Side-Channel Analysis of Chaos-Based Substitution Box Structures

被引:36
作者
Acikkapi, Mehmet Sahin [1 ]
Ozkaynak, Fatih [2 ]
Ozer, Ahmet Bedri [3 ]
机构
[1] Munzur Univ, Dept Comp Technol, TR-62100 Tunceli, Turkey
[2] Firat Univ, Dept Software Engn, TR-23119 Elazig, Turkey
[3] Firat Univ, Dept Comp Engn, TR-23119 Elazig, Turkey
来源
IEEE ACCESS | 2019年 / 7卷
关键词
Chaos; cryptography; s-box; side-channel analysis; AES; IMAGE ENCRYPTION; S-BOX; EFFICIENT; PERMUTATION; DESIGN;
D O I
10.1109/ACCESS.2019.2921708
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is a theoretically strong relationship between chaos and cryptology. In practice, one of the most successful applications of this relationship is chaos-based s-box structures. However, the performance metrics of chaos-based s-box designs are worse compared to those for s-box structure based on algebraic techniques used in modern encryption algorithms, such as the AES algorithm. What is the reason for using chaos-based s-box structures, even though they have worse cryptographic characteristics? Researchers claim that they may be an alternative defense against implementation attacks, especially side-channel analyses. However, no studies have supported or refuted this claim so far. In this paper, side-channel analyses have been performed for two different chaos-based s-box structures. These two s-box structures have been selected for having with the best and worst performance measurements for s-box structures previously proposed in the literature. The results were compared with the AES s-box structure. Analysis of the results showed that chaos-based s-box structures are more resistant against side-channel attacks. Therefore, chaos-based designs may be an alternative defense against implementation attacks, as alleged. However, both algebraic and chaos-based s-box designs have been observed to be insecure if the attacker has more than 30 plaintexts in the side channel analyses. These results show that implementation analysis studies are required in the chaos-based cryptology literature.
引用
收藏
页码:79030 / 79043
页数:14
相关论文
共 48 条
  • [1] Chaos-based diffusion for highly autocorrelated data in encryption algorithms
    Ahmad, Jawad
    Hwang, Seong Oun
    [J]. NONLINEAR DYNAMICS, 2015, 82 (04) : 1839 - 1850
  • [2] A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
    Ahmed, Hussam A.
    Zolkipli, Mohamad Fadli
    Ahmad, Musheer
    [J]. NEURAL COMPUTING & APPLICATIONS, 2019, 31 (11) : 7201 - 7210
  • [3] A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes
    Al Solami, Eesa
    Ahmad, Musheer
    Volos, Christos
    Doja, Mohammad Najam
    Beg, Mirza Mohd Sufyan
    [J]. ENTROPY, 2018, 20 (07)
  • [4] Computationally efficient selective video encryption with chaos based block cipher
    Altaf, Muhammad
    Ahmad, Ayaz
    Khan, Farman Ali
    Uddin, Zahoor
    Yang, Xiaodong
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (21) : 27981 - 27995
  • [5] [Anonymous], LECT NOTES COMPUTER
  • [6] [Anonymous], 2007, WIRELESS SECURITY CR
  • [7] [Anonymous], LECT NOTES COMPUTER
  • [8] [Anonymous], 2016, LECT NOTES COMPUTER
  • [9] [Anonymous], IEEE ACCESS
  • [10] [Anonymous], 1998, 1 ADV ENCR C CAL