ABC Optimization Based Construction of Strong Substitution-Boxes

被引:55
作者
Ahmad, Musheer [1 ]
Doja, M. N. [1 ]
Beg, M. M. Sufyan [2 ]
机构
[1] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[2] Aligarh Muslim Univ, Dept Comp Engn, Aligarh 202002, Uttar Pradesh, India
关键词
ABC optimization; Substitution-box; Chaotic Logistic map; Block ciphers; Security; CHAOTIC MAP; S-BOXES; DESIGN; SCHEME;
D O I
10.1007/s11277-018-5787-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Most of the block ciphers contain substitution-boxes as their cornerstone primitive to add requisite nonlinearity. S-boxes are responsible to ensure strong confusion and resistance to linear and differential assaults. The security of such ciphers relies on the strength of S-boxes deployed during substitution stage. It is challenging to construct cryptographically strong S-boxes that satisfy several properties such as high nonlinearity, good avalanche effect, bit-independent criteria, low differential uniformity and linear probability, etc. In this paper, we proposed to construct an S-box based on artificial bee colony optimization and chaotic map. The algorithm is designed to optimize an initial S-box to satisfy many properties. The simulation outcomes and comparison with recent proposals show that the proposed ABC optimization based algorithm performs reasonably well and construct S-box that exhibits higher security strength.
引用
收藏
页码:1715 / 1729
页数:15
相关论文
共 49 条
[31]   A novel construction of substitution box with Zaslavskii chaotic map and symmetric group [J].
Khan, Majid ;
Shah, Tariq .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (04) :1509-1517
[32]   An efficient construction of substitution box with fractional chaotic system [J].
Khan, Majid ;
Shah, Tariq .
SIGNAL IMAGE AND VIDEO PROCESSING, 2015, 9 (06) :1335-1338
[33]  
Knudsen LR, 2011, INFORM SEC CRYPT TEX, P1, DOI 10.1007/978-3-642-17342-4
[34]   A novel method of S-box design based on discrete chaotic map [J].
Lambic, Dragan .
NONLINEAR DYNAMICS, 2017, 87 (04) :2407-2413
[35]   Utilizing evolutionary computation methods for the design of S-boxes [J].
Laskari, Elena C. ;
Meletiou, Gerasimos C. ;
Vrahatis, Michael N. .
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, :1299-1302
[36]   Designing S-boxes based on 3-D four-wing autonomous chaotic system [J].
Liu, Guangjie ;
Yang, Weiwei ;
Liu, Weiwei ;
Dai, Yuewei .
NONLINEAR DYNAMICS, 2015, 82 (04) :1867-1877
[37]   Chaos-based color image block encryption scheme using S-box [J].
Liu, Hongjun ;
Kadir, Abdurahman ;
Niu, Yujun .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2014, 68 (07) :676-686
[38]  
Matsui M., 1993, Advances in Cryptology, V765, P386, DOI [DOI 10.1007/3-540-48285-733, 10.1007/3-540-48285-733, DOI 10.1007/3-540-48285-7]
[39]   SIMPLE MATHEMATICAL-MODELS WITH VERY COMPLICATED DYNAMICS [J].
MAY, RM .
NATURE, 1976, 261 (5560) :459-467
[40]  
Millan W., 1998, Information Security and Privacy. Third Australasian Conference, ACISP'98. Proceedings, P181, DOI 10.1007/BFb0053732