ABC Optimization Based Construction of Strong Substitution-Boxes

被引:53
作者
Ahmad, Musheer [1 ]
Doja, M. N. [1 ]
Beg, M. M. Sufyan [2 ]
机构
[1] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[2] Aligarh Muslim Univ, Dept Comp Engn, Aligarh 202002, Uttar Pradesh, India
关键词
ABC optimization; Substitution-box; Chaotic Logistic map; Block ciphers; Security; CHAOTIC MAP; S-BOXES; DESIGN; SCHEME;
D O I
10.1007/s11277-018-5787-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Most of the block ciphers contain substitution-boxes as their cornerstone primitive to add requisite nonlinearity. S-boxes are responsible to ensure strong confusion and resistance to linear and differential assaults. The security of such ciphers relies on the strength of S-boxes deployed during substitution stage. It is challenging to construct cryptographically strong S-boxes that satisfy several properties such as high nonlinearity, good avalanche effect, bit-independent criteria, low differential uniformity and linear probability, etc. In this paper, we proposed to construct an S-box based on artificial bee colony optimization and chaotic map. The algorithm is designed to optimize an initial S-box to satisfy many properties. The simulation outcomes and comparison with recent proposals show that the proposed ABC optimization based algorithm performs reasonably well and construct S-box that exhibits higher security strength.
引用
收藏
页码:1715 / 1729
页数:15
相关论文
共 49 条
  • [1] Adams C., 1990, Journal of Cryptology, V3, P27, DOI 10.1007/BF00203967
  • [2] Ahmad M., 2016, Perspectives in Science, V8, P465
  • [3] A Novel Ant Colony Optimization Based Scheme for Substitution Box Design
    Ahmad, Musheer
    Bhatia, Deepanshu
    Hassan, Yusuf
    [J]. 3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 572 - 580
  • [4] A Technique for Designing Substitution Box Based on Van der Pol Oscillator
    Anees, Amir
    Ahmed, Zeeshan
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1497 - 1503
  • [5] [Anonymous], 2005, Cryptography: Theory and Practice
  • [6] [Anonymous], 2016, HDB APPL CRYPTOGRAPH
  • [7] [Anonymous], 1991, LNCS
  • [8] [Anonymous], 2005, THESIS
  • [9] [Anonymous], 2014, RESEARCH
  • [10] [Anonymous], 2005, TR06 ERC U COMP ENG