Design of S-Boxes based on discrete chaos system

被引:0
|
作者
机构
[1] Ding, Wenxia
[2] Wang, Hao
来源
Ding, W. (dwx2004@sina.com) | 1600年 / National University of Defense Technology卷 / 35期
关键词
Applied cryptography - Block cipher algorithms - Experimental analysis - Generation algorithm - Nonlinear components - Output bits - Strict avalanche criterion - Substitution Box(S Box);
D O I
暂无
中图分类号
学科分类号
摘要
S-box is the only nonlinear components of block cipher algorithm which can provide confounding effect. Its password strength determinates the security strength of the whole cipher algorithms. An S-Box generation algorithm based on the discrete chaos system which uses multi-chaos maps and cross-generation method to generate S-Boxes was proposed. Good characteristics such as bounded, a periodic and extremely sensitive to initial conditions and parameters of discrete chaos system were combined in the algorithm. Experimental analysis shows that the samples generated by our algorithm have strong key sensitivity and good randomness, thus can satisfy both the high security criteria and features required by the S-Box design. It improves the performance by reducing the computational complexity and has good scalability and low implementation cost. Therefore, the proposed method can serve as a promising choice for designing S-Boxes.
引用
收藏
相关论文
共 50 条
  • [31] DEGENERATE S-BOXES
    Lisickiy, K. E.
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2018, (01) : 129 - 138
  • [32] Nonlinearities of S-boxes
    Carlet, Claude
    Ding, Cunsheng
    FINITE FIELDS AND THEIR APPLICATIONS, 2007, 13 (01) : 121 - 135
  • [33] Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog
    Perrin, Leo
    Udovenko, Aleksei
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) : 99 - 124
  • [34] Generation of Highly Nonlinear and Dynamic AES Substitution-Boxes (S-Boxes) Using Chaos-Based Rotational Matrices
    Malik, Muhammad Sarmad Mahmood
    Ali, Muhammad Asim
    Khan, Muhammad Asif
    Ehatisham-Ul-Haq, Muhammad
    Shah, Syed Nasir Mehmood
    Rehman, Mobashar
    Ahmad, Waqar
    IEEE ACCESS, 2020, 8 : 35682 - 35695
  • [35] Design of S-boxes Defined with Cellular Automata Rules
    Picek, Stjepan
    Mariot, Luca
    Yang, Bohan
    Jakobovic, Domagoj
    Mentens, Nele
    ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2017, 2017, : 409 - 414
  • [36] Utilizing evolutionary computation methods for the design of S-boxes
    Laskari, Elena C.
    Meletiou, Gerasimos C.
    Vrahatis, Michael N.
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1299 - 1302
  • [37] Chaos based adaptive double-image encryption scheme using hash function and S-boxes
    Hongjun Liu
    Abdurahman Kadir
    Xiaobo Sun
    Yanling Li
    Multimedia Tools and Applications, 2018, 77 : 1391 - 1407
  • [38] Fault Detection Structures of the S-boxes and the Inverse S-boxes for the Advanced Encryption Standard
    Mehran Mozaffari-Kermani
    Arash Reyhani-Masoleh
    Journal of Electronic Testing, 2009, 25 : 225 - 245
  • [39] A CRYPTOGRAPHIC STUDY ON S—BOXES OF DES TYPE Ⅰ AN INTEGRATED ANALYSIS OF THE DESIGN CRITERIA FOR S-BOXES
    杨君辉
    戴宗铎
    曾肯成
    Systems Science and Mathematical Sciences, 1991, (02) : 104 - 110
  • [40] Designing chaotic S-boxes based on time-delay chaotic system
    Fatih Özkaynak
    Sırma Yavuz
    Nonlinear Dynamics, 2013, 74 : 551 - 557