Automated Chaos-Driven S-Box Generation and Analysis Tool for Enhanced Cryptographic Resilience

被引:10
作者
Aydin, Yilmaz [1 ]
Ozkaynak, Fatih [1 ,2 ]
机构
[1] Fırat Univ, Dept Software Engn, TR-23119 Elazig, Turkiye
[2] Kriptarium Arge Yazılım Danismanlik Sa, TR-23119 Elazig, Turkiye
关键词
Chaos theory; cryptography; information security; substitution box; SUBSTITUTION-BOX; NONLINEAR COMPONENT; BLOCK CIPHER; GENETIC ALGORITHM; BOOLEAN FUNCTIONS; DESIGN; MAP; CONSTRUCTION; SCHEME; SYSTEM;
D O I
10.1109/ACCESS.2023.3346319
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a rapidly advancing world of technology, information security studies have become the backbone of the digital age, and steps in this area are critical. In this context, cryptography, in particular, plays a key role in ensuring the confidentiality, integrity and authentication of data. s-box structures provide a certain diversity and security layer in encryption algorithms, forming one of the key elements in this area. This study focuses on the design and analysis of s-box structures, examining the potential impact of chaos theory-based structures on encryption systems. First, it provides a comprehensive classification of existing s-box design proposals in the literature, and explores the contribution of chaos theory to the security features of these structures. The original contribution of the study is the results obtained with the help of the developed analysis and design program. The program optimizes levels of complexity, randomness, and resistance, and demonstrates the resistance of these new structures to cryptanalysis attacks. The paper also draws attention to open issues in the field of chaos-based s-box design and provides a road map for future research. It is estimated that all these findings will provide a common motivation for researchers in the relevant literature and constitute the basis for many practical practices.
引用
收藏
页码:312 / 328
页数:17
相关论文
共 146 条
[1]   A Method to Determine the Most Suitable Initial Conditions of Chaotic Map in Statistical Randomness Applications [J].
Acikkapi, Mehmet Sahin ;
Ozkaynak, Fatih .
IEEE ACCESS, 2021, 9 :1482-1494
[2]   Multi-Objective Evolution of Strong S-Boxes Using Non-Dominated Sorting Genetic Algorithm-II and Chaos for Secure Telemedicine [J].
Ahmad, Musheer ;
Alkanhel, Reem ;
El-Shafai, Walid ;
Algarni, Abeer D. ;
Abd El-Samie, Fathi E. ;
Soliman, Naglaa F. .
IEEE ACCESS, 2022, 10 :112757-112775
[3]   Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation [J].
Ahmad, Musheer ;
Al-Solami, Eesa .
COMPLEXITY, 2020, 2020
[4]   Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme [J].
Ahmad, Musheer ;
Al-Solami, Eesa .
ENTROPY, 2020, 22 (07)
[5]   Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications [J].
Ahmad, Musheer ;
Khaja, Ishfaq Ahmad ;
Baz, Abdullah ;
Alhakami, Hosam ;
Alhakami, Wajdi .
IEEE ACCESS, 2020, 8 :116132-116147
[6]   Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures [J].
Ahmad, Musheer ;
Al-Solami, Eesa ;
Alghamdi, Ahmed Mohammed ;
Yousaf, Muhammad Awais .
IEEE ACCESS, 2020, 8 :110397-110411
[7]   A Novel Ant Colony Optimization Based Scheme for Substitution Box Design [J].
Ahmad, Musheer ;
Bhatia, Deepanshu ;
Hassan, Yusuf .
3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 :572-580
[8]   A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map [J].
Ahmed, Hussam A. ;
Zolkipli, Mohamad Fadli ;
Ahmad, Musheer .
NEURAL COMPUTING & APPLICATIONS, 2019, 31 (11) :7201-7210
[9]   A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes [J].
Al Solami, Eesa ;
Ahmad, Musheer ;
Volos, Christos ;
Doja, Mohammad Najam ;
Beg, Mirza Mohd Sufyan .
ENTROPY, 2018, 20 (07)
[10]   A novel method to generate key-dependent s-boxes with identical algebraic properties [J].
Al-Dweik, Ahmad Y. ;
Hussain, Iqtadar ;
Saleh, Moutaz ;
Mustafa, M. T. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 64