Skip to main content
Log in

Construction of S-box based on chaotic Boolean functions and its application in image encryption

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

In numerous encryption frameworks, the first information is changed into encoded form by applying nonlinear substitutions and affecting diffusion. The goal of the nonlinear change is to accomplish high level of randomness in the image content. The choice of the source of randomness is critical because the success in cryptanalysis is demarked by the characteristics identified in the encrypted data. The chaotic frameworks show random conduct that is suitable for encryption applications where nonlinear transformations are needed in the middle of plaintext and the scrambled information. The application of nonlinear functional chaos-based system with embedded chaotic systems and binary chaotic sequences can prompt randomness and diffusion in the information. In addition to the high state of randomness, the requirement for various round keys is needed in a run of the mill substitution–permutation process. The proposed strategy kills the requirement for different round keys, which is suitable for high-speed communication frameworks. The measurable analyses performed on the proposed nonlinear algorithm which show improvement in encryption quality and safety against numerous brute-force and statistical attacks. Also, the proposed framework demonstrates high safety against differential and linear cryptanalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Baptista MS (1998) Cryptography with chaos. Phys Lett A 240:50

    Article  MathSciNet  MATH  Google Scholar 

  2. Alvarez G, Montoya F, Romera M, Pastor G (2003) Cryptanalysis of a chaotic secure communication system. Phys Lett A 306:200

    Article  MathSciNet  MATH  Google Scholar 

  3. Alvarez G, Montoya F, Romera M, Pastor G (2000) Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys Lett A 276:191

    Article  MathSciNet  MATH  Google Scholar 

  4. Alvarez G, Montoya F, Romera M, Pastor G (2004) Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys Lett A 326:211

    Article  MathSciNet  MATH  Google Scholar 

  5. Adams C, Tavares S (1989) Good S-boxes are easy to find. In: Advances in cryptology: proceedings of CRYPTO_89. Lecture notes in computer science, pp 612–615

  6. Webster AF, Tavares S (1986) On the design of S-boxes. In: Advances in cryptology: proceedings of CRYPTO_85. Lecture notes in computer science, pp 523–534

  7. Detombe J, Tavares S (1992) On the design of S-boxes. In: Advances in cryptology: proceedings of CRYPTO_92. Lecture notes in computer science

  8. Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72

    Article  MathSciNet  MATH  Google Scholar 

  9. Dawson M, Tavares S (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In: Advances in cryptology: proceedings of EURO-CRYPT_91. Lecture notes in computer science, pp 352–367)

  10. Matsui M (1994) Linear cryptanalysis method of DES cipher: advances in cryptology. In: Proceeding of the Eurocrypt’93. Lecture notes in computer science, vol 765, pp 386–397

  11. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    Article  MathSciNet  MATH  Google Scholar 

  12. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379–423

    Article  MathSciNet  MATH  Google Scholar 

  13. Fatih Ö, Sırma Y (2013) Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn. doi:10.1007/s11071-013-0987-4

    MathSciNet  Google Scholar 

  14. Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst 48:163–169

    Article  MathSciNet  MATH  Google Scholar 

  15. Khan M, Shah T, Mahmood H, Gondal MA, Hussain I (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70:2303–2311

    Article  MathSciNet  Google Scholar 

  16. Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71:489–492

    Article  MathSciNet  Google Scholar 

  17. Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73:1795–1801

    Article  MathSciNet  Google Scholar 

  18. Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76:377–382

    Article  MathSciNet  MATH  Google Scholar 

  19. Khan M, Shah T An efficient construction of substitution box with fractional chaotic system, signal, image and video processing. doi:10.1007/s11760-013-0577-4

  20. Khan M, Shah T A novel image encryption technique based on Hénon chaotic map and S8 symmetric group. Neural Comput Appl. Springer. doi:10.1007/s00521-014-1663-4

  21. Khan M, Shah T (2014) A novel statistical analysis of chaotic S-box in image encryption. 3D Res 5:16. doi:10.1007/s13319-014-0016-5

    Article  Google Scholar 

  22. Khan M, Shah T, Batool IB (2014) Texture analysis of chaotic coupled map lattices based image encryption algorithm. 3D Res 5:19. doi:10.1007/s13319-014-0019-2

    Article  Google Scholar 

  23. Khan M, Shah T (2015) A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J Intell Fuzzy Syst 28:1509–1517

    MathSciNet  Google Scholar 

  24. Khan M, Shah T (2014) A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics. Neural Comput Appl. doi:10.1007/s00521-014-1747-1

  25. Hussain I, Shah T, Gondal MA, Mahmood H (2013) Efficient method for designing chaotic S-boxes based on generalized Baker’s map and TDERC chaotic sequence. Nonlinear Dyn. doi:10.1007/s11071-013-0963-z

    MathSciNet  Google Scholar 

  26. Rhouma R, Soumaya M, Safya B (2009) OCML-based colour image encryption. Chaos Solitons Fractals 40:309–318

    Article  MATH  Google Scholar 

  27. Sahar M, Amir ME (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3):1745–1754

    Article  MATH  Google Scholar 

  28. Liu HJ, Wang XY (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327

    Article  MathSciNet  MATH  Google Scholar 

  29. Qais HA, Arfoa AA (2011) Image encryption based on the general approach for multiple chaotic systems. J Signal Inform Process 2:238–244

    Article  Google Scholar 

  30. Courtois N, Pieprzyk J (2002) Cryptanalysis of block ciphers with over defined systems of equations, advances in cryptology—Asiacrypt 2002, LNCS 2501. Springer, Berlin

    Google Scholar 

  31. Courtois N (2003) Fast algebraic attacks on stream ciphers with linear feedback, Crypto 2003. In: Boneh D (ed) Lecture notes in computer science, vol 2729. Springer, Berlin, pp 176–194

    Google Scholar 

  32. Meier W, Pasalic E, Carlet C (2004) Algebraic attacks and decomposition of Boolean functions, Eurocrypt 2004. In: Cachin C, Camenisch J (eds) Lecture notes in computer science, vol 3027. Springer, Berlin, pp 474–491

    Google Scholar 

  33. Kocher P (1996) Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. LNCS 1109. Springer, Berlin, pp 104–113

    MATH  Google Scholar 

  34. Prouff E (2005) DPA attacks and S-boxes. LNCS 3557. Springer, Berlin, pp 424–441

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, M., Shah, T. & Batool, S.I. Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput & Applic 27, 677–685 (2016). https://doi.org/10.1007/s00521-015-1887-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-015-1887-y

Keywords

Navigation