Skip to main content
Log in

A scheme based on algebraic and chaotic structures for the construction of substitution box

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The use of nonlinear (chaotic) transformations in cryptography to generate confusion in the course of encryption procedure is the recent trend. In this article, a novel chaotic system is presented based on the existing chaotic maps. A proficient cryptosystem technique is proposed for constructing substitution box using this novel 1D chaotic structure. The key based dynamical feature of the chaotic system to synthesize strong substitution boxes is the main advantage of the suggested scheme. Then, the constructed component of the block cipher is evaluated using statistical and algebraic analyses. The outcomes of theses analyses certify that the proposed cryptosystem has great potential and superior performance for noticeable dominance in various cryptographic applications in comparison with the existing procedures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Arroyo D, Diaz J, Rodriguez FB (2013) Cryptanalysis of a one round chaos-based substitution permutation network. Signal Process 93(5):1358–1364

    Article  Google Scholar 

  2. Belazi A, Khan MA, El-Latif AA, Belghith S (2016) Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn:337–361

  3. Biham E, Shamir A (1991) Differential cryptanalysis of DES like cryptosystems. J Cryptol 4(1):3–72

    Article  MathSciNet  Google Scholar 

  4. Brown R, Chua LO (1996) Clarifying chaos: examples and counter examples. Int J Bifurcat Chaos 6(2):219–242

    Article  Google Scholar 

  5. Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on 3-dimensional chaotic baker maps. Chaos, Solitons Fractals 31(3):571–579

    Article  MathSciNet  Google Scholar 

  6. Dachselt F, Schwarz W (2001) Chaos and cryptography. IEEE Trans Circuits Syst 48(12):1498–1509

    Article  MathSciNet  Google Scholar 

  7. Feistel H (1973) Cryptography and computer privacy. Sci Am 228:15–23

    Article  Google Scholar 

  8. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(6):1259–1284

    Article  MathSciNet  Google Scholar 

  9. Hao B (1993) Starting with parabolas: an introduction to chaotic dynamics. Shanghai Scientific and Technological Education Publishing House, Shanghai

    Google Scholar 

  10. Hussain I, Shah T, Gondal MA (2012) A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyn 70(3):1791–1794

    Article  MathSciNet  Google Scholar 

  11. Hussain I, Shah T, Gondal MA, Mahmood H (2012) Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z Naturforsch A 67a:282–288

    Article  Google Scholar 

  12. Hussain I, Shah T, Gondal MA, Mahmood H (2013) An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dyn 71:133–140

    Article  MathSciNet  Google Scholar 

  13. Hussain I, Shah T, Gondal MA, Mahmood H (2013) A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput Applic 22(6):1085–1093

    Article  Google Scholar 

  14. Hussain I, Shah T, Mahmood H, Gondal M (2012) A. Construction of S 8 Liu J S-boxes and their applications. Comput Math Appl 64(8):2450–2458

    Article  MathSciNet  Google Scholar 

  15. Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers. IEEE Trans Circuits Syst I Fundam Theory Appl 48(2):163–169

    Article  Google Scholar 

  16. Khan M, Shah T (2014) A novel image encryption technique based on Henon chaotic map and S8 symmetric group. Neural Comput Applic 25(7):1717–1722

    Article  Google Scholar 

  17. Khan M, Shah T, Batool SI (2016) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput Applic 27(3):677–685

    Article  Google Scholar 

  18. Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi chaotic systems. Nonlinear Dyn 71(3):489–492

    Article  MathSciNet  Google Scholar 

  19. Khan M, Shah T, Mahmood H, Gondal MA, Hussain I (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70(3):2303–2311

    Article  MathSciNet  Google Scholar 

  20. Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circ Syst 1:6–21

    Article  Google Scholar 

  21. Li X, Wang L, Yan Y, Liu P (2016) An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems. Opt Int J Light Electron Opt 127(5):2558–2565

    Article  Google Scholar 

  22. Matsui M Linear cryptanalysis method of DES cipher. Advances in cryptology, proceeding of the Eurocrypt’93. Lect Notes Comput Sci 765:386–397

  23. Özkaynak F, Özer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett A 374(36):3733–3738

    Article  Google Scholar 

  24. Shah T, Qamar A, Hussain I (2013) Substitution Box on Maximal Cyclic Subgroup of Units of a Galois Ring. Z Naturforsch 68a:567–572

    Article  Google Scholar 

  25. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    Article  MathSciNet  Google Scholar 

  26. Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons Fractals 23(2):413–419

    Article  Google Scholar 

  27. Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn. https://doi.org/10.1007/s11071-017-3409-1

  28. Webster AF, Tavares S (1986) On the design of S-boxes. In: Advances in Cryptology: Proceedings of CRYPTO’85. Lect Notes Comput Sci:523–534

  29. Zhang Y, Xiao D (2014) Self-adaptive permutation and combined global diffusion or chaotic color image encryption. Int J Electron Commun 68(4):361–368

    Article  Google Scholar 

  30. Zhang W, Yu H, Zhao Y, Zhu Z (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50

    Article  Google Scholar 

  31. Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Atta Ullah.

Ethics declarations

Conflict of interest

There is no conflict of interest among the authors of this article.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ullah, A., Javeed, A. & Shah, T. A scheme based on algebraic and chaotic structures for the construction of substitution box. Multimed Tools Appl 78, 32467–32484 (2019). https://doi.org/10.1007/s11042-019-07957-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07957-8

Keywords

Navigation