Skip to main content
Erschienen in: Neural Computing and Applications 4/2018

01.08.2016 | Original Article

A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation

verfasst von: Majid Khan, Zeeshan Asghar

Erschienen in: Neural Computing and Applications | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this communication, we present a technique to synthesize resilient nonlinear mechanisms for the construction of substitution box. The proposed nonlinear component assists in transforming the intelligible message or plaintext into an enciphered format by the use of Gingerbreadman chaotic map and S8 permutations. The proposed substitution box is sensitive to the initial conditions provided to the chaotic system, which are subsequently used as parameters in creating an instance. The simulation results show that the use of the proposed substitution box to image encryption scheme provides an efficient and secure way for real-time communications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Adams C, Tavares S (1989) Good S-boxes are easy to find In: Advances in cryptology: Proceedings of Crypto’89, Santa Barbara, USA. Lecture Notes in Computer Science 435:612–615 Adams C, Tavares S (1989) Good S-boxes are easy to find In: Advances in cryptology: Proceedings of Crypto’89, Santa Barbara, USA. Lecture Notes in Computer Science 435:612–615
2.
Zurück zum Zitat Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos Appl Sci Eng 16(8):2129–2153MathSciNetCrossRefMATH Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos Appl Sci Eng 16(8):2129–2153MathSciNetCrossRefMATH
3.
Zurück zum Zitat Amigo JM, Kocarev L, Szczapanski J (2007) Theory and practice of chaotic cryptography. Phys Lett A 336:211–216CrossRefMATH Amigo JM, Kocarev L, Szczapanski J (2007) Theory and practice of chaotic cryptography. Phys Lett A 336:211–216CrossRefMATH
7.
Zurück zum Zitat Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on 3-dimensional chaotic baker maps. Chaos Solitons Fractals 31:571–579MathSciNetCrossRefMATH Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on 3-dimensional chaotic baker maps. Chaos Solitons Fractals 31:571–579MathSciNetCrossRefMATH
8.
Zurück zum Zitat Cusick TW, Stanica P (2009) Cryptographic boolean functions and applications. Elsevier, AmsterdamMATH Cusick TW, Stanica P (2009) Cryptographic boolean functions and applications. Elsevier, AmsterdamMATH
9.
10.
Zurück zum Zitat Devaney RL (1992) The Gingerbreadman. Algorithm 3:15–16 Devaney RL (1992) The Gingerbreadman. Algorithm 3:15–16
11.
Zurück zum Zitat Khan M (2015) A novel image encryption scheme based on multi-parameters chaotic S-boxes. Nonlinear Dyn 82:527–533CrossRef Khan M (2015) A novel image encryption scheme based on multi-parameters chaotic S-boxes. Nonlinear Dyn 82:527–533CrossRef
13.
Zurück zum Zitat Khan M, Shah T (2015) A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J Intell Fuzzy Syst 28:1509–1517MathSciNetMATH Khan M, Shah T (2015) A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J Intell Fuzzy Syst 28:1509–1517MathSciNetMATH
14.
Zurück zum Zitat Khan M, Shah T (2015) An image encryption technique. Neural Comput Applic 26:1137–1148CrossRef Khan M, Shah T (2015) An image encryption technique. Neural Comput Applic 26:1137–1148CrossRef
15.
Zurück zum Zitat Khan M, Shah T (2016) Construction and applications of chaotic S-boxes in image encryption. Neural Comput Applic 27:677–685CrossRef Khan M, Shah T (2016) Construction and applications of chaotic S-boxes in image encryption. Neural Comput Applic 27:677–685CrossRef
16.
Zurück zum Zitat Khan M, Shah T, Batool SI (2016) A new implementations of chaotic S-boxes in CAPTCHA. SIViP 10:293–300CrossRef Khan M, Shah T, Batool SI (2016) A new implementations of chaotic S-boxes in CAPTCHA. SIViP 10:293–300CrossRef
17.
Zurück zum Zitat Ikeda K (1979) Multiple-valued stationary state and its instability of the transmitted light by a ring cavity system. Opt Commun 30:257–261CrossRef Ikeda K (1979) Multiple-valued stationary state and its instability of the transmitted light by a ring cavity system. Opt Commun 30:257–261CrossRef
18.
Zurück zum Zitat Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers. IEEE Trans Circuits Syst I Fundam Theory Appl 48(2):163–169CrossRefMATH Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers. IEEE Trans Circuits Syst I Fundam Theory Appl 48(2):163–169CrossRefMATH
19.
Zurück zum Zitat Jing-mei L, Bao-dian W, Xiang-guo C et al (2005) Cryptanalysis of Rijndael S-box and improvement. Appl Math Comput 170(2):958–975MathSciNet Jing-mei L, Bao-dian W, Xiang-guo C et al (2005) Cryptanalysis of Rijndael S-box and improvement. Appl Math Comput 170(2):958–975MathSciNet
