Design, Implementation, and Analysis of a Block Cipher Based on a Secure Chaotic Generator

被引:13
作者
Dridi, Fethi [1 ,2 ]
El Assad, Safwan [2 ]
Youssef, Wajih El Hadj [1 ]
Machhout, Mohsen [1 ]
Lozi, Rene [3 ]
机构
[1] Univ Monastir, Fac Sci Monastir, Elect & Microelect Lab E E, Monastir 5019, Tunisia
[2] Univ Nantes, CNRS, IETR UMR 6164, F-44000 Nantes, France
[3] Univ Cote dAzur, CNRS, LJAD, F-06000 Nice, France
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 19期
关键词
chaos-based encryption; decryption system; PRNG-CS; S-box; modified 2-D cat map; performance; security analysis; IMAGE ENCRYPTION SCHEME; PERMUTATION; ALGORITHM; MAP; BOX;
D O I
10.3390/app12199952
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
This work proposes a new secure chaos-based encryption/decryption system, operating in cipher block chaining (CBC) mode, and analyze its performance. The cryptosystem includes a robust pseudorandom number generator of chaotic sequences (PRNG-CS). A strong chaos-based S-box is proposed to perform a circular substitution operation (confusion process). This PRNG-CS consists of four discrete 1-D chaotic maps, weakly coupled by a predefined coupling matrix M, to avoid, on the one hand, the divide-and-conquer attack and, on the other hand, to improve the generated sequence's randomness and lengths. The noun is also used in the construction of the S-box. Moreover, a 2-D modified cat map and a horizontal addition diffusion (HAD) preceded by a vertical addition diffusion (VAD) are introduced to perform the diffusion process. The security analysis and numerous simulation results of the main components (PRNG-CS and S-box) as well as the whole cryptosystem reveal that the proposed chaos-based cryptosystem holds up against various types of statistical and cryptographic attacks.
引用
收藏
页数:25
相关论文
共 53 条
[1]   A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map [J].
Ahmed, Hussam A. ;
Zolkipli, Mohamad Fadli ;
Ahmad, Musheer .
NEURAL COMPUTING & APPLICATIONS, 2019, 31 (11) :7201-7210
[2]   A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes [J].
Al Solami, Eesa ;
Ahmad, Musheer ;
Volos, Christos ;
Doja, Mohammad Najam ;
Beg, Mirza Mohd Sufyan .
ENTROPY, 2018, 20 (07)
[3]   A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations [J].
Alawida, Moatsum ;
Teh, Je Sen ;
Mehmood, Abid ;
Shoufan, Abdulhadi ;
Alshoura, Wafa' Hamdan .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) :8136-8151
[4]   Implementing a Symmetric Lightweight Cryptosystem in Highly Constrained IoT Devices by Using a Chaotic S-Box [J].
Alshammari, Badr M. ;
Guesmi, Ramzi ;
Guesmi, Tawfik ;
Alsaif, Haitham ;
Alzamil, Ahmed .
SYMMETRY-BASEL, 2021, 13 (01) :1-20
[5]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[6]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[7]   A Survey on Chaos-Based Cryptosystems: Implementations and Applications [J].
Bouteghrine, Belqassim ;
Tanougast, Camel ;
Sadoudi, Said .
14TH CHAOTIC MODELING AND SIMULATION INTERNATIONAL CONFERENCE, 2022, :65-80
[8]  
Bruce S., 1996, APPL CRYPTOGRAPHY PR
[9]   An improved fragile watermarking algorithm for JPEG images [J].
Caragata, Daniel ;
El Assad, Safwan ;
Luduena, Mauricio .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (12) :53-64
[10]   A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system [J].
Cavusoglu, Unal ;
Zengin, Ahmet ;
Pehlivan, Ihsan ;
Kacar, Sezgin .
NONLINEAR DYNAMICS, 2017, 87 (02) :1081-1094