Computer Science ›› 2017, Vol. 44 ›› Issue (7): 107-110.doi: 10.11896/j.issn.1002-137X.2017.07.020

Previous Articles     Next Articles

Method to Construct Secure S-boxes Based on Multimap

CAO Xiao-mei, CHEN Hai-shan and WANG Shao-hui   

  • Online:2018-11-13 Published:2018-11-13

Abstract: The problem of constructing S-boxs was transformed to a problem of searching for the mapping of certain conditions.Using the chaotic characteristics of Tent map,we proposed initial mapping algorithm to get the initial mappings which can be used as initial S-boxes.In order to improve the security of S-boxs,multimap algorithm was proposed which using multiple initial mappings to do nonlinear operations on S-boxs.According to security criteria,the proposed algorithm can obtain stronger S-boxes.At last,by setting a security index,the number of strong S-boxes generated by the algorithm was counted.The results of analysis show that the number of strong S-boxes increases with the increase of the number of initial mappings used in multimap algorithm,and the time cost is proportional to the number of initial mappings used in multimap algorithm.

Key words: Multimap,S-box,Tent map,Security criterion

[1] MASUDA N,AIHARA K.Cryptosystems with discretized chaotic maps[J].IEEE Transactions on Circuits and Systems I:Fundamental Theory and Applications,2002,49(1):28-40.
[2] SUN F,Lü Z,LIU S.A new cryptosystem based on spatialchaotic system[J].Optics Communications,2010,283(10):2066-2073.
[3] KANSO A.Self-shrinking chaotic stream ciphers[J].Communi-cations in Nonlinear Science and Numerical Simulation,2011,6(2):822-836.
[4] ZHENG X,YU J,SHUAI Y.A novel authentication schemebased on chaos[C]∥2013 8th International Conference on Computer Science & Education.2013:879-882.
[5] XIAO D,LIAO X,DENG S.A novel key agreement protocolbased on chaotic maps[J].Information Sciences,2007,177(4):1136-1142.
[6] USAMA M,KHAN M K,ALGHATHBAR K,et al.Chaos-based secure satellite imagery cryptosystem[J].Computers & Mathematics with Applications,2010,60(2):326-337.
[7] LEUNG H Y,CHENG L M,CHENG L L.Robust watermar-king schemes using selective curvelet coefficients based on a hvsmodel[J].International Journal of Wavelets,Multiresolution and Information Processing,2010,8(6):941-959.
[8] XIAO D,LIAO X,WANG Y.Parallel keyed hash function construction based on chaotic neural network[J].Neurocomputing,2009,2(10):2288-2296.
[9] GUO X,ZHANG J.Secure group key agreement protocol based on chaotic Hash[J].Information Sciences,2010,180(20):4069-4074.
[10] ZHAO G,FANG J Q.Modern information safety and advances in application research of chaos-based security communication[J].Progress in Physics,2003,23(2):212-255.(in Chinese) 赵耿,方锦清.现代信息安全与混沌保密通信应用研究的进展[J].物理学进展,2003,23(2):212-255.
[11] JAKIMOSKI G,KOCAREV L.Chaos and cryptography:block encryption ciphers based on chaotic maps[J].IEEE Transactions on Circuits and Systems I:Fundamental Theory and Applications,2001,48(2):163-169.
[12] WEBSTER A F,TAVARES S E.On the design of S-boxes[M]∥Advances in Cryptology—CRYPTO’85 Proceedings.Springer Berlin Heidelberg,1985:523-534.
[13] YI X,CHENG S X,YOU X H,et al.A method for obtaining cryptographically strong 8×8 S-boxes[C]∥Global Telecommunications Conference,1997(GLOBECOM’97).IEEE,1997:689-693.
[14] TANG G,LIAO X,CHEN Y.A novel method for designing S-boxes based on chaotic maps[J].Chaos,Solitons & Fractals,2005,23(2):413-419.
[15] KOHDA T,TSUNEDA A.Statistics of chaotic binary sequences[J].IEEE Transactions on Information Theory,1997,43(1):104-112.
[16] CHEN G.A novel heuristic method for obtaining S-boxes[J].Chaos,Solitons & Fractals,2008,36(4):1028-1036.
[17] HUSSAIN I,SHAH T,GONDAL M A,et al.A novel method for designing nonlinear component for block cipher based on TD-ERCS chaotic sequence[J].Nonlinear Dynamics,2013,73(1/2):633-637.
[18] KHAN M,SHAH T,MAHMOOD H,et al.A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems[J].Nonlinear Dynamics,2012,70(3):2303-2311.
[19] HUSSAIN I,SHAH T,MAHMOOD H,et al.A projectivegeneral linear group based algorithm for the construction of sub-stitution box for block ciphers[J].Neural Computing and App-lications,2013,22(6):1085-1093.
[20] ZKAYNAK F,YAVUZ S.Designing chaotic S-boxes based on time-delay chaotic system[J].Nonlinear Dynamics,2013,74(3):551-557.
[21] GUESMI R,AMINE BEN FARAH M,K ACHOURI A,et al.Chaos-based designing of a highly nonlinear S-box using Boolean functions[C]∥2015 12th International Multi-Conference on Systems,Signals & Devices (SSD).IEEE,2015:1-5.
[22] TIAN Y,LU Z.S-box:LL Cascade Chaotic Map and Line Map[M]∥Image and Graphics.Springer International Publishing,2015:297-309.
[23] FENG Y,LI L,HUANG F.A symmetric image encryption approach based on line maps[C]∥1st International Symposium on Systems and Control in Aerospace and Astronautics,2006(ISSCAA 2006).IEEE,2006:1362-1367.
[24] QIN J,WANG P.A method to construct Dynamic S-Box based on Chaotic Map[J].Computer Science,2007,34(5):89-91.(in Chinese) 邱劲,王平.基于混沌映射的动态 S 盒构造方法[J].计算机科学,2007,34(5):89-91.
[25] HASSANI M.Derangements and applications[J].Journal of Integer Sequences,2003,6(2):1-8.
[26] LIU Y,TIAN S.Design and statistical analysis of a new chaos block cipher for WSN[C]∥2010 IEEE International Conference on Information Theory and Information Security.2010:327-330.
[27] BENJEDDOU A,TAHA A,FOURNIER-PRUNARET D,et al.A new cryptographic hash function based on chaotic S-Box[C]∥CSNDSP.Austria,2008:23-25.
[28] BLANCHARD P,DEVANEY R L,HALL G R.DifferentialEquations[M].London:Thompson,2006:96-111.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!