Skip to main content
Top
Published in: Wireless Personal Communications 3/2018

08-05-2018

ABC Optimization Based Construction of Strong Substitution-Boxes

Authors: Musheer Ahmad, M. N. Doja, M. M. Sufyan Beg

Published in: Wireless Personal Communications | Issue 3/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Most of the block ciphers contain substitution-boxes as their cornerstone primitive to add requisite nonlinearity. S-boxes are responsible to ensure strong confusion and resistance to linear and differential assaults. The security of such ciphers relies on the strength of S-boxes deployed during substitution stage. It is challenging to construct cryptographically strong S-boxes that satisfy several properties such as high nonlinearity, good avalanche effect, bit-independent criteria, low differential uniformity and linear probability, etc. In this paper, we proposed to construct an S-box based on artificial bee colony optimization and chaotic map. The algorithm is designed to optimize an initial S-box to satisfy many properties. The simulation outcomes and comparison with recent proposals show that the proposed ABC optimization based algorithm performs reasonably well and construct S-box that exhibits higher security strength.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Menezes, A. J., Oorschot, P. C. V., & Vanstone, S. A. (1997). Handbook of applied cryptography. Boca Raton: CRC Press.MATH Menezes, A. J., Oorschot, P. C. V., & Vanstone, S. A. (1997). Handbook of applied cryptography. Boca Raton: CRC Press.MATH
2.
go back to reference Stinson, D. R. (2005). Cryptography: Theory and practice. Boca Raton: CRC Press.MATH Stinson, D. R. (2005). Cryptography: Theory and practice. Boca Raton: CRC Press.MATH
3.
go back to reference Schneier, B. (1996). Applied cryptography: Protocols algorithms and source code in C. New York: Wiley.MATH Schneier, B. (1996). Applied cryptography: Protocols algorithms and source code in C. New York: Wiley.MATH
4.
5.
go back to reference Ozkaynak, F., & Sirma, Y. (2013). Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dynamics, 74(3), 551–557.MathSciNetCrossRefMATH Ozkaynak, F., & Sirma, Y. (2013). Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dynamics, 74(3), 551–557.MathSciNetCrossRefMATH
6.
go back to reference Cui, L., & Cao, Y. (2007). A new S-box structure named Affine-Power-Affine. International Journal of Innovative Computing, Information and Control, 3(3), 751–759. Cui, L., & Cao, Y. (2007). A new S-box structure named Affine-Power-Affine. International Journal of Innovative Computing, Information and Control, 3(3), 751–759.
7.
go back to reference Hussain, I., & Shah, T. (2013). Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dynamics, 74(4), 869–904.MathSciNetCrossRefMATH Hussain, I., & Shah, T. (2013). Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dynamics, 74(4), 869–904.MathSciNetCrossRefMATH
8.
go back to reference Farah, T., Rhouma, R., & Belghith, S. (2017). A novel method for designing S-box based on chaotic map and teaching–learning-based optimization. Nonlinear Dynamics, 88(2), 1059–1074.CrossRef Farah, T., Rhouma, R., & Belghith, S. (2017). A novel method for designing S-box based on chaotic map and teaching–learning-based optimization. Nonlinear Dynamics, 88(2), 1059–1074.CrossRef
9.
go back to reference Ahmad, M., Bhatia, D., & Hassan, Y. (2015). A novel ant colony optimization based scheme for substitution box design. Procedia Computer Science, 57, 572–580.CrossRef Ahmad, M., Bhatia, D., & Hassan, Y. (2015). A novel ant colony optimization based scheme for substitution box design. Procedia Computer Science, 57, 572–580.CrossRef
10.
go back to reference Guesmi, R., Farah, M. A. B., Kachouri, A., & Samet, M. (2014). A novel design of Chaos based S-boxes using genetic algorithm techniques. In IEEE/ACS 11th international conference on computer systems and applications (AICCSA) (pp. 678–684). Guesmi, R., Farah, M. A. B., Kachouri, A., & Samet, M. (2014). A novel design of Chaos based S-boxes using genetic algorithm techniques. In IEEE/ACS 11th international conference on computer systems and applications (AICCSA) (pp. 678–684).
