Abstract
The Key Expansion Function is a vital constituent component of any block cipher. Many of Key Expansion Functions generate subkeys through the algorithms which are based on Feistel or Substitution Permutation Network (SPN) structures against which cryptanalytic methods have been well researched. In this very paper, an efficient method for generating subkeys based on chaotic maps has been suggested. The phenomenon behind the proposed Key Expansion Function is the mixing property of Tent Map. Using chaotic binary sequences, the proposed Key Expansion Function satisfies the specific statistical and cryptographic properties of chaotic generators. A new Bit Extraction Technique based on IEEE-754 Floating-point Standard (binary32) is used to extract the bits of subkeys from the chaotic binary sequences. The generated subkeys are then analyzed. The results show that the given Chaos-based Key Expansion Function is well protected and fully strengthened in all respects.




References
Alvarez G, Montoya F, Romera M, Pastor G (1999) Chaotic Cryptosystems. In: Sanson LD (eds) Proc. 33rd IEEE Annual International Carnahan Conference on Security Technology pp. 332–338
Alvarez G, Montoya F, Romera M, Pastor G (2003) Cryptanalysis of a discrete chaotic cryptosystems using external key. Phys Lett A 319(3–4):334–339
Chengqing L, Shujun L, Gonzalo A, Guanrong C, Kwok-Tung L (2006) Cryptanalysis of a chaotic block cipher with external key and its improved version. Elsevier Science
Cristea B (2008) Statistical properties of chaotic binary sequences. In: IEEE Transactions on Information Theory, arXiv:0805.4405v1
Faraoun K (2010) Chaos-based keystream generator based on multiple maps combinations and its application to images encryption. The International Arab Journal of Information Technology 7(3)
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8:1259–1284
Habutsu T, Nishio Y, Sasase I, Mori S (1991) A secret key cryptosystem by iterating a chaotic map. Proc Eurocrypt, 127–139
Halle KS, Wu CW, Itoh M, Chua LO (1993) Spread spectrum communication through modulation of chaos in Chua’s circuit: a paradigm for chaos 379–394
Halle KS, Wu CW, Itoh M, Chua LO (1993) Chua’s circuit: a paradigm for chaos. In: Madan RN (ed) World scientific, Singapore
Hasler M (1998) Synchronization of chaotic systems and transmission of information. Int J Bifurcation Chaos 8:647–659
Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. Circuits and systems. In: Fundamental theory and application, IEEE Transaction, 48(2):163–169, Digital Object Identifier 10.1109/81.904880
Jing Q, Xiafeng L, Ping W (2007) A method to construct Dynamic S-Box based on Chaotic Map. In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 03:522–525
Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6–21
Kocarev LJ, Halle KS, Eckert K, Parlitz U, Chua LO (1992) Experimental demonstration of secure communications via chaotic synchronization. Int J Bifurcation Chaos 2:709–713
Kristina K, Wolfgang S (2005) General design rules for chaos-based encryption systems. In: International Symposium on Nonlinear Theory and its Applications (NOLTA2005) Bruges, Belgium
Li S (2003) Analysis and new designs of digital chaotic ciphers. Ph.D. Thesis, School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an, China
Lian S, Sun J, Wang Z (2005) Security analysis of a chaos-based image encryption algorithm. In: Physica, A 351:645–661
Mao Y, Chen G, Lian S (2003) A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurc Chaos
Muhammad A, Varun J (2008) Efficient and simple method for designing chaotic S-boxes. In: ETRI Journal 30(1)
Pareek N, Patidar V, Sud K (2003) Discrete chaotic cryptography using external key. Phys Lett A 309(1–2):75–82
Pareek N, Patidar V, Sud K (2005) Cryptography using multiple one-dimensional chaotic maps. In: Communications in Nonlinear Science and Numerical Simulation, 10(7):715–723
Pareek N, Patidar V, Sud K (2006) Image encryption using chaotic logistic map: image and vision computing. In: press, doi: 10.1016/j.imavis.2006.02.021
Pecora LM, Carroll KS (1990) Synchronization in chaotic systems. Phys Rev Lett 64
Ranjan B, Amitabha B (1999) Implementing symmetric cryptography using chaos functions. In: 7th International Conference of Advanced Communications and Computing (AdCom)
Schmitz R (2001) Use of chaotic dynamical systems in cryptography. J Franklin Inst 338(4):429–441
Silva CP, Young AM (2000) Introduction to chaos-based communications and signal processing. In: Proc. IEEE Aerospace Conference, pp 279–299
Wei J, Lia X, Wong KW, Zhou T (2006) Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps. In: Communications in Nonlinear Science and Numerical Simulation, doi:10.1016/j.cnsns.2005.06.001
Yang T (2004) A survey of chaotic secure communication systems. Int J Comput Cognit 2(2):81–130
Zhou H, Ling XT (1997) Problems with the chaotic inverse system encryption approach. In: IEEE Transaction, Circuits and Systems 144(3):268–271
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kazmi, S., Ikram, N. Chaos based key expansion function for block ciphers. Multimed Tools Appl 66, 267–281 (2013). https://doi.org/10.1007/s11042-011-0767-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-011-0767-4