Generation of Highly Nonlinear and Dynamic AES Substitution-Boxes (S-Boxes) Using Chaos-Based Rotational Matrices

被引:47
作者
Malik, Muhammad Sarmad Mahmood [1 ]
Ali, Muhammad Asim [2 ]
Khan, Muhammad Asif [1 ]
Ehatisham-Ul-Haq, Muhammad [1 ]
Shah, Syed Nasir Mehmood [3 ]
Rehman, Mobashar [4 ]
Ahmad, Waqar [1 ]
机构
[1] Univ Engn & Technol UST, Dept Comp Engn, Taxila 47050, Pakistan
[2] Univ Wah, Dept Comp Sci, Wah Cantt 47040, Pakistan
[3] Inst Space Technol, Dept Comp Sci KICSIT, Islamabad 44000, Pakistan
[4] Univ Tunku Abdul Rahman, Fac Informat & Commun Technol, Dept Informat Syst, Kampar 31900, Malaysia
关键词
Affine transformation; chaotic logistic map; S-box; NIST test; DESIGN; CRYPTANALYSIS; MAP;
D O I
10.1109/ACCESS.2020.2973679
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work reports a novel chaos-based affine transformation generation method, which is based on rotational matrices to design strong key-based S-boxes. Chaotic logistic maps nonlinear trajectories are used to generate rotational matrices under given design conditions. Thus, the inherent logic is to generate key-based S-boxes, as strong as AES S-box, in terms of cryptographic properties using chaos in affine transformation. The randomness of chaotic sequences is tested using the National Institute of Standard and Technology (NIST) Statistical Test Suit (STS) 800-22 that validates the generated sequences for S-box design. The results show that methodology adapted to design proposed key-based dynamic S-boxes entails near-optimal cryptographic properties so that proposed S-boxes are as stronger as AES S-box.
引用
收藏
页码:35682 / 35695
页数:14
相关论文
共 69 条
[1]   A novel image steganography technique based on quantum substitution boxes [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. .
OPTICS AND LASER TECHNOLOGY, 2019, 116 :92-102
[2]  
Ahmad M., 2018, ADV INTELLIGENT SYST, P347, DOI DOI 10.1007/978-981-10-3223-3_33
[3]  
ALabaichi Ashwak, 2013, International Journal of Digital Content Technology and its Applications, V7, P8
[4]  
Alabaichi A, 2015, 2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS (ICDIPC), P44, DOI 10.1109/ICDIPC.2015.7323004
[5]  
Ali F. H. B. T. J. M., 2009, 20095 FSKTM U PUTR M
[6]  
Ali S., 2015, SECURE SYSTEM DESIGN, P163
[7]   A novel design for the construction of safe S-boxes based on TDERC sequence [J].
Alkhaldi, Ali Hussain ;
Hussain, Iqtadar ;
Gondal, Muhammad Asif .
ALEXANDRIA ENGINEERING JOURNAL, 2015, 54 (01) :65-69
[8]   A New 1D Chaotic Map and β-Hill Climbing for Generating Substitution-Boxes [J].
Alzaidi, Amer Awad ;
Ahmad, Musheer ;
Doja, M. N. ;
Al Solami, Eesa ;
Beg, M. M. Sufyan .
IEEE ACCESS, 2018, 6 :55405-55418
[9]  
[Anonymous], 2013, The design of Rijndael: AES-the advanced encryption standard
[10]  
[Anonymous], 2019, ENTROPY-SWITZ, DOI DOI 10.3390/e21101004