11.
go back to reference Wang, Y., Wong, K. W., Li, C., & Li, Y. (2012). A novel method to design S-box based on chaotic map and genetic algorithm. Physics Letters A, 376(6), 827–833.CrossRefMATH Wang, Y., Wong, K. W., Li, C., & Li, Y. (2012). A novel method to design S-box based on chaotic map and genetic algorithm. Physics Letters A, 376(6), 827–833.CrossRefMATH
12.
go back to reference Yong, W., & Peng, L. (2012). An Improved method to obtaining S-box based on chaos and genetic algorithm. HKIE Transactions, 19(4), 53–58.CrossRef Yong, W., & Peng, L. (2012). An Improved method to obtaining S-box based on chaos and genetic algorithm. HKIE Transactions, 19(4), 53–58.CrossRef
13.
go back to reference Clark, J. A., Jacob, J. L., & Stepney, S. (2005). The design of S-boxes by simulated annealing. New Generation Computing, 23(3), 219–231.CrossRefMATH Clark, J. A., Jacob, J. L., & Stepney, S. (2005). The design of S-boxes by simulated annealing. New Generation Computing, 23(3), 219–231.CrossRefMATH
14.
go back to reference Millan, W. (1998). How to improve the nonlinearity of bijective S-boxes. In Australasian conference on information security and privacy, lecture notes in computer science (Vol. 1438, pp. 181–192). Millan, W. (1998). How to improve the nonlinearity of bijective S-boxes. In Australasian conference on information security and privacy, lecture notes in computer science (Vol. 1438, pp. 181–192).
15.
go back to reference Fuller, J., Millan, W., & Dawson, E. (2005). Multi-objective optimisation of bijective S-boxes. New Generation Computing, 23(3), 201–218.CrossRefMATH Fuller, J., Millan, W., & Dawson, E. (2005). Multi-objective optimisation of bijective S-boxes. New Generation Computing, 23(3), 201–218.CrossRefMATH
16.
go back to reference Laskari, E. C., Meletiou, G. C., & Vrahatis, M. N. (2006). Utilizing evolutionary computation methods for the design of S-boxes. In International conference on computational intelligence and security (pp. 1299–1302). Laskari, E. C., Meletiou, G. C., & Vrahatis, M. N. (2006). Utilizing evolutionary computation methods for the design of S-boxes. In International conference on computational intelligence and security (pp. 1299–1302).
17.
go back to reference May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261(5560), 459–467.CrossRefMATH May, R. M. (1976). Simple mathematical models with very complicated dynamics. Nature, 261(5560), 459–467.CrossRefMATH
18.
go back to reference Karaboga, D. (2005). An idea based on honey bee swarm for numerical optimization (Vol. 200). Technical report-tr06, Erciyes University, Faculty of Engineering, Department of Computer Engineering. Karaboga, D. (2005). An idea based on honey bee swarm for numerical optimization (Vol. 200). Technical report-tr06, Erciyes University, Faculty of Engineering, Department of Computer Engineering.
19.
go back to reference Tereshko, V. (2000). Reaction–diffusion model of a honeybee colony’s foraging behaviour. In M. Schoenauer (Ed.), Parallel problem solving from nature VI (Vol. 1917, pp. 807–816)., Lecture notes in computer science Berlin: Springer.CrossRef Tereshko, V. (2000). Reaction–diffusion model of a honeybee colony’s foraging behaviour. In M. Schoenauer (Ed.), Parallel problem solving from nature VI (Vol. 1917, pp. 807–816)., Lecture notes in computer science Berlin: Springer.CrossRef
20.
go back to reference Karaboga, D., & Akay, B. (2009). A comparative study of artificial bee colony algorithm. Applied Mathematics and Computation, 214(1), 108–132.MathSciNetCrossRefMATH Karaboga, D., & Akay, B. (2009). A comparative study of artificial bee colony algorithm. Applied Mathematics and Computation, 214(1), 108–132.MathSciNetCrossRefMATH
21.
go back to reference Karaboga, D., Gorkemli, B., Ozturk, C., & Karaboga, N. (2014). A comprehensive survey: Artificial bee colony (ABC) algorithm and applications. Artificial Intelligence Review, 42(1), 21–57.CrossRef Karaboga, D., Gorkemli, B., Ozturk, C., & Karaboga, N. (2014). A comprehensive survey: Artificial bee colony (ABC) algorithm and applications. Artificial Intelligence Review, 42(1), 21–57.CrossRef
22.
go back to reference Dawson, M. H., & Tavares, S. E. (1991). An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Advances in Cryptology, Lecture Notes in Computer Science, 547, 352–367.MathSciNetCrossRefMATH Dawson, M. H., & Tavares, S. E. (1991). An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Advances in Cryptology, Lecture Notes in Computer Science, 547, 352–367.MathSciNetCrossRefMATH
24.
go back to reference Burnett, L. (2005). Heuristic optimization of boolean functions and substitution boxes for cryptography. Doctoral dissertation, Queensland University of Technology. Burnett, L. (2005). Heuristic optimization of boolean functions and substitution boxes for cryptography. Doctoral dissertation, Queensland University of Technology.
