Computer Science ›› 2023, Vol. 50 ›› Issue (11): 333-339.doi: 10.11896/jsjkx.220900026

• Information Security • Previous Articles     Next Articles

Design of Dynamic S-box Based on Anti-degradation Chaotic System and Elementary Cellular Automata

ZHAO Geng1,2, GAO Shirui1, MA