计算机科学 ›› 2023, Vol. 50 ›› Issue (11): 333-339.doi: 10.11896/jsjkx.220900026

• 信息安全 • 上一篇    下一篇

基于抗退化混沌系统和初等元胞自动机的动态S盒设计

赵耿1,2, 高世蕊1, 马英杰1, 董有恒2   

  1. 1 北京电子科技学院网络空间安全系 北京 100071
    2 北京邮电大学网络空间安全学院 北京 100089
  • 收稿日期:2022-09-05 修回日期:2022-12-15 出版日期:2023-11-15 发布日期:2023-11-06
  • 通讯作者: 高世蕊(gao_sr2022@163.com)
  • 作者简介:(zhaogeng@besti.edu.cn)
  • 基金资助:
    北京高校“高精尖”学科建设项目(3201017);国家自然科学基金(61772047)

Design of Dynamic S-box Based on Anti-degradation Chaotic System and Elementary Cellular Automata

ZHAO Geng1,2, GAO Shirui1, MA Yingjie1, DONG Youheng2   

  1. 1 Department of Cyber Space Security,Beijing Electronic Science and Technology Institute,Beijing 100071,China
    2 School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100089,China
  • Received:2022-09-05 Revised:2022-12-15 Online:2023-11-15 Published:2023-11-06
  • About author:ZHAO Geng,born in 1964,Ph.D,professor,Ph.D supervisor,is a senior member of China Computer Federation.His main research interests include chaotic secure communication and information security.GAO Shirui,born in 1998,postgra-duate.Her main research interest is chaos block cipher.
  • Supported by:
    Sharp Subject Project Construction in Colleges and Universities in Beijing(3201017) and National Natural Science Foundation of China(61772047).

摘要: S盒是多数分组密码算法的基本非线性模块,可以满足分组密码算法的混淆、扩散要求。为了提高混沌S盒的安全性,文中利用抗退化混沌系统生成S盒元素,基于初等元胞自动机生成S盒检索表的方式来生成S盒。抗退化混沌系统可以避免发生Skew Tent系统进入不动点的情况,消除低精度下系统进入短周期的现象。因为初等元胞自动机的迭代规则为二元域上的运算,且满足时空上的离散性,所以,将初等元胞自动机运用到混沌分组密码中时,不用考虑动力学退化的问题。当初等元胞自动机的迭代规则为全局混沌规则时,只要元胞个数足够,就可以保证输出的伪随机性。利用初等元胞自动机生成S盒的检索表,在保证S盒设计的混淆原则的同时还可以简化S盒的生成步骤。最后对所设计的S盒进行安全性分析对比,实验结果表明,所提方法生成的S盒具有良好的安全性,满足分组密码的混淆、扩散原则,可用于混沌分组密码算法设计中。

关键词: S盒, 抗退化, 混沌, 初等元胞自动机, Lorenz系统, Skew Tent系统

Abstract: S-box is the basic non-linear module of most block cipher algorithms,which can meet the obfuscation and proliferation requirements of block cipher algorithms.In order to improve the safety of chaotic S-boxes,this paper uses an anti-degenerative chaotic system to generate S-box elements,and generates an S-box based on elementary cellular automata to generate S-box retrieval table.The anti-degradation chaotic system can avoid the situation that the Skew Tent system enters the fixed point and eliminate the phenomenon of the system entering a short period of time at low precision.Because the elementary cellular automata is an operation on the binary domain and satisfies the discreteness in time and space,the elementary cellular automata is applied to the chaotic block cipher without considering the problem of dynamics degradation.In the case of global chaos rules,if the number of cells is enough,the pseudorandom of the output can be guaranteed.The use of elementary cellular automata to generate a search table for the S-box can not only ensure the confusion principle of S-box design,but also simplify the steps of S-box generation.Finally,the security analysis and comparison of the designed S-box shows that the S-box generated by the proposed method has good security,satisfies the principle of confusion and diffusion of block ciphers,and can be used in the design of chaotic block cipher algorithms.