25.
go back to reference Isa, H., Jamil, N., & Zaba, M. R. (2015). Improved S-box construction from binomial power functions. Malaysian Journal of Mathematical Sciences, 9(S), 21–35.MathSciNet Isa, H., Jamil, N., & Zaba, M. R. (2015). Improved S-box construction from binomial power functions. Malaysian Journal of Mathematical Sciences, 9(S), 21–35.MathSciNet
26.
go back to reference Cusick, T. W., & Stanica, P. (2009). Cryptographic Boolean functions and applications. Amsterdam: Elsevier.MATH Cusick, T. W., & Stanica, P. (2009). Cryptographic Boolean functions and applications. Amsterdam: Elsevier.MATH
27.
go back to reference Ding, C., Xiao, G., & Shan, W. (1991). The stability theory of stream ciphers (Vol. 561)., LNCS Berlin: Springer.MATH Ding, C., Xiao, G., & Shan, W. (1991). The stability theory of stream ciphers (Vol. 561)., LNCS Berlin: Springer.MATH
28.
go back to reference Matsui, M. (1994). Linear cryptanalysis method for DES cipher. In Proceedings of EUROCRYPT’93, lecture notes in computer science (Vol. 765, pp. 386–397). Matsui, M. (1994). Linear cryptanalysis method for DES cipher. In Proceedings of EUROCRYPT’93, lecture notes in computer science (Vol. 765, pp. 386–397).
29.
go back to reference Webster, A. F., & Tavares, S. E. (1986). On the design of S-boxes. Advances in Cryptology, Lecture Notes in Computer Science, 218, 523–534.CrossRef Webster, A. F., & Tavares, S. E. (1986). On the design of S-boxes. Advances in Cryptology, Lecture Notes in Computer Science, 218, 523–534.CrossRef
30.
31.
32.
go back to reference Sarfraz, M., Hussain, I., & Ali, F. (2016). Construction of S-Box based on Mobius transformation and increasing its confusion creating ability through invertible function. International Journal of Computer Science and Information Security, 14(2), 187–18x. Sarfraz, M., Hussain, I., & Ali, F. (2016). Construction of S-Box based on Mobius transformation and increasing its confusion creating ability through invertible function. International Journal of Computer Science and Information Security, 14(2), 187–18x.
33.
go back to reference Ahmad, M., Mittal, N., Garg, P., & Khan, M. M. (2016). Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspectives in Science, 8, 465–468.CrossRef Ahmad, M., Mittal, N., Garg, P., & Khan, M. M. (2016). Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspectives in Science, 8, 465–468.CrossRef
34.
go back to reference Bhattacharya, D., Bansal, N., Banaerji, A., & Chowdhury, D. R. (2007). A near optimal S-box design. In P. McDaniel & S. K. Gupta (Eds.) ICISS 2007, LNCS (Vol. 4812, pp. 77–90). Bhattacharya, D., Bansal, N., Banaerji, A., & Chowdhury, D. R. (2007). A near optimal S-box design. In P. McDaniel & S. K. Gupta (Eds.) ICISS 2007, LNCS (Vol. 4812, pp. 77–90).
35.
go back to reference Jamal, S. S., Shah, T., & Attaullah, A. (2017). A group action method for construction of strong substitution box. 3D Research, 8(2), 1–12.CrossRef Jamal, S. S., Shah, T., & Attaullah, A. (2017). A group action method for construction of strong substitution box. 3D Research, 8(2), 1–12.CrossRef
37.
go back to reference Khan, M., Shah, T., & Batool, S. I. (2016). Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Computing and Applications, 27(3), 677–685.CrossRef Khan, M., Shah, T., & Batool, S. I. (2016). Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Computing and Applications, 27(3), 677–685.CrossRef
38.
go back to reference Khan, M., & Shah, T. (2015). A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. Journal of Intelligent and Fuzzy Systems, 28(4), 1509–1517.MathSciNetMATH Khan, M., & Shah, T. (2015). A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. Journal of Intelligent and Fuzzy Systems, 28(4), 1509–1517.MathSciNetMATH
39.
go back to reference Islam, F., & Liu, G. (2017). Designing S-box based on 4D-4wing hyperchaotic system. 3D Research, 8(1), 1–9.CrossRef Islam, F., & Liu, G. (2017). Designing S-box based on 4D-4wing hyperchaotic system. 3D Research, 8(1), 1–9.CrossRef
40.
