Construction of S-box based on chaotic Boolean functions and its application in image encryption

被引:127
作者
Khan, Majid [1 ]
Shah, Tariq [2 ]
Batool, Syeda Iram [2 ]
机构
[1] Natl Univ Comp & Emerging Sci, Dept Sci & Humanities, Islamabad, Pakistan
[2] Quaid I Azam Univ, Dept Math, Islamabad, Pakistan
关键词
Chaos; Binary chaotic sequences; Substitution box; ALGEBRAIC ATTACKS; SUBSTITUTION BOX; CRYPTANALYSIS; MAP; CRYPTOGRAPHY; CIPHERS;
D O I
10.1007/s00521-015-1887-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In numerous encryption frameworks, the first information is changed into encoded form by applying nonlinear substitutions and affecting diffusion. The goal of the nonlinear change is to accomplish high level of randomness in the image content. The choice of the source of randomness is critical because the success in cryptanalysis is demarked by the characteristics identified in the encrypted data. The chaotic frameworks show random conduct that is suitable for encryption applications where nonlinear transformations are needed in the middle of plaintext and the scrambled information. The application of nonlinear functional chaos-based system with embedded chaotic systems and binary chaotic sequences can prompt randomness and diffusion in the information. In addition to the high state of randomness, the requirement for various round keys is needed in a run of the mill substitution-permutation process. The proposed strategy kills the requirement for different round keys, which is suitable for high-speed communication frameworks. The measurable analyses performed on the proposed nonlinear algorithm which show improvement in encryption quality and safety against numerous brute-force and statistical attacks. Also, the proposed framework demonstrates high safety against differential and linear cryptanalysis.
引用
收藏
页码:677 / 685
页数:9
相关论文
共 34 条
  • [1] ADAMS C, 1990, LECT NOTES COMPUT SC, V435, P612
  • [2] Alsafasfeh Q.H., 2011, J SIGNAL INF PROCESS, V2, P238, DOI DOI 10.4236/JSIP.2011.23033
  • [3] Cryptanalysis of a chaotic encryption system
    Alvarez, G
    Montoya, F
    Romera, M
    Pastor, G
    [J]. PHYSICS LETTERS A, 2000, 276 (1-4) : 191 - 196
  • [4] Cryptanalysis of dynamic look-up table based chaotic cryptosystems
    Alvarez, G
    Montoya, F
    Romera, M
    Pastor, G
    [J]. PHYSICS LETTERS A, 2004, 326 (3-4) : 211 - 218
  • [5] Cryptanalysis of a chaotic secure communication system
    Alvarez, G
    Montoya, F
    Romera, M
    Pastor, G
    [J]. PHYSICS LETTERS A, 2003, 306 (04) : 200 - 205
  • [6] Cryptography with chaos
    Baptista, MS
    [J]. PHYSICS LETTERS A, 1998, 240 (1-2) : 50 - 54
  • [7] Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
  • [8] Courtois NT, 2003, LECT NOTES COMPUT SC, V2729, P176
  • [9] Courtois NT, 2002, LNCS, V2501, P267
  • [10] DAWSON MH, 1991, LECT NOTES COMPUT SC, V547, P352