A chaos-based word-wise stream cipher using keyed strong S-Box

被引:0
|
作者
Kadeer, Abudureheman [1 ]
Tuersun, Yilihamu [1 ]
Liu, Hongjun [2 ]
机构
[1] Xinjiang Univ Finance & Econ, Sch Informat Management, Urumqi 830012, Xinjiang, Peoples R China
[2] Univ Jinan, Sch Math Sci, Jinan 250022, Shandong, Peoples R China
关键词
Non-degenerate; 2D chaotic map; Strong S-box; Word-wise; Stream cipher; ALGORITHM; SYSTEM; MAP;
D O I
10.1016/j.compeleceng.2024.109951
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Stream ciphers are crucial in the realm of information security. However, many existing stream ciphers suffer from several vulnerabilities, including insufficient security levels and the use of Sboxes with low non-linearity, fixed points, reverse fixed points and short cycles. To address these issues, a robust word-wise stream cipher was proposed that incorporates a keyed strong S-box and a two-dimensional (2D) chaotic map, significantly enhancing overall security. A 2D nondegenerate quadratic map (2D-NDQM) was constructed and evaluated using bifurcation and phase diagrams, Lyapunov exponent, Kolmogorov entropy, sample entropy, correlation dimension, and TestU01. The 2D-NDQM is then utilized to design a keyed strong S-box construction algorithm. Based on this, a word-wise stream cipher leveraging both the 2D-NDQM and the keyed strong S-box was developed. A series of tests were conducted to evaluate the proposed stream cipher's performance. The results were promising, showing a key space of 2179, an average number of bits change rate of 50.0229%, a unified average changing intensity of 33.4402 %, and a number of pixels change rate of 99.6671 %. Additional metrics such as Hamming distance, linear complexity, and Shannon entropy also closely aligned with ideal values, confirming the security and feasibility of the proposed algorithm.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Design of a strong S-box based on a matrix approach
    Aboytes-Gonzalez, J. A.
    Murguia, J. S.
    Mejia-Carlos, M.
    Gonzalez-Aguilar, H.
    Ramirez-Torres, M. T.
    NONLINEAR DYNAMICS, 2018, 94 (03) : 2003 - 2012
  • [32] Design of a strong S-box based on a matrix approach
    J. A. Aboytes-González
    J. S. Murguía
    M. Mejía-Carlos
    H. González-Aguilar
    M. T. Ramírez-Torres
    Nonlinear Dynamics, 2018, 94 : 2003 - 2012
  • [33] Research of changeable S-Box in block cryptosystem based on chaos
    Zhao, Geng
    Yan, Hui
    Lu, Fangfang
    2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 436 - +
  • [34] Design of S-box based on the Discrete Chaos Synchronization systems
    Han, Dandan
    Zang, Hongyan
    Min, Lequan
    MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 1874 - +
  • [35] Baptista's Chaos-Based Cipher Implemented in a Field Programmable Gate Array
    Datcu, Octaviana
    Hobincu, Radu
    Petrica, Lucian
    2017 INTERNATIONAL SEMICONDUCTOR CONFERENCE (CAS), 40TH EDITION, 2017, : 191 - 194
  • [36] Secure image encryption algorithm design using a novel chaos based S-Box
    Cavusoglu, Unal
    Kacar, Sezgin
    Pehlivan, Ihsan
    Zengin, Ahmet
    CHAOS SOLITONS & FRACTALS, 2017, 95 : 92 - 101
  • [37] Constructing keyed strong S-Box with higher nonlinearity based on 2D hyper chaotic map and algebraic operation
    Si, Yuanyuan
    Liu, Hongjun
    Zhao, Mengdi
    INTEGRATION-THE VLSI JOURNAL, 2023, 88 : 269 - 277
  • [38] Strong s-box construction approach based on Josephus problem
    Artuğer F.
    Soft Computing, 2024, 28 (17-18) : 10201 - 10213
  • [39] A Strong Hybrid S-Box Scheme Based on Chaos, 2D Cellular Automata and Algebraic Structure
    Haque, Amirul
    Abdulhussein, Tabarak Ali
    Ahmad, Musheer
    Falah, Mayadah Waheed
    Abd El-Latif, Ahmed A.
    IEEE ACCESS, 2022, 10 : 116167 - 116181
  • [40] An improved method to obtaining s-box based on chaos and genetic algorithm
    Wang, Yong
    Lei, Peng
    HKIE Transactions Hong Kong Institution of Engineers, 2012, 19 (04): : 53 - 58