Skip to main content
Log in

True-chaotic substitution box based on Boolean functions

  • Regular Article
  • Published:
The European Physical Journal Plus Aims and scope Submit manuscript

Abstract

With the exponential increase in communication sector, the risk of information management also increases. Although there is enormous input from the cybersecurity perspective, still a lot must be done. The substitution box is the most vital component in symmetric encryption algorithms, and various proposals have been presented using chaos. Unfortunately, the full potential of chaos in constructing substitution boxes has not been exploited before. In this paper, we have constructed strong and robust substitution boxes based on Boolean functions incorporating chaos. First, we have developed a new algebraic structure based on the Boolean functions. Second, we have incorporated logistic chaotic map with the proposed algebraic structure to construct strong and robust true-chaotic S-Boxes. Third, the constructed S-Boxes are tested against statistical and security analysis including linear and differential cryptanalysis to demonstrate their strength and robustness. The simulation results and analysis demonstrated that the constructed substitution boxes can resist well-known attacks. Finally, we have done the comparative analysis for statistical, security and cryptanalysis with other well-known works to demonstrate the superiority of our work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. M.A. Al-Garadi, A. Mohamed, A. Al-Ali, X. Du, I. Ali, M. Guizani, A survey of machine and deep learning methods for internet of things (IoT) security (Surv. Tutor, IEEE Commun., 2020). https://doi.org/10.1109/COMST.2020.2988293

    Book  Google Scholar 

  2. F. Ahmed, A. Anees, Hash-based authentication of digital images in noisy channels. Robust Image Authen. Presence Noise (2015). https://doi.org/10.1007/978-3-319-13156-6_1

    Article  Google Scholar 

  3. A. Anees, W.A. Khan, M.A. Gondal, I. Hussain, Application of mean of absolute deviation method for the selection of best nonlinear component based on video encryption. Zeitschrift für Naturforschung A 68, 479–482 (2013)

    Article  ADS  Google Scholar 

  4. S. Zhao, S. Li, L. Qi, L.D. Xu, Computational intelligence enabled cybersecurity for the internet of things. IEEE Trans. Emerg. Top. Comput. Intell. (2020). https://doi.org/10.1109/TETCI.2019.2941757

    Article  Google Scholar 

  5. A. Anees, M.A. Gondal, Construction of nonlinear component for block cipher based on one-dimensional chaotic map. 3D Res. (2015). https://doi.org/10.1007/s13319-015-0049-4

    Article  Google Scholar 

  6. A. Anees and A. M. Siddiqui, A technique for digital watermarking in combined spatial and transform domains using chaotic maps. in IEEE 2nd National Conference on Information Assurance (NCIA), pp. 119–124 (2013). https://doi.org/10.1109/ncia.2013.6725335

  7. A. Anees, Y.-P.P. Chen, Discriminative binary feature learning and quantization in biometric key generation. Pattern Recognit. 77, 289–305 (2018)

    Article  Google Scholar 

  8. A. Anees, M. Siddiqui, J. Ahmed, I. Hussain, A technique for digital steganography using chaotic maps. Nonlinear Dyn. 75(4), 807–816 (2014)

    Article  Google Scholar 

  9. A. Anees, An image encryption scheme based on lorenz system for low profile applications. 3D Res 6(3), 1–10 (2015)

    Article  Google Scholar 

  10. D.G. Baur, L.T. Hoang, A crypto safe haven against bitcoin. Finance Res. Lett. (2020). https://doi.org/10.1016/j.frl.2020.101431

    Article  Google Scholar 

  11. A. Anees, M. Siddiqui, F. Ahmed, Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 19(9), 3106–3118 (2014)

    Article  MathSciNet  MATH  ADS  Google Scholar 

  12. J. Daemen, V. Rijmen, The Design of Rijndael: AES—The Advanced Encryption Standard (Springer, Berlin, 2002)

    Book  MATH  Google Scholar 

  13. G. Chen, A novel heuristic method for obtaining S-boxes. Chaos, Solitons Fractals 36(4), 1028–1036 (2008)

    Article  MathSciNet  MATH  ADS  Google Scholar 

  14. F. Özkaynak, A.B. Özer, A method for designing strong S-boxes based on chaotic Lorenz system. Phys. Lett. A 374(36), 3733–3738 (2010)

