Skip to main content
Log in

Construction of Non-linear Component of Block Cipher by Means of Chaotic Dynamical System and Symmetric Group

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The interesting features of chaos theory are utilized now a day’s in information security. The simplest chaotic dynamical system is the double pendulum. Here in this article, two double pendulums are used to enhance the chaotic behavior of a dynamical system. This system is sensitive to initial conditions and bears complex and chaotic trajectory. Moreover, being multi dimensional system it endures grander solution space for the generation of large number of S-boxes. Furthermore, a permutation comprising on only two cycles of symmetric group of order 256 is applied to generate integer values for the construction of desired substitution box. The algebraic analysis of suggested S-box emphasis on its application, thereafter, an image is encrypted with the help of this S-box, whose statistical analysis validates its efficacy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal,28, 656–715.

    Article  MathSciNet  Google Scholar 

  2. Kocarev, L. (2001). Chaos-based cryptography: A brief overview. IEEE Circuits and Systems Magazine,1, 6–21.

    Article  Google Scholar 

  3. Dachselt, F., & Schwarz, W. (2001). Chaos and cryptography. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications,48(12), 1498–1509.

    Article  MathSciNet  Google Scholar 

  4. Khan, M., Shah, T., & Batool, S. I. (2016). Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Computing and Applications,27(3), 677–685.

    Article  Google Scholar 

  5. Zhou, Y., Bao, L., & Chen, C. L. P. (2014). A new 1D chaotic system for image encryption. Signal Processing,97, 172–182.

    Article  Google Scholar 

  6. Jakimoski, G., & Kocarev, L. (2001). Chaos and cryptography: Block encryption ciphers. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications,48(2), 163–169.

    Article  MathSciNet  Google Scholar 

  7. Ullah, A., Jamal, S. S., & Shah, T. (2017). A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dynamics. https://doi.org/10.1007/s11071-017-3409-1.

    Article  Google Scholar 

  8. Li, X., Wang, L., Yan, Y., & Liu, P. (2016). An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems. Optik-International Journal for Light and Electron Optics,127(5), 2558–2565.

    Article  Google Scholar 

  9. Hussain, I., Shah, T., & Gondal, M. A. (2012). A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dynamics,70(3), 1791–1794.

    Article  MathSciNet  Google Scholar 

  10. Khan, M., & Shah, T. (2014). A novel image encryption technique based on Henon chaotic map and S8 symmetric group. Neural Computing and Applications,25(7), 1717–1722.

    Article  Google Scholar 

  11. Zhang, Y., & Xiao, D. (2014). Self-adaptive permutation and combined global diffusion or chaotic color image encryption. International Journal of Electronics and Communications,68(4), 361–368.

    Article  Google Scholar 

  12. Zhang, W., Yu, H., Zhao, Y., & Zhu, Z. (2016). Image encryption based on three-dimensional bit matrix permutation. Signal Processing,118, 36–50.

    Article  Google Scholar 

  13. Özkaynak, F., & Özer, A. B. (2010). A method for designing strong S-boxes based on chaotic Lorenz system. Physics Letters A,374(36), 3733–3738.

    Article  Google Scholar 

  14. Brown, R., & Chua, L. O. (1996). Clarifying chaos: examples and counter examples. International Journal of Bifurcation and Chaos,6(2), 219–242.

    Article  MathSciNet  Google Scholar 

  15. Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos,8(6), 1259–1284.

    Article  MathSciNet  Google Scholar 

  16. Tang, G., Liao, X., & Chen, Y. (2005). A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons & Fractals,23(2), 413–419.

    Article  Google Scholar 

  17. Chen, G., Chen, Y., & Liao, X. (2007). An extended method for obtaining S-boxes based on 3-dimensional chaotic baker maps. Chaos, Solitons & Fractals,31(3), 571–579.