Key words: S-box, Anti-degradation, Chaos, Elementary cellular automata, Lorenz system, Skew Tent system

中图分类号: 

  • TP309.7
[1]LI L,ZHANG H G.Serpent—a candidate for Advanced Encryption Standard AES[J].Information Security and Communications Privacy,2000(1):68-72.
[2]HE Y.Attack on reduced-round CRYPTION cipher[D].Jinan:Shandong University,2006.
[3]KNUDSEN L.A Key-schedule Weakness in SAFER K-64[J].Lecture Notes in Computer Science,1995,963(1):274-286.
[4]HU Y P,XIAO G Z,ZHANG Y Q.Modification of SAFER+[J].Journal of Xidian University,2000(6):730-735.
[5]SU X D,CUI J S,ZHANG H G.One of the candidates of advanced encryption standard AES——Rijndael[J].Information Security and Communications,2000(1):62-67,78.
[6]MASTUI M.New Block Encryption Algorithm MISTY[C]//FSE 97.Berlin:Springer Verlag,1997:54-68.
[7]ZHU D,TONG X J,ZHANG M,et al.A New S-Box Generation Method and Advanced Design Based on Combined Chaotic System[J].Symmetry,2020,12(12):2087-2087.
[8]NEUMANN J,BURKS A W.Theory of self-reproducing au-tomata[M].Urbana:University of Illinois Press,1966.
[9]LANGTON C G.Self-reproduction in cellular automata[J].Physica D:Nonlinear Phenomena,1984,10(1/2):135-144.
[10]JOSHI P,MUKHOPADHYAY D,ROYCHOWDHURY D.Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata[J].Cryptology and Information Security Series,2005,2005:396-396.
[11]DONG Y H,ZHAO G,MA Y J.Two-dimensional pseudo-random coupled map lattices system based on partitioned elementary cellular automata and its dynamic properties[J].Journal on Communications,2022,43(1):71-82.
[12]NASKAR P K,BHATTACHARYYA S,NANDY D,et al.Arobust image encryption scheme using chaotic tent map and cellular automata[J].Nonlinear Dynamics,2020,100(3):2877-2898.
[13]刘桂芬,赵文强.加法噪声驱动的随机Lorenz系统吸引子及其上半连续性[J].重庆工商大学学报(自然科学版),2022,39(1):78-84.
[14]CAO L C,LUO Y L,QIU S H,et al.A perturbation method to the tent map based on Lyapunov exponent and its application[J].Chinese Physics B,2015,24(10):82-89.
[15]WOLFRAM S.Cellular automata as models of complexity[J].Nature,1984,311(5985):419-424.
[16]LI W,PACKARD N.The structure of the elementary cellular automata rule space[J].Complex Systems,2000,4(3):281-297.
[17]JAKIMOSKI G,KOCAREV L.Chaos and cryptography:block encryption ciphers based on chaotic maps[J].IEEE Transactions on Circuits and Systems I Regular Papers,2001,48(2):163-169.
[18]HAN Y Y,HE Y R,LIU P H,et al.A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System[J].Journal of Computer Research and Development,2020,57(10):2147-2157.
[19]ZHAO G,ZHANG S M,MA Y J,et al.Design and analysis of dynamic S-box based on anti-degradation chaotic system[J].Journal of Computer Applications, 2022.42(10):3069-3073.
[20]ÖZKAYNAK F.An Analysis and Generation Toolbox for Chaotic Substitution Boxes:A Case Study Based on Chaotic Labyrinth Rene Thomas System[J].Iranian Journal of Science and Technology,Transactions of Electrical Engineering,2020,44(1):89-98.
[21]YAN W H,DING Q.A Novel S-Box Dynamic Design Based on Nonlinear-Transform of 1D Chaotic Maps[J].Electronics,2021,10(11):1313.
[22]ADAMS C,TAVARES S.The structured design of crypto-graphically good s-boxes[J].Journal of Cryptology,1990,3(1):27-41.
[23]BIHAM E,SHAMIR A.Differential Cryptanalysis of DES-like Cryptosystems[J].Journal of Cryptology,1991,4(1):63-72.
[24]HALE J K,VERDYNLUNEL S M.Introduction to Functional Differential Equations[M].New York:Springer-Verlag,1993.
[25]WEBSTER A F,TAVARES S E.On the Design of S-Boxes[J].Lecture Notes in Computer Science,1986,218(1):523-534.
[26]SONY L Y,GONG X Q,HE X F,et al.Multi-stage malicious click detection on large scale Web advertising data[C]//Proceedings of Very Large Data Bases.New York:ACM,2013:67-72.
[27]LIU Q,FANG J Q,ZHAO G,et al.Research on Chaotic Encryption System based on FPGA technology[J].Acta Physica Sinica,2012,61(13):78-83.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!