    Article  MATH  ADS  Google Scholar 

  15. I. Hussain, T. Shah, H. Mahmood, M.A. Gondal, A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. 22(6), 1085–1093 (2013)

    Article  Google Scholar 

  16. I. Hussain, T. Shah, M.A. Gondal, W.A. Khan, H. Mahmood, A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 23(1), 97–104 (2013)

    Article  Google Scholar 

  17. F. Artuğer, F. Özkaynak, A novel method for performance improvement of chaos-based substitution boxes. Symmetry 12(4), 1–13 (2020)

    Article  Google Scholar 

  18. F. Özkaynak, An analysis and generation toolbox for chaotic substitution boxes: a case study based on chaotic labyrinth Rene thomas system. Iran. J. Sci. Technol. Trans. Electr. Eng. 44, 89–98 (2020)

    Article  Google Scholar 

  19. A. Anees, Y.-P.P. Chen, Designing secure substitution boxes based on permutation of symmetric group. Neural Comput. Appl. 32, 1–12 (2019)

    Google Scholar 

  20. S.S. Jamal, A. Anees, M. Ahmad, M.F. Khan, I. Hussain, Construction of cryptographic S-boxes based on mobius transformation and chaotic tent-sine system. IEEE Access 7, 173273–173285 (2019)

    Article  Google Scholar 

  21. J. Gleick, Chaos: Making a New Science (Penguin Books, London, 1988)

    MATH  Google Scholar 

  22. F. Özkaynak, S. Yavuz, Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn. 74(3), 551–557 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  23. G. Tang, X. Liao, Y. Chen, A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons Fractals 23(2), 413–419 (2005)

    Article  MATH  ADS  Google Scholar 

  24. I. Hussain, T. Shah, M.A. Gondal, H. Mahmood, An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dyn. 71(1–2), 133–140 (2012)

    MathSciNet  Google Scholar 

  25. C. Li, D. Lin, J. Lü, F. Hao, Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimedia 25(4), 46–56 (2018)

    Article  Google Scholar 

  26. T. Kohda, Statistics of chaotic binary sequences. IEEE Trans. Inf. Theory 43(1), 104–112 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  27. A. Ullah, S.S. Jamal, T. Shah, A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn. 88(4), 2757–2769 (2017)

    Article  Google Scholar 

  28. M. Khan, T. Shah, S.I. Batool, Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput. Appl. 27(3), 677–685 (2016)

    Article  Google Scholar 

  29. A. Belazi, M. Khan, A.A.A. El-Latif, S. Belghith, Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption. Wirel. Personal Commun. 87(1), 337–361 (2017)

    Google Scholar 

  30. Skipjack and Kea, Algorithm specifications version, http://csrc.nist.gov/CryptoToolkit/, vol. 2, pp. 1–23 (1998)

  31. G. Jakimoski, L. Kocarev, Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. I: Fund. Theory Appl. 48(2), 163–169 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  32. G. Chen, Y. Chen, X. Liao, An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos Solitons Fract. 31(3), 571–579 (2017)

    Article  MathSciNet  MATH  ADS  Google Scholar 

  33. H. Alkhaldi, I. Hussain, M.A. Gondal, A novel design for the construction of safe S-boxes based on TDERC sequence. Alex. Eng. J. 54(1), 65–69 (2015)

    Article  Google Scholar 

  34. L. Cui, Y. Cao, A new S-box structure named affine-power-affine. Int. J. Innov. Comput. Inf. Control 3(3), 751–759 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iqtadar Hussain.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hussain, I. True-chaotic substitution box based on Boolean functions. Eur. Phys. J. Plus 135, 663 (2020). https://doi.org/10.1140/epjp/s13360-020-00666-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1140/epjp/s13360-020-00666-4

Navigation