21.
22.
Zurück zum Zitat Khan M, Shah T, Mahmood H et al (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70:2303–2311MathSciNetCrossRef Khan M, Shah T, Mahmood H et al (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70:2303–2311MathSciNetCrossRef
23.
Zurück zum Zitat Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71(3):489–492MathSciNetCrossRef Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71(3):489–492MathSciNetCrossRef
24.
Zurück zum Zitat Khan M, Shah T, Mahmood H (2013) Gondal MA (2013b) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73(2013):1795–1801CrossRef Khan M, Shah T, Mahmood H (2013) Gondal MA (2013b) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73(2013):1795–1801CrossRef
25.
Zurück zum Zitat Kuang Y (1993) Delay differential equations with applications in population dynamics. Academic, LondonMATH Kuang Y (1993) Delay differential equations with applications in population dynamics. Academic, LondonMATH
26.
Zurück zum Zitat Özkaynak F, Özer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett A 374:3733–3738CrossRefMATH Özkaynak F, Özer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett A 374:3733–3738CrossRefMATH
28.
Zurück zum Zitat Prokhorow MD, Ponomarenko VI (2008) Encryption and de-cryption of information in chaotic communication systems governed by delay-differential equations. Chaos Solitons Fractals 35:871–877CrossRef Prokhorow MD, Ponomarenko VI (2008) Encryption and de-cryption of information in chaotic communication systems governed by delay-differential equations. Chaos Solitons Fractals 35:871–877CrossRef
29.
Zurück zum Zitat Sprott JC (2003) Chaos and time-series analysis. Oxford University Press, LondonMATH Sprott JC (2003) Chaos and time-series analysis. Oxford University Press, LondonMATH
31.
Zurück zum Zitat Sprott JC (2010) Elegant chaos algebraically simple chaotic flow. World Scientific, SingaporeCrossRefMATH Sprott JC (2010) Elegant chaos algebraically simple chaotic flow. World Scientific, SingaporeCrossRefMATH
32.
Zurück zum Zitat Tang G, Liao X (2005) A method for designing dynamical S-boxes based on discretized chaotic map. Chaos Solitons Fractals 23(5):1901–1909MathSciNetCrossRefMATH Tang G, Liao X (2005) A method for designing dynamical S-boxes based on discretized chaotic map. Chaos Solitons Fractals 23(5):1901–1909MathSciNetCrossRefMATH
33.
Zurück zum Zitat Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fractals 23:413–419CrossRefMATH Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fractals 23:413–419CrossRefMATH
34.
Zurück zum Zitat Tang Y, Wang Z, Fang J (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Commun Nonlinear Sci Numer Simul 15:2456–2468MathSciNetCrossRefMATH Tang Y, Wang Z, Fang J (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Commun Nonlinear Sci Numer Simul 15:2456–2468MathSciNetCrossRefMATH
35.
Zurück zum Zitat Verhulst PF (1838) Notice sur la loi que la population poursuit dans son accroissement. Corresp Math Phys 10:113–121 Verhulst PF (1838) Notice sur la loi que la population poursuit dans son accroissement. Corresp Math Phys 10:113–121
36.
Zurück zum Zitat Wang Y, Xie Q, Wu Y, et al. (2009) A software for S-box performance analysis and test. In: 2009 international conference on electronic commerce and business intelligence, Beijing, China, pp 125–128 Wang Y, Xie Q, Wu Y, et al. (2009) A software for S-box performance analysis and test. In: 2009 international conference on electronic commerce and business intelligence, Beijing, China, pp 125–128
37.
Zurück zum Zitat Webster A, Tavares S (1986) On the design of S-boxes. In: Advances in cryptology: proceedings of Crypto’85, Santa Barbara, USA. Lecture Notes in Computer Science 218:523–534 Webster A, Tavares S (1986) On the design of S-boxes. In: Advances in cryptology: proceedings of Crypto’85, Santa Barbara, USA. Lecture Notes in Computer Science 218:523–534
39.
Zurück zum Zitat Youssef AM, Tavares SE, Gong G (2006) On some probabilistic approximations for AES-like S-boxes. Discrete Math 306(16):2016–2020MathSciNetCrossRefMATH Youssef AM, Tavares SE, Gong G (2006) On some probabilistic approximations for AES-like S-boxes. Discrete Math 306(16):2016–2020MathSciNetCrossRefMATH
Metadaten
Titel
A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation
verfasst von
Majid Khan
Zeeshan Asghar
Publikationsdatum
01.08.2016
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 4/2018
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-016-2511-5

Weitere Artikel der Ausgabe 4/2018

Neural Computing and Applications 4/2018 Zur Ausgabe