Generation of Highly Nonlinear and Dynamic AES Substitution-Boxes (S-Boxes) Using Chaos-Based Rotational Matrices

被引:46
作者
Malik, Muhammad Sarmad Mahmood [1 ]
Ali, Muhammad Asim [2 ]
Khan, Muhammad Asif [1 ]
Ehatisham-Ul-Haq, Muhammad [1 ]
Shah, Syed Nasir Mehmood [3 ]
Rehman, Mobashar [4 ]
Ahmad, Waqar [1 ]
机构
[1] Univ Engn & Technol UST, Dept Comp Engn, Taxila 47050, Pakistan
[2] Univ Wah, Dept Comp Sci, Wah Cantt 47040, Pakistan
[3] Inst Space Technol, Dept Comp Sci KICSIT, Islamabad 44000, Pakistan
[4] Univ Tunku Abdul Rahman, Fac Informat & Commun Technol, Dept Informat Syst, Kampar 31900, Malaysia
关键词
Affine transformation; chaotic logistic map; S-box; NIST test; DESIGN; CRYPTANALYSIS; MAP;
D O I
10.1109/ACCESS.2020.2973679
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work reports a novel chaos-based affine transformation generation method, which is based on rotational matrices to design strong key-based S-boxes. Chaotic logistic maps nonlinear trajectories are used to generate rotational matrices under given design conditions. Thus, the inherent logic is to generate key-based S-boxes, as strong as AES S-box, in terms of cryptographic properties using chaos in affine transformation. The randomness of chaotic sequences is tested using the National Institute of Standard and Technology (NIST) Statistical Test Suit (STS) 800-22 that validates the generated sequences for S-box design. The results show that methodology adapted to design proposed key-based dynamic S-boxes entails near-optimal cryptographic properties so that proposed S-boxes are as stronger as AES S-box.
引用
收藏
页码:35682 / 35695
页数:14
相关论文
共 69 条
[31]   A projective general linear group based algorithm for the construction of substitution box for block ciphers [J].
Hussain, Iqtadar ;
Shah, Tariq ;
Mahmood, Hasan ;
Gondal, Muhammad Asif .
NEURAL COMPUTING & APPLICATIONS, 2013, 22 (06) :1085-1093
[32]  
Hussien M, 2017, NAT RADIO SCI CO, P6
[33]   A Watermarking Technique with Chaotic Fractional S-Box Transformation [J].
Jamal, Sajjad Shaukat ;
Khan, Muhammad Usman ;
Shah, Tariq .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (04) :2033-2049
[34]  
Juremi J., 2012, P INT C CYBER SECURI, P38
[35]  
Kazlauskas K, 2009, INFORMATICA-LITHUAN, V20, P23
[36]   A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation [J].
Khan, Majid ;
Asghar, Zeeshan .
NEURAL COMPUTING & APPLICATIONS, 2018, 29 (04) :993-999
[37]   A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) [J].
Khan, Muhammad Asif ;
Ali, Asim ;
Jeoti, Varun ;
Manzoor, Shahid .
IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING, 2018, 42 (02) :219-238
[38]   A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System [J].
Khan, Muhammad Fahad ;
Ahmed, Adeel ;
Saleem, Khalid ;
Shah, Tariq .
IEEE ACCESS, 2019, 7 :84980-84991
[39]   A Novel Cryptographic Substitution Box Design Using Gaussian Distribution [J].
Khan, Muhammad Fahad ;
Ahmed, Adeel ;
Saleem, Khalid .
IEEE ACCESS, 2019, 7 :15999-16007
[40]  
Kocarev L., 2001, IEEE Circuits and Systems Magazine, V1, P6, DOI 10.1109/7384.963463