计算机科学 ›› 2017, Vol. 44 ›› Issue (7): 107-110.doi: 10.11896/j.issn.1002-137X.2017.07.020

• 信息安全 • 上一篇    下一篇

基于多重映射的安全S盒构造方法

曹晓梅,陈海山,王少辉   

  1. 南京邮电大学计算机与软件学院 南京210003江苏无线传感网高技术研究重点实验室 南京210003南京邮电大学宽带无线通信与传感网技术教育部重点实验室 南京210003,南京邮电大学计算机与软件学院 南京210003江苏无线传感网高技术研究重点实验室 南京210003南京邮电大学宽带无线通信与传感网技术教育部重点实验室 南京210003,南京邮电大学计算机与软件学院 南京210003江苏无线传感网高技术研究重点实验室 南京210003南京邮电大学宽带无线通信与传感网技术教育部重点实验室 南京210003
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金(61202353),国家重点基础研究发展计划(973)(2011CB302903),江苏高校优势学科建设工程资助

Method to Construct Secure S-boxes Based on Multimap

CAO Xiao-mei, CHEN Hai-shan and WANG Shao-hui   

  • Online:2018-11-13 Published:2018-11-13

摘要: 将构造S盒的问题转化为寻找满足一定条件的映射的问题。利用 Tent映射的混沌特性,提出初始映射算法,并使用该算法得到可作为初始S盒的初始映射。为了提高S盒的安全性,提出了使用多个初始映射对初始S盒做非线性操作的多重映射算法,经安全性准则检验,该算法能够获得安全性更高的S盒。最后通过设定一个安全指标统计了该算法能够生成的优良S盒的个数,表明优良S盒的个数随着算法采用初始映射个数的增加而增加,并且实现算法所需的时间与算法中采用的初始映射的个数成正比。

关键词: 多重映射,S盒,Tent映射,安全性准则

Abstract: The problem of constructing S-boxs was transformed to a problem of searching for the mapping of certain conditions.Using the chaotic characteristics of Tent map,we proposed initial mapping algorithm to get the initial mappings which can be used as initial S-boxes.In order to improve the security of S-boxs,multimap algorithm was proposed which using multiple initial mappings to do nonlinear operations on S-boxs.According to security criteria,the proposed algorithm can obtain stronger S-boxes.At last,by setting a security index,the number of strong S-boxes generated by the algorithm was counted.The results of analysis show that the number of strong S-boxes increases with the increase of the number of initial mappings used in multimap algorithm,and the time cost is proportional to the number of initial mappings used in multimap algorithm.

