Skip to main content
Erschienen in: Wireless Personal Communications 3/2018

08.05.2018

ABC Optimization Based Construction of Strong Substitution-Boxes

verfasst von: Musheer Ahmad, M. N. Doja, M. M. Sufyan Beg

Erschienen in: Wireless Personal Communications | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Most of the block ciphers contain substitution-boxes as their cornerstone primitive to add requisite nonlinearity. S-boxes are responsible to ensure strong confusion and resistance to linear and differential assaults. The security of such ciphers relies on the strength of S-boxes deployed during substitution stage. It is challenging to construct cryptographically strong S-boxes that satisfy several properties such as high nonlinearity, good avalanche effect, bit-independent criteria, low differential uniformity and linear probability, etc. In this paper, we proposed to construct an S-box based on artificial bee colony optimization and chaotic map. The algorithm is designed to optimize an initial S-box to satisfy many properties. The simulation outcomes and comparison with recent proposals show that the proposed ABC optimization based algorithm performs reasonably well and construct S-box that exhibits higher security strength.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Menezes, A. J., Oorschot, P. C. V., & Vanstone, S. A. (1997). Handbook of applied cryptography. Boca Raton: CRC Press.MATH Menezes, A. J., Oorschot, P. C. V., & Vanstone, S. A. (1997). Handbook of applied cryptography. Boca Raton: CRC Press.MATH
2.
Zurück zum Zitat Stinson, D. R. (2005). Cryptography: Theory and practice. Boca Raton: CRC Press.MATH Stinson, D. R. (2005). Cryptography: Theory and practice. Boca Raton: CRC Press.MATH
3.
Zurück zum Zitat Schneier, B. (1996). Applied cryptography: Protocols algorithms and source code in C. New York: Wiley.MATH Schneier, B. (1996). Applied cryptography: Protocols algorithms and source code in C. New York: Wiley.MATH
4.
5.
Zurück zum Zitat Ozkaynak, F., & Sirma, Y. (2013). Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dynamics, 74(3), 551–557.MathSciNetCrossRefMATH Ozkaynak, F., & Sirma, Y. (2013). Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dynamics, 74(3), 551–557.MathSciNetCrossRefMATH
6.
Zurück zum Zitat Cui, L., & Cao, Y. (2007). A new S-box structure named Affine-Power-Affine. International Journal of Innovative Computing, Information and Control, 3(3), 751–759. Cui, L., & Cao, Y. (2007). A new S-box structure named Affine-Power-Affine. International Journal of Innovative Computing, Information and Control, 3(3), 751–759.
7.
Zurück zum Zitat Hussain, I., & Shah, T. (2013). Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dynamics, 74(4), 869–904.MathSciNetCrossRefMATH Hussain, I., & Shah, T. (2013). Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dynamics, 74(4), 869–904.MathSciNetCrossRefMATH
8.
Zurück zum Zitat Farah, T., Rhouma, R., & Belghith, S. (2017). A novel method for designing S-box based on chaotic map and teaching–learning-based optimization. Nonlinear Dynamics, 88(2), 1059–1074.CrossRef Farah, T., Rhouma, R., & Belghith, S. (2017). A novel method for designing S-box based on chaotic map and teaching–learning-based optimization. Nonlinear Dynamics, 88(2), 1059–1074.CrossRef
9.
Zurück zum Zitat Ahmad, M., Bhatia, D., & Hassan, Y. (2015). A novel ant colony optimization based scheme for substitution box design. Procedia Computer Science, 57, 572–580.CrossRef Ahmad, M., Bhatia, D., & Hassan, Y. (2015). A novel ant colony optimization based scheme for substitution box design. Procedia Computer Science, 57, 572–580.CrossRef
10.
Zurück zum Zitat Guesmi, R., Farah, M. A. B., Kachouri, A., & Samet, M. (2014). A novel design of Chaos based S-boxes using genetic algorithm techniques. In IEEE/ACS 11th international conference on computer systems and applications (AICCSA) (pp. 678–684). Guesmi, R., Farah, M. A. B., Kachouri, A., & Samet, M. (2014). A novel design of Chaos based S-boxes using genetic algorithm techniques. In IEEE/ACS 11th international conference on computer systems and applications (AICCSA) (pp. 678–684).
11.