go back to reference Belazi, A., & El-Latif, A. A. A. (2017). A simple yet efficient S-box method based on chaotic sine map. Optik-International Journal for Light and Electron Optics, 130, 1438–1444.CrossRef Belazi, A., & El-Latif, A. A. A. (2017). A simple yet efficient S-box method based on chaotic sine map. Optik-International Journal for Light and Electron Optics, 130, 1438–1444.CrossRef
41.
go back to reference Özkaynak, F., Çelik, V., & Özer, A. B. (2017). A new S-box construction method based on the fractional-order chaotic Chen system. Signal, Image and Video Processing, 11(4), 59–64.CrossRef Özkaynak, F., Çelik, V., & Özer, A. B. (2017). A new S-box construction method based on the fractional-order chaotic Chen system. Signal, Image and Video Processing, 11(4), 59–64.CrossRef
42.
go back to reference Lambić, D. (2017). A novel method of S-box design based on discrete chaotic map. Nonlinear Dynamics, 87(4), 2407–2413.MathSciNetCrossRef Lambić, D. (2017). A novel method of S-box design based on discrete chaotic map. Nonlinear Dynamics, 87(4), 2407–2413.MathSciNetCrossRef
43.
go back to reference Çavuşoğlu, Ü., Zengin, A., Pehlivan, I., & Kaçar, S. (2017). A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dynamics, 87(2), 1081–1094.CrossRefMATH Çavuşoğlu, Ü., Zengin, A., Pehlivan, I., & Kaçar, S. (2017). A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dynamics, 87(2), 1081–1094.CrossRefMATH
44.
go back to reference Anees, A., & Ahmed, Z. (2015). A technique for designing substitution box based on van der pol oscillator. Wireless Personal Communications, 82(3), 1497–1503.CrossRef Anees, A., & Ahmed, Z. (2015). A technique for designing substitution box based on van der pol oscillator. Wireless Personal Communications, 82(3), 1497–1503.CrossRef
45.
go back to reference Kazlauskas, K., Vaicekauskas, G., & Smaliukas, R. (2015). An algorithm for key-dependent S-box generation in block cipher system. Informatica, 26(1), 51–65.CrossRef Kazlauskas, K., Vaicekauskas, G., & Smaliukas, R. (2015). An algorithm for key-dependent S-box generation in block cipher system. Informatica, 26(1), 51–65.CrossRef
46.
go back to reference Majid, K., & Tariq, S. (2015). An efficient construction of substitution box with fractional chaotic system. Signal Image Video Processing, 9(6), 1335–1338.CrossRef Majid, K., & Tariq, S. (2015). An efficient construction of substitution box with fractional chaotic system. Signal Image Video Processing, 9(6), 1335–1338.CrossRef
47.
go back to reference Liu, G., Yang, W., Liu, W., & Dai, Y. (2015). Designing S-boxes based on 3-D four-wing autonomous chaotic system. Nonlinear Dynamics, 82(4), 1867–1877.MathSciNetCrossRef Liu, G., Yang, W., Liu, W., & Dai, Y. (2015). Designing S-boxes based on 3-D four-wing autonomous chaotic system. Nonlinear Dynamics, 82(4), 1867–1877.MathSciNetCrossRef
48.
go back to reference Hongjun, L., Abdurahman, K., & Yujun, N. (2014). Chaos-based color image block encryption scheme using S-box. AEU-International Journal of Electronics and Communications, 68(7), 676–686.CrossRef Hongjun, L., Abdurahman, K., & Yujun, N. (2014). Chaos-based color image block encryption scheme using S-box. AEU-International Journal of Electronics and Communications, 68(7), 676–686.CrossRef
49.
go back to reference Gondal, M. A., Raheem, A., & Hussain, I. (2014). A scheme for obtaining secure S-boxes based on Chaotic Baker’s Map. 3D Research, 5(3), 1–8.CrossRef Gondal, M. A., Raheem, A., & Hussain, I. (2014). A scheme for obtaining secure S-boxes based on Chaotic Baker’s Map. 3D Research, 5(3), 1–8.CrossRef
Metadata
Title
ABC Optimization Based Construction of Strong Substitution-Boxes
Authors
Musheer Ahmad
M. N. Doja
M. M. Sufyan Beg
Publication date
08-05-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5787-1

Other articles of this Issue 3/2018

Wireless Personal Communications 3/2018 Go to the issue