Key words: Multimap,S-box,Tent map,Security criterion

[1] MASUDA N,AIHARA K.Cryptosystems with discretized chaotic maps[J].IEEE Transactions on Circuits and Systems I:Fundamental Theory and Applications,2002,49(1):28-40.
[2] SUN F,Lü Z,LIU S.A new cryptosystem based on spatialchaotic system[J].Optics Communications,2010,283(10):2066-2073.
[3] KANSO A.Self-shrinking chaotic stream ciphers[J].Communi-cations in Nonlinear Science and Numerical Simulation,2011,6(2):822-836.
[4] ZHENG X,YU J,SHUAI Y.A novel authentication schemebased on chaos[C]∥2013 8th International Conference on Computer Science & Education.2013:879-882.
[5] XIAO D,LIAO X,DENG S.A novel key agreement protocolbased on chaotic maps[J].Information Sciences,2007,177(4):1136-1142.
[6] USAMA M,KHAN M K,ALGHATHBAR K,et al.Chaos-based secure satellite imagery cryptosystem[J].Computers & Mathematics with Applications,2010,60(2):326-337.
[7] LEUNG H Y,CHENG L M,CHENG L L.Robust watermar-king schemes using selective curvelet coefficients based on a hvsmodel[J].International Journal of Wavelets,Multiresolution and Information Processing,2010,8(6):941-959.
[8] XIAO D,LIAO X,WANG Y.Parallel keyed hash function construction based on chaotic neural network[J].Neurocomputing,2009,2(10):2288-2296.
[9] GUO X,ZHANG J.Secure group key agreement protocol based on chaotic Hash[J].Information Sciences,2010,180(20):4069-4074.
[10] ZHAO G,FANG J Q.Modern information safety and advances in application research of chaos-based security communication[J].Progress in Physics,2003,23(2):212-255.(in Chinese) 赵耿,方锦清.现代信息安全与混沌保密通信应用研究的进展[J].物理学进展,2003,23(2):212-255.
[11] JAKIMOSKI G,KOCAREV L.Chaos and cryptography:block encryption ciphers based on chaotic maps[J].IEEE Transactions on Circuits and Systems I:Fundamental Theory and Applications,2001,48(2):163-169.
[12] WEBSTER A F,TAVARES S E.On the design of S-boxes[M]∥Advances in Cryptology—CRYPTO’85 Proceedings.Springer Berlin Heidelberg,1985:523-534.
[13] YI X,CHENG S X,YOU X H,et al.A method for obtaining cryptographically strong 8×8 S-boxes[C]∥Global Telecommunications Conference,1997(GLOBECOM’97).IEEE,1997:689-693.
[14] TANG G,LIAO X,CHEN Y.A novel method for designing S-boxes based on chaotic maps[J].Chaos,Solitons & Fractals,2005,23(2):413-419.
[15] KOHDA T,TSUNEDA A.Statistics of chaotic binary sequences[J].IEEE Transactions on Information Theory,1997,43(1):104-112.
[16] CHEN G.A novel heuristic method for obtaining S-boxes[J].Chaos,Solitons & Fractals,2008,36(4):1028-1036.
[17] HUSSAIN I,SHAH T,GONDAL M A,et al.A novel method for designing nonlinear component for block cipher based on TD-ERCS chaotic sequence[J].Nonlinear Dynamics,2013,73(1/2):633-637.
[18] KHAN M,SHAH T,MAHMOOD H,et al.A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems[J].Nonlinear Dynamics,2012,70(3):2303-2311.
[19] HUSSAIN I,SHAH T,MAHMOOD H,et al.A projectivegeneral linear group based algorithm for the construction of sub-stitution box for block ciphers[J].Neural Computing and App-lications,2013,22(6):1085-1093.
[20] ZKAYNAK F,YAVUZ S.Designing chaotic S-boxes based on time-delay chaotic system[J].Nonlinear Dynamics,2013,74(3):551-557.
[21] GUESMI R,AMINE BEN FARAH M,K ACHOURI A,et al.Chaos-based designing of a highly nonlinear S-box using Boolean functions[C]∥2015 12th International Multi-Conference on Systems,Signals & Devices (SSD).IEEE,2015:1-5.
[22] TIAN Y,LU Z.S-box:LL Cascade Chaotic Map and Line Map[M]∥Image and Graphics.Springer International Publishing,2015:297-309.
[23] FENG Y,LI L,HUANG F.A symmetric image encryption approach based on line maps[C]∥1st International Symposium on Systems and Control in Aerospace and Astronautics,2006(ISSCAA 2006).IEEE,2006:1362-1367.
[24] QIN J,WANG P.A method to construct Dynamic S-Box based on Chaotic Map[J].Computer Science,2007,34(5):89-91.(in Chinese) 邱劲,王平.基于混沌映射的动态 S 盒构造方法[J].计算机科学,2007,34(5):89-91.
[25] HASSANI M.Derangements and applications[J].Journal of Integer Sequences,2003,6(2):1-8.
[26] LIU Y,TIAN S.Design and statistical analysis of a new chaos block cipher for WSN[C]∥2010 IEEE International Conference on Information Theory and Information Security.2010:327-330.
[27] BENJEDDOU A,TAHA A,FOURNIER-PRUNARET D,et al.A new cryptographic hash function based on chaotic S-Box[C]∥CSNDSP.Austria,2008:23-25.
[28] BLANCHARD P,DEVANEY R L,HALL G R.DifferentialEquations[M].London:Thompson,2006:96-111.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!