. Shah, M.A. Gondal, H. Mahmood, Nonlinear Dyn. 71, 133 (2012)
L.M. Pecora, T.L. Carroll, Phys. Rev. Lett. 64, 821 (1990)
L. Kocarev, IEEE Circuits Syst. Mag. 1, 6 (2001)
C. Volos, I. Kyprianidis, I. Stouboulos, Signal Process. 93, 1328 (1997)
A. Anees, W.A. Khan, M.A. Gondal, I. Hussain, Z. Naturforsch. A 68, 479 (2013)
H. Liua, X. Wang, Comput. Math. Appl. 59, 3320 (2010)
A. Anees, Z. Ahmed, Wirel. Pers. Commun. 82, 1497 (2015)
A. Anees, M.A. Gondal, 3D Res. 6, DOI: 10.1007/s13319-015-0049-4, (2015)
A. Anees, A.M. Siddiqui, A technique for digital watermarking in combined spatial and transform domains using chaotic maps, in IEEE 2nd National Conference on Information Assurance (NCIA) (IEEE, 2013) pp. 119--124, DOI: 10.1109/NCIA.2013.6725335
J. Daemen, V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard, (Springer, 2002)
T. Shirai, K. Shibutani, T. Akishita, S. Moriai, Tetsu Iwata, Lect. Notes Comput. Sci. 4593, 181 (2007) (Fast Software Encryption FSE 2007
A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, C. Vikkelsoe, Lect. Notes Comput. Sci. 4727, 450 (2007) (Cryptographic Hardware and Embedded Systems CHES, 2007
F. Ahmed, A. Anees, V.U. Abbas, M.Y. Siyal, Wirel. Pers. Commun. 77, 2771 (2014)
F. Ahmed, A. Anees, Hash-Based Authentication of Digital Images in Noisy Channels, in Robust Image Authentication in the Presence of Noise (Springer, 2015) pp. 1--42
Y. Li, C. Wang, H. Chen, Opt. Lasers Eng. 90, 238 (2017)
X. Chai, Y. Chen, L. Broyde, Opt. Lasers Eng. 88, 197 (2017)
X. Chai, X. Zheng, Z. Gan, D. Han, Y. Chen, Signal Process. 148, 124 (2018)
C. Li, G. Luo, K. Qin, C. Li, Nonlinear Dyn. 87, 127 (2017)
A. Belazi, A.A.A. E-Latif, A.-V. Diaconu, R. Rhouma, S. Belghith, Opt. Lasers Eng. 88, 37 (2017)
S. Jiao, W. Zou, X. Li, Opt. Commun. 387, 235 (2017)
E. Solak, C. Cokal, O.T. Yildiz, T. Biyikoglu, Int. J. Bifurcat. Chaos 20, 1405 (2010)
E.Y. Xie, C. Li, S. Yu, J. Lü, Signal Process. 132, 150 (2017)
X. Wang, D. Chen, Math. Probl. Eng. 2013, 537934 (2013)
A. Rukhin, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (National Institute of Standards and Technology, 2010)
S.L.-Yuan, S.K.-Hui, L.C.-Bing, Acta Phys. Sinica. 53, 2871 (2004)
P.F. Verhulst, Nouv. Mèm. Acad. R. Sci. B.-Lett. Brux. 18, 14 (1845)
I. Hussain, T. Shah, H. Mahmood, M.A. Gondal, Comput. Math. Appl. 64, 2450 (2012)
A. Anees, A.M. Siddiqui, J. Ahmed, I. Hussain, Nonlinear Dyn. 75, 807 (2014)
A.N. Pisarchika, M. Zaninb, Physica D 237, 2638 (2008)
A. Anees, A.M. Siddiqui, F. Ahmed, Commun. Nonlinear Sci. Numer. Simul. 19, 3106 (2014)
X.-Y. Wang, L. Yang, R. Liu, A. Kadir, Nonlinear Dyn. 62, 615 (2010)
X. Wang, L. Teng, X. Qin, Signal Process. 92, 1101 (2012)
J. Ahmad, S.O. Hwang, Nonlinear Dyn. 82, 1839 (2015)
M. Matsui, Linear cryptanalysis of the data encryption standard, in Eurocrypt’93, LNCS, Vol. 765 (Springer-Verlag, 1994) pp. 386--397
E. Biham, A. Shamir, Differential Cryptanalysis of the Data Encryption Standard (Springer-Verlag, 1993)
B. Schneier, Applied Cryptography (Wiley, 1996)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hussain, I., Anees, A., Aslam, M. et al. A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps. Eur. Phys. J. Plus 133, 167 (2018). https://doi.org/10.1140/epjp/i2018-11987-x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1140/epjp/i2018-11987-x