    Article  MathSciNet  Google Scholar 

  18. Arroyo, D., Diaz, J., & Rodriguez, F. B. (2013). Cryptanalysis of a one round chaos-based substitution permutation network. Signal Processing,93(5), 1358–1364.

    Article  Google Scholar 

  19. Ullah, A., Javeed, A., & Shah, T. (2019). A scheme based on algebraic and chaotic structures for the construction of substitution box. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-019-07957-8.

    Article  Google Scholar 

  20. Khan, M., Shah, T., Mahmood, H., Gondal, M. A., & Hussain, I. (2012). A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dynamics,70(3), 2303–2311.

    Article  MathSciNet  Google Scholar 

  21. Javeed, A., Shah, T., & Ullah, A. Design of an S-box using Rabinovich–Fabrikant system of differential equations perceiving third order nonlinearity. Multimedia Tools and Applications, https://doi.org/10.1007/s11042-019-08393-4.

  22. Khan, M., Shah, T., Mahmood, H., & Gondal, M. A. (2013). An efficient method for the construction of block cipher with multi chaotic systems. Nonlinear Dynamics,71(3), 489–492.

    Article  MathSciNet  Google Scholar 

  23. Ullah, A., Jamal, S. S., & Shah, T. (2018). A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dynamics,91(1), 359–370.

    Article  MathSciNet  Google Scholar 

  24. Khan, M., & Asghar, Z. (2018). A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput & Applications,29(4), 993–999.

    Article  Google Scholar 

  25. Ahmad, M., Doja, M. N., & Beg, M. M. S. (2018). ABC optimization based construction of strong substitution-boxes. Wireless Personal Communications,101(3), 1715–1729.

    Article  Google Scholar 

  26. Razaq, A., Yousaf, A., Shuaib, U., Siddiqui, N., Ullah, A., & Waheed, A. (2017). A novel construction of substitution box involving coset diagram and a bijective map. Security and Communication Networks,2017, 5101934.

    Article  Google Scholar 

  27. Shah, T., & Shah, D. (2019). Construction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over Z2. Multimdeia Tools and Applications,78(2), 1219–1234.

    Article  Google Scholar 

  28. Khan, M., & Munir, N. (2019). A novel Image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wireless and Personal Communication,109(2), 849–867.

    Article  Google Scholar 

  29. Wang, X. Y., Feng, L., & Zhao, H. (2019). Fast image encryption algorithm based on parallel computing system. Information Sciences,486, 340–358.

    Article  Google Scholar 

  30. Khan, M., Hussain, I., Jamal, S. S., & Amin, M. (2019). A privacy scheme for digital images based on quantum particles. Intrnational Journal of Theoretical Physics. https://doi.org/10.1007/s10773-019-04301-6.

    Article  MATH  Google Scholar 

  31. Wang, X. Y., & Gao, S. (2020). Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Information Sciences,507, 16–36.

    Article  MathSciNet  Google Scholar 

  32. Webster, A. F., & Tavares, S. (1986). On the design of S-boxes. In: Advances in cryptology: Proceedings of CRYPTO’85. Lecture Notes in Computer Science, pp. 523–534.

  33. Hussain, I., Shah, T., Gondal, M. A., & Mahmood, H. (2012). Generalized majority logic criterion to analyze the statistical strength of S-boxes. Zeitschrift für Naturforschung A,67, 282–288.

    Article  Google Scholar 

  34. Belazi, A., Khan, M., El-Latif, A. A., & Belghith, S. (2016). Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dynamics,87, 337–361.

    Article  Google Scholar 

  35. Daemen, J., & Rijmen, V. (2002). The design of Rijndael-AES: The advanced encryption standard. Berlin: Springer.

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Javeed.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Javeed, A., Shah, T. & Ullah, A. Construction of Non-linear Component of Block Cipher by Means of Chaotic Dynamical System and Symmetric Group. Wireless Pers Commun 112, 467–480 (2020). https://doi.org/10.1007/s11277-020-07052-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07052-4

Keywords

Navigation