Skip to main content
Log in

A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps

  • Regular Article
  • Published:
The European Physical Journal Plus Aims and scope Submit manuscript

Abstract.

In this manuscript, we have proposed an encryption algorithm to encrypt any digital data. The proposed algorithm is primarily based on the substitution-permutation in which the substitution process is performed by the S8 Substitution boxes. The proposed algorithm incorporates three different chaotic maps. We have analysed the behaviour of chaos by secure communication in great length, and accordingly, we have applied those chaotic sequences in the proposed encryption algorithm. The simulation and statistical results revealed that the proposed encryption scheme is secure against different attacks. Moreover, the encryption scheme can tolerate the channel noise as well; if the encrypted data is corrupted by the unauthenticated user or by the channel noise, the decryption can still be successfully done with some distortion. The overall results confirmed that the presented work has good cryptographic features, low computational complexity and resistant to the channel noise which makes it suitable for low profile mobile applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Y.-M. Chu, N.-F. Huang, S.-H. Lin, IEEE Syst. J. 8, 292 (2014)

    Article  ADS  Google Scholar 

  2. A. Anees, Y.-P.P. Chen, Pattern Recognit. 77, 289 (2018)

    Article  Google Scholar 

  3. I. Hussain, T. Shah, M.A. Gondal, H. Mahmood, Nonlinear Dyn. 71, 133 (2012)

    Article  Google Scholar 

  4. L.M. Pecora, T.L. Carroll, Phys. Rev. Lett. 64, 821 (1990)

    Article  ADS  MathSciNet  Google Scholar 

  5. L. Kocarev, IEEE Circuits Syst. Mag. 1, 6 (2001)

    Article  Google Scholar 

  6. C. Volos, I. Kyprianidis, I. Stouboulos, Signal Process. 93, 1328 (1997)

    Article  Google Scholar 

  7. A. Anees, W.A. Khan, M.A. Gondal, I. Hussain, Z. Naturforsch. A 68, 479 (2013)

    Article  ADS  Google Scholar 

  8. H. Liua, X. Wang, Comput. Math. Appl. 59, 3320 (2010)

    Article  MathSciNet  Google Scholar 

  9. A. Anees, Z. Ahmed, Wirel. Pers. Commun. 82, 1497 (2015)

    Article  Google Scholar 

  10. A. Anees, M.A. Gondal, 3D Res. 6, DOI: 10.1007/s13319-015-0049-4, (2015)

  11. A. Anees, A.M. Siddiqui, A technique for digital watermarking in combined spatial and transform domains using chaotic maps, in IEEE 2nd National Conference on Information Assurance (NCIA) (IEEE, 2013) pp. 119--124, DOI: 10.1109/NCIA.2013.6725335

  12. J. Daemen, V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard, (Springer, 2002)

  13. T. Shirai, K. Shibutani, T. Akishita, S. Moriai, Tetsu Iwata, Lect. Notes Comput. Sci. 4593, 181 (2007) (Fast Software Encryption FSE 2007

    Article  Google Scholar 

  14. A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, C. Vikkelsoe, Lect. Notes Comput. Sci. 4727, 450 (2007) (Cryptographic Hardware and Embedded Systems CHES, 2007

    Article  Google Scholar 

  15. F. Ahmed, A. Anees, V.U. Abbas, M.Y. Siyal, Wirel. Pers. Commun. 77, 2771 (2014)

    Article  Google Scholar 

  16. F. Ahmed, A. Anees, Hash-Based Authentication of Digital Images in Noisy Channels, in Robust Image Authentication in the Presence of Noise (Springer, 2015) pp. 1--42

  17. Y. Li, C. Wang, H. Chen, Opt. Lasers Eng. 90, 238 (2017)

    Article  Google Scholar 

  18. X. Chai, Y. Chen, L. Broyde, Opt. Lasers Eng. 88, 197 (2017)

    Article  Google Scholar 

  19. X. Chai, X. Zheng, Z. Gan, D. Han, Y. Chen, Signal Process. 148, 124 (2018)

    Article  Google Scholar 

  20. C. Li, G. Luo, K. Qin, C. Li, Nonlinear Dyn. 87, 127 (2017)

    Article  Google Scholar 

  21. A. Belazi, A.A.A. E-Latif, A.-V. Diaconu, R. Rhouma, S. Belghith, Opt. Lasers Eng. 88, 37 (2017)

    Article  Google Scholar 

  22. S. Jiao, W. Zou, X. Li, Opt. Commun. 387, 235 (2017)

    Article  ADS  Google Scholar 

  23. E. Solak, C. Cokal, O.T. Yildiz, T. Biyikoglu, Int. J. Bifurcat. Chaos 20, 1405 (2010)

    Article  Google Scholar 

  24. E.Y. Xie, C. Li, S. Yu, J. Lü, Signal Process. 132, 150 (2017)

    Article  Google Scholar 

  25. X. Wang, D. Chen, Math. Probl. Eng. 2013, 537934 (2013)

    Google Scholar 

  26. A. Rukhin, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (National Institute of Standards and Technology, 2010)

  27. S.L.-Yuan, S.K.-Hui, L.C.-Bing, Acta Phys. Sinica. 53, 2871 (2004)

    Google Scholar 

  28. P.F. Verhulst, Nouv. Mèm. Acad. R. Sci. B.-Lett. Brux. 18, 14 (1845)

    Google Scholar 

  29. I. Hussain, T. Shah, H. Mahmood, M.A. Gondal, Comput. Math. Appl. 64, 2450 (2012)

    Article  MathSciNet  Google Scholar 

  30. A. Anees, A.M. Siddiqui, J. Ahmed, I. Hussain, Nonlinear Dyn. 75, 807 (2014)

    Article  Google Scholar 

  31. A.N. Pisarchika, M. Zaninb, Physica D 237, 2638 (2008)

    Article  ADS  MathSciNet  Google Scholar 

  32. A. Anees, A.M. Siddiqui, F. Ahmed, Commun. Nonlinear Sci. Numer. Simul. 19, 3106 (2014)

    Article  ADS  MathSciNet  Google Scholar 

  33. X.-Y. Wang, L. Yang, R. Liu, A. Kadir, Nonlinear Dyn. 62, 615 (2010)

    Article  Google Scholar 

  34. X. Wang, L. Teng, X. Qin, Signal Process. 92, 1101 (2012)

    Article  Google Scholar 

  35. J. Ahmad, S.O. Hwang, Nonlinear Dyn. 82, 1839 (2015)

    Article  Google Scholar 

  36. M. Matsui, Linear cryptanalysis of the data encryption standard, in Eurocrypt’93, LNCS, Vol. 765 (Springer-Verlag, 1994) pp. 386--397

  37. E. Biham, A. Shamir, Differential Cryptanalysis of the Data Encryption Standard (Springer-Verlag, 1993)

  38. B. Schneier, Applied Cryptography (Wiley, 1996)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iqtadar Hussain.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hussain, I., Anees, A., Aslam, M. et al. A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps. Eur. Phys. J. Plus 133, 167 (2018). https://doi.org/10.1140/epjp/i2018-11987-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1140/epjp/i2018-11987-x

Navigation