Cargando…
A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map
Cryptography deals with designing practical mathematical algorithms having the two primitive elements of confusion and diffusion. The security of encrypted data is highly dependent on these two primitive elements and a key. S-box is the nonlinear component present in a symmetric encryption algorithm...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9138039/ https://www.ncbi.nlm.nih.gov/pubmed/35634109 http://dx.doi.org/10.7717/peerj-cs.940 |
_version_ | 1784714527892307968 |
---|---|
author | Ali, Asim Khan, Muhammad Asif Ayyasamy, Ramesh Kumar Wasif, Muhammad |
author_facet | Ali, Asim Khan, Muhammad Asif Ayyasamy, Ramesh Kumar Wasif, Muhammad |
author_sort | Ali, Asim |
collection | PubMed |
description | Cryptography deals with designing practical mathematical algorithms having the two primitive elements of confusion and diffusion. The security of encrypted data is highly dependent on these two primitive elements and a key. S-box is the nonlinear component present in a symmetric encryption algorithm that provides confusion. A cryptographically strong bijective S-box structure in cryptosystem ensures near-optimal resistance against cryptanalytic attacks. It provides uncertainty and nonlinearity that ensures high confidentiality and security against cryptanalysis attacks. The nonlinearity of an S-box is highly dependent on the dispersal of input data using an S-box. Cryptographic performance criteria of chaos-based S-boxes are worse than algebraic S-box design methods, especially differential probability. This article reports a novel approach to design an 8 × 8 S-box using chaos and randomization using dispersion property to S-box cryptographic properties, especially differential probability. The randomization using dispersion property is introduced within the design loop to achieve low differential uniformity possibly. Two steps are involved in generating the proposed S-box. In the first step, a piecewise linear chaotic map (PWLCM) is utilized to generate initial S-box positions. Generally, the dispersion property is a post-processing technique that measures maximum nonlinearity in a given random sequence. However, in the second step, the concept is carefully reverse engineered, and the dispersion property is used within the design loop for systematic dispersal of input substituting sequence. The proposed controlled randomization changes the probability distribution statistics of S-box’s differentials. The proposed methodology systematically substitutes the S-box positions that cause output differences to recur for a given input difference. The proposed S-box is analyzed using well-established and well-known statistical cryptographic criteria of nonlinearity, strict avalanche criteria (SAC), bit independence criteria (BIC), differential probability, and linear probability. Further, the S-box’s boomerang connectivity table (BCT) is generated to analyze its strength against boomerang attack. Boomerang is a relatively new attacking framework for cryptosystem. The proposed S-box is compared with the state-of-the-art latest related publications. Results show that the proposed S-box achieves an upper bound of cryptographic properties, especially differential probability. This work hypothesizes that highly dispersive hamming distances at output difference, generated a systematic S-box. The mixing property of chaos generated trajectories utilized for decimal mapping. To test the randomness of generated chaotic trajectories, a cryptographically secure pseudo-random sequence was generated using a chaotic map that was tested using the National Institute of Standards and Technology (NIST) NIST-800-22 test suit. |
format | Online Article Text |
id | pubmed-9138039 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-91380392022-05-28 A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map Ali, Asim Khan, Muhammad Asif Ayyasamy, Ramesh Kumar Wasif, Muhammad PeerJ Comput Sci Cryptography Cryptography deals with designing practical mathematical algorithms having the two primitive elements of confusion and diffusion. The security of encrypted data is highly dependent on these two primitive elements and a key. S-box is the nonlinear component present in a symmetric encryption algorithm that provides confusion. A cryptographically strong bijective S-box structure in cryptosystem ensures near-optimal resistance against cryptanalytic attacks. It provides uncertainty and nonlinearity that ensures high confidentiality and security against cryptanalysis attacks. The nonlinearity of an S-box is highly dependent on the dispersal of input data using an S-box. Cryptographic performance criteria of chaos-based S-boxes are worse than algebraic S-box design methods, especially differential probability. This article reports a novel approach to design an 8 × 8 S-box using chaos and randomization using dispersion property to S-box cryptographic properties, especially differential probability. The randomization using dispersion property is introduced within the design loop to achieve low differential uniformity possibly. Two steps are involved in generating the proposed S-box. In the first step, a piecewise linear chaotic map (PWLCM) is utilized to generate initial S-box positions. Generally, the dispersion property is a post-processing technique that measures maximum nonlinearity in a given random sequence. However, in the second step, the concept is carefully reverse engineered, and the dispersion property is used within the design loop for systematic dispersal of input substituting sequence. The proposed controlled randomization changes the probability distribution statistics of S-box’s differentials. The proposed methodology systematically substitutes the S-box positions that cause output differences to recur for a given input difference. The proposed S-box is analyzed using well-established and well-known statistical cryptographic criteria of nonlinearity, strict avalanche criteria (SAC), bit independence criteria (BIC), differential probability, and linear probability. Further, the S-box’s boomerang connectivity table (BCT) is generated to analyze its strength against boomerang attack. Boomerang is a relatively new attacking framework for cryptosystem. The proposed S-box is compared with the state-of-the-art latest related publications. Results show that the proposed S-box achieves an upper bound of cryptographic properties, especially differential probability. This work hypothesizes that highly dispersive hamming distances at output difference, generated a systematic S-box. The mixing property of chaos generated trajectories utilized for decimal mapping. To test the randomness of generated chaotic trajectories, a cryptographically secure pseudo-random sequence was generated using a chaotic map that was tested using the National Institute of Standards and Technology (NIST) NIST-800-22 test suit. PeerJ Inc. 2022-05-11 /pmc/articles/PMC9138039/ /pubmed/35634109 http://dx.doi.org/10.7717/peerj-cs.940 Text en © 2022 Ali et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Cryptography Ali, Asim Khan, Muhammad Asif Ayyasamy, Ramesh Kumar Wasif, Muhammad A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map |
title | A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map |
title_full | A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map |
title_fullStr | A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map |
title_full_unstemmed | A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map |
title_short | A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map |
title_sort | novel systematic byte substitution method to design strong bijective substitution box (s-box) using piece-wise-linear chaotic map |
topic | Cryptography |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9138039/ https://www.ncbi.nlm.nih.gov/pubmed/35634109 http://dx.doi.org/10.7717/peerj-cs.940 |
work_keys_str_mv | AT aliasim anovelsystematicbytesubstitutionmethodtodesignstrongbijectivesubstitutionboxsboxusingpiecewiselinearchaoticmap AT khanmuhammadasif anovelsystematicbytesubstitutionmethodtodesignstrongbijectivesubstitutionboxsboxusingpiecewiselinearchaoticmap AT ayyasamyrameshkumar anovelsystematicbytesubstitutionmethodtodesignstrongbijectivesubstitutionboxsboxusingpiecewiselinearchaoticmap AT wasifmuhammad anovelsystematicbytesubstitutionmethodtodesignstrongbijectivesubstitutionboxsboxusingpiecewiselinearchaoticmap AT aliasim novelsystematicbytesubstitutionmethodtodesignstrongbijectivesubstitutionboxsboxusingpiecewiselinearchaoticmap AT khanmuhammadasif novelsystematicbytesubstitutionmethodtodesignstrongbijectivesubstitutionboxsboxusingpiecewiselinearchaoticmap AT ayyasamyrameshkumar novelsystematicbytesubstitutionmethodtodesignstrongbijectivesubstitutionboxsboxusingpiecewiselinearchaoticmap AT wasifmuhammad novelsystematicbytesubstitutionmethodtodesignstrongbijectivesubstitutionboxsboxusingpiecewiselinearchaoticmap |