Skip to main content
Log in

Chaos based key expansion function for block ciphers

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The Key Expansion Function is a vital constituent component of any block cipher. Many of Key Expansion Functions generate subkeys through the algorithms which are based on Feistel or Substitution Permutation Network (SPN) structures against which cryptanalytic methods have been well researched. In this very paper, an efficient method for generating subkeys based on chaotic maps has been suggested. The phenomenon behind the proposed Key Expansion Function is the mixing property of Tent Map. Using chaotic binary sequences, the proposed Key Expansion Function satisfies the specific statistical and cryptographic properties of chaotic generators. A new Bit Extraction Technique based on IEEE-754 Floating-point Standard (binary32) is used to extract the bits of subkeys from the chaotic binary sequences. The generated subkeys are then analyzed. The results show that the given Chaos-based Key Expansion Function is well protected and fully strengthened in all respects.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

References

  1. Alvarez G, Montoya F, Romera M, Pastor G (1999) Chaotic Cryptosystems. In: Sanson LD (eds) Proc. 33rd IEEE Annual International Carnahan Conference on Security Technology pp. 332–338

  2. Alvarez G, Montoya F, Romera M, Pastor G (2003) Cryptanalysis of a discrete chaotic cryptosystems using external key. Phys Lett A 319(3–4):334–339

    Article  MathSciNet  MATH  Google Scholar 

  3. Chengqing L, Shujun L, Gonzalo A, Guanrong C, Kwok-Tung L (2006) Cryptanalysis of a chaotic block cipher with external key and its improved version. Elsevier Science

  4. Cristea B (2008) Statistical properties of chaotic binary sequences. In: IEEE Transactions on Information Theory, arXiv:0805.4405v1

  5. Faraoun K (2010) Chaos-based keystream generator based on multiple maps combinations and its application to images encryption. The International Arab Journal of Information Technology 7(3)

  6. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8:1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  7. Habutsu T, Nishio Y, Sasase I, Mori S (1991) A secret key cryptosystem by iterating a chaotic map. Proc Eurocrypt, 127–139

  8. Halle KS, Wu CW, Itoh M, Chua LO (1993) Spread spectrum communication through modulation of chaos in Chua’s circuit: a paradigm for chaos 379–394

  9. Halle KS, Wu CW, Itoh M, Chua LO (1993) Chua’s circuit: a paradigm for chaos. In: Madan RN (ed) World scientific, Singapore

  10. Hasler M (1998) Synchronization of chaotic systems and transmission of information. Int J Bifurcation Chaos 8:647–659

    Article  MATH  Google Scholar 

  11. Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. Circuits and systems. In: Fundamental theory and application, IEEE Transaction, 48(2):163–169, Digital Object Identifier 10.1109/81.904880

  12. Jing Q, Xiafeng L, Ping W (2007) A method to construct Dynamic S-Box based on Chaotic Map. In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 03:522–525

  13. Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1(3):6–21

    Article  Google Scholar 

  14. Kocarev LJ, Halle KS, Eckert K, Parlitz U, Chua LO (1992) Experimental demonstration of secure communications via chaotic synchronization. Int J Bifurcation Chaos 2:709–713

    Article  MATH  Google Scholar 

  15. Kristina K, Wolfgang S (2005) General design rules for chaos-based encryption systems. In: International Symposium on Nonlinear Theory and its Applications (NOLTA2005) Bruges, Belgium

  16. Li S (2003) Analysis and new designs of digital chaotic ciphers. Ph.D. Thesis, School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an, China

  17. Lian S, Sun J, Wang Z (2005) Security analysis of a chaos-based image encryption algorithm. In: Physica, A 351:645–661

  18. Mao Y, Chen G, Lian S (2003) A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurc Chaos

  19. Muhammad A, Varun J (2008) Efficient and simple method for designing chaotic S-boxes. In: ETRI Journal 30(1)

  20. Pareek N, Patidar V, Sud K (2003) Discrete chaotic cryptography using external key. Phys Lett A 309(1–2):75–82

    Article  MathSciNet  MATH  Google Scholar 

  21. Pareek N, Patidar V, Sud K (2005) Cryptography using multiple one-dimensional chaotic maps. In: Communications in Nonlinear Science and Numerical Simulation, 10(7):715–723

  22. Pareek N, Patidar V, Sud K (2006) Image encryption using chaotic logistic map: image and vision computing. In: press, doi: 10.1016/j.imavis.2006.02.021

  23. Pecora LM, Carroll KS (1990) Synchronization in chaotic systems. Phys Rev Lett 64

  24. Ranjan B, Amitabha B (1999) Implementing symmetric cryptography using chaos functions. In: 7th International Conference of Advanced Communications and Computing (AdCom)

  25. Schmitz R (2001) Use of chaotic dynamical systems in cryptography. J Franklin Inst 338(4):429–441

    Article  MathSciNet  MATH  Google Scholar 

  26. Silva CP, Young AM (2000) Introduction to chaos-based communications and signal processing. In: Proc. IEEE Aerospace Conference, pp 279–299

  27. Wei J, Lia X, Wong KW, Zhou T (2006) Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps. In: Communications in Nonlinear Science and Numerical Simulation, doi:10.1016/j.cnsns.2005.06.001

  28. Yang T (2004) A survey of chaotic secure communication systems. Int J Comput Cognit 2(2):81–130

    Google Scholar 

  29. Zhou H, Ling XT (1997) Problems with the chaotic inverse system encryption approach. In: IEEE Transaction, Circuits and Systems 144(3):268–271

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shagufta Kazmi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kazmi, S., Ikram, N. Chaos based key expansion function for block ciphers. Multimed Tools Appl 66, 267–281 (2013). https://doi.org/10.1007/s11042-011-0767-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-011-0767-4

Keywords

Navigation