Zurück zum Zitat Wang, Y., Wong, K. W., Li, C., & Li, Y. (2012). A novel method to design S-box based on chaotic map and genetic algorithm. Physics Letters A, 376(6), 827–833.CrossRefMATH Wang, Y., Wong, K. W., Li, C., & Li, Y. (2012). A novel method to design S-box based on chaotic map and genetic algorithm. Physics Letters A, 376(6), 827–833.CrossRefMATH
12.
Zurück zum Zitat Yong, W., & Peng, L. (2012). An Improved method to obtaining S-box based on chaos and genetic algorithm. HKIE Transactions, 19(4), 53–58.CrossRef Yong, W., & Peng, L. (2012). An Improved method to obtaining S-box based on chaos and genetic algorithm. HKIE Transactions, 19(4), 53–58.CrossRef
13.
Zurück zum Zitat Clark, J. A., Jacob, J. L., & Stepney, S. (2005). The design of S-boxes by simulated annealing. New Generation Computing, 23(3), 219–231.CrossRefMATH Clark, J. A., Jacob, J. L., & Stepney, S. (2005). The design of S-boxes by simulated annealing. New Generation Computing, 23(3), 219–231.CrossRefMATH
14.
Zurück zum Zitat Millan, W. (1998). How to improve the nonlinearity of bijective S-boxes. In Australasian conference on information security and privacy, lecture notes in computer science (Vol. 1438, pp. 181–192). Millan, W. (1998). How to improve the nonlinearity of bijective S-boxes. In Australasian conference on information security and privacy, lecture notes in computer science (Vol. 1438, pp. 181–192).
15.
Zurück zum Zitat Fuller, J., Millan, W., & Dawson, E. (2005). Multi-objective optimisation of bijective S-boxes. New Generation Computing, 23(3), 201–218.CrossRefMATH Fuller, J., Millan, W., & Dawson, E. (2005). Multi-objective optimisation of bijective S-boxes. New Generation Computing, 23(3), 201–218.CrossRefMATH
16.
Zurück zum Zitat Laskari, E. C., Meletiou, G. C., & Vrahatis, M. N. (2006). Utilizing evolutionary computation methods for the design of S-boxes. In International conference on computational intelligence and security (pp. 1299–1302). Laskari, E. C., Meletiou, G. C., & Vrahatis, M. N. (2006). Utilizing evolutionary computation methods for the design of S-boxes. In International conference on computational intelligence and security (pp. 1299–1302).
17.
Zurück zum Zitat May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261(5560), 459–467.CrossRefMATH May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261(5560), 459–467.CrossRefMATH
18.
Zurück zum Zitat Karaboga, D. (2005). An idea based on honey bee swarm for numerical optimization (Vol. 200). Technical report-tr06, Erciyes University, Faculty of Engineering, Department of Computer Engineering. Karaboga, D. (2005). An idea based on honey bee swarm for numerical optimization (Vol. 200). Technical report-tr06, Erciyes University, Faculty of Engineering, Department of Computer Engineering.
19.
Zurück zum Zitat Tereshko, V. (2000). Reaction–diffusion model of a honeybee colony’s foraging behaviour. In M. Schoenauer (Ed.), Parallel problem solving from nature VI (Vol. 1917, pp. 807–816)., Lecture notes in computer science Berlin: Springer.CrossRef Tereshko, V. (2000). Reaction–diffusion model of a honeybee colony’s foraging behaviour. In M. Schoenauer (Ed.), Parallel problem solving from nature VI (Vol. 1917, pp. 807–816)., Lecture notes in computer science Berlin: Springer.CrossRef
20.
Zurück zum Zitat Karaboga, D., & Akay, B. (2009). A comparative study of artificial bee colony algorithm. Applied Mathematics and Computation, 214(1), 108–132.MathSciNetCrossRefMATH Karaboga, D., & Akay, B. (2009). A comparative study of artificial bee colony algorithm. Applied Mathematics and Computation, 214(1), 108–132.MathSciNetCrossRefMATH
21.
Zurück zum Zitat Karaboga, D., Gorkemli, B., Ozturk, C., & Karaboga, N. (2014). A comprehensive survey: Artificial bee colony (ABC) algorithm and applications. Artificial Intelligence Review, 42(1), 21–57.CrossRef Karaboga, D., Gorkemli, B., Ozturk, C., & Karaboga, N. (2014). A comprehensive survey: Artificial bee colony (ABC) algorithm and applications. Artificial Intelligence Review, 42(1), 21–57.CrossRef
22.
Zurück zum Zitat Dawson, M. H., & Tavares, S. E. (1991). An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Advances in Cryptology, Lecture Notes in Computer Science, 547, 352–367.MathSciNetCrossRefMATH Dawson, M. H., & Tavares, S. E. (1991). An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Advances in Cryptology, Lecture Notes in Computer Science, 547, 352–367.MathSciNetCrossRefMATH
24.
Zurück zum Zitat Burnett, L. (2005). Heuristic optimization of boolean functions and substitution boxes for cryptography. Doctoral dissertation, Queensland University of Technology. Burnett, L. (2005). Heuristic optimization of boolean functions and substitution boxes for cryptography. Doctoral dissertation, Queensland University of Technology.
25.
Zurück zum Zitat Isa, H., Jamil, N., & Zaba, M. R. (2015). Improved S-box construction from binomial power functions. Malaysian Journal of Mathematical Sciences, 9(S), 21–35.MathSciNet Isa, H., Jamil, N., & Zaba, M. R. (2015). Improved S-box construction from binomial power functions. Malaysian Journal of Mathematical Sciences, 9(S), 21–35.MathSciNet
26.
Zurück zum Zitat Cusick, T. W., & Stanica, P. (2009). Cryptographic Boolean functions and applications. Amsterdam: Elsevier.MATH Cusick, T. W., & Stanica, P. (2009). Cryptographic Boolean functions and applications. Amsterdam: Elsevier.MATH
27.
Zurück zum Zitat Ding, C., Xiao, G., & Shan, W. (1991). The stability theory of stream ciphers (Vol. 561)., LNCS Berlin: Springer.MATH Ding, C., Xiao, G., & Shan, W. (1991). The stability theory of stream ciphers (Vol. 561)., LNCS Berlin: Springer.MATH
28.
Zurück zum Zitat Matsui, M. (1994). Linear cryptanalysis method for DES cipher. In Proceedings of EUROCRYPT’93, lecture notes in computer science (Vol. 765, pp. 386–397). Matsui, M. (1994). Linear cryptanalysis method for DES cipher. In Proceedings of EUROCRYPT’93, lecture notes in computer science (Vol. 765, pp. 386–397).
29.
Zurück zum Zitat Webster, A. F., & Tavares, S. E. (1986). On the design of S-boxes. Advances in Cryptology, Lecture Notes in Computer Science, 218, 523–534.CrossRef Webster, A. F., & Tavares, S. E. (1986). On the design of S-boxes. Advances in Cryptology, Lecture Notes in Computer Science, 218, 523–534.CrossRef
30.
Zurück zum Zitat Adams, C., & Tavares, S. (1990). The structured design of cryptographically good S-boxes. Journal of Cryptology, 3(1), 27–41.MathSciNetCrossRefMATH Adams, C., & Tavares, S. (1990). The structured design of cryptographically good S-boxes. Journal of Cryptology, 3(1), 27–41.MathSciNetCrossRefMATH
31.
32.
Zurück zum Zitat Sarfraz, M., Hussain, I., & Ali, F. (2016). Construction of S-Box based on Mobius transformation and increasing its confusion creating ability through invertible function. International Journal of Computer Science and Information Security, 14(2), 187–18x. Sarfraz, M., Hussain, I., & Ali, F. (2016). Construction of S-Box based on Mobius transformation and increasing its confusion creating ability through invertible function. International Journal of Computer Science and Information Security, 14(2), 187–18x.
33.
Zurück zum Zitat Ahmad, M., Mittal, N., Garg, P., & Khan, M. M. (2016). Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspectives in Science, 8, 465–468.CrossRef Ahmad, M., Mittal, N., Garg, P., & Khan, M. M. (2016). Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspectives in Science, 8, 465–468.CrossRef
34.
Zurück zum Zitat Bhattacharya, D., Bansal, N., Banaerji, A., & Chowdhury, D. R. (2007). A near optimal S-box design. In P. McDaniel & S. K. Gupta (Eds.) ICISS 2007, LNCS (Vol. 4812, pp. 77–90). Bhattacharya, D., Bansal, N., Banaerji, A., & Chowdhury, D. R. (2007). A near optimal S-box design. In P. McDaniel & S. K. Gupta (Eds.) ICISS 2007, LNCS (Vol. 4812, pp. 77–90).
35.
Zurück zum Zitat Jamal, S. S., Shah, T., & Attaullah, A. (2017). A group action method for construction of strong substitution box. 3D Research, 8(2), 1–12.CrossRef Jamal, S. S., Shah, T., & Attaullah, A. (2017). A group action method for construction of strong substitution box. 3D Research, 8(2), 1–12.CrossRef
37.
Zurück zum Zitat Khan, M., Shah, T., & Batool, S. I. (2016). Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Computing and Applications, 27(3), 677–685.CrossRef Khan, M., Shah, T., & Batool, S. I. (2016). Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Computing and Applications, 27(3), 677–685.CrossRef
38.
Zurück zum Zitat Khan, M., & Shah, T. (2015). A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. Journal of Intelligent and Fuzzy Systems, 28(4), 1509–1517.MathSciNetMATH Khan, M., & Shah, T. (2015). A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. Journal of Intelligent and Fuzzy Systems, 28(4), 1509–1517.MathSciNetMATH
39.
Zurück zum Zitat Islam, F., & Liu, G. (2017). Designing S-box based on 4D-4wing hyperchaotic system. 3D Research, 8(1), 1–9.CrossRef Islam, F., & Liu, G. (2017). Designing S-box based on 4D-4wing hyperchaotic system. 3D Research, 8(1), 1–9.CrossRef
40.
Zurück zum Zitat Belazi, A., & El-Latif, A. A. A. (2017). A simple yet efficient S-box method based on chaotic sine map. Optik-International Journal for Light and Electron Optics, 130, 1438–1444.CrossRef Belazi, A., & El-Latif, A. A. A. (2017). A simple yet efficient S-box method based on chaotic sine map. Optik-International Journal for Light and Electron Optics, 130, 1438–1444.CrossRef
41.
Zurück zum Zitat Özkaynak, F., Çelik, V., & Özer, A. B. (2017). A new S-box construction method based on the fractional-order chaotic Chen system. Signal, Image and Video Processing, 11(4), 59–64.CrossRef Özkaynak, F., Çelik, V., & Özer, A. B. (2017). A new S-box construction method based on the fractional-order chaotic Chen system. Signal, Image and Video Processing, 11(4), 59–64.CrossRef
42.
Zurück zum Zitat Lambić, D. (2017). A novel method of S-box design based on discrete chaotic map. Nonlinear Dynamics, 87(4), 2407–2413.MathSciNetCrossRef Lambić, D. (2017). A novel method of S-box design based on discrete chaotic map. Nonlinear Dynamics, 87(4), 2407–2413.MathSciNetCrossRef
43.
Zurück zum Zitat Çavuşoğlu, Ü., Zengin, A., Pehlivan, I., & Kaçar, S. (2017). A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dynamics, 87(2), 1081–1094.CrossRefMATH Çavuşoğlu, Ü., Zengin, A., Pehlivan, I., & Kaçar, S. (2017). A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dynamics, 87(2), 1081–1094.CrossRefMATH
44.
Zurück zum Zitat Anees, A., & Ahmed, Z. (2015). A technique for designing substitution box based on van der pol oscillator. Wireless Personal Communications, 82(3), 1497–1503.CrossRef Anees, A., & Ahmed, Z. (2015). A technique for designing substitution box based on van der pol oscillator. Wireless Personal Communications, 82(3), 1497–1503.CrossRef
45.
Zurück zum Zitat Kazlauskas, K., Vaicekauskas, G., & Smaliukas, R. (2015). An algorithm for key-dependent S-box generation in block cipher system. Informatica, 26(1), 51–65.CrossRef Kazlauskas, K., Vaicekauskas, G., & Smaliukas, R. (2015). An algorithm for key-dependent S-box generation in block cipher system. Informatica, 26(1), 51–65.CrossRef
46.
Zurück zum Zitat Majid, K., & Tariq, S. (2015). An efficient construction of substitution box with fractional chaotic system. Signal Image Video Processing, 9(6), 1335–1338.CrossRef Majid, K., & Tariq, S. (2015). An efficient construction of substitution box with fractional chaotic system. Signal Image Video Processing, 9(6), 1335–1338.CrossRef
47.
Zurück zum Zitat Liu, G., Yang, W., Liu, W., & Dai, Y. (2015). Designing S-boxes based on 3-D four-wing autonomous chaotic system. Nonlinear Dynamics, 82(4), 1867–1877.MathSciNetCrossRef Liu, G., Yang, W., Liu, W., & Dai, Y. (2015). Designing S-boxes based on 3-D four-wing autonomous chaotic system. Nonlinear Dynamics, 82(4), 1867–1877.MathSciNetCrossRef
48.
Zurück zum Zitat Hongjun, L., Abdurahman, K., & Yujun, N. (2014). Chaos-based color image block encryption scheme using S-box. AEU-International Journal of Electronics and Communications, 68(7), 676–686.CrossRef Hongjun, L., Abdurahman, K., & Yujun, N. (2014). Chaos-based color image block encryption scheme using S-box. AEU-International Journal of Electronics and Communications, 68(7), 676–686.CrossRef
49.
Zurück zum Zitat Gondal, M. A., Raheem, A., & Hussain, I. (2014). A scheme for obtaining secure S-boxes based on Chaotic Baker’s Map. 3D Research, 5(3), 1–8.CrossRef Gondal, M. A., Raheem, A., & Hussain, I. (2014). A scheme for obtaining secure S-boxes based on Chaotic Baker’s Map. 3D Research, 5(3), 1–8.CrossRef
Metadaten
Titel
ABC Optimization Based Construction of Strong Substitution-Boxes
verfasst von
Musheer Ahmad
M. N. Doja
M. M. Sufyan Beg
Publikationsdatum
08.05.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5787-1

Weitere Artikel der Ausgabe 3/2018

Wireless Personal Communications 3/2018 Zur Ausgabe

Neuer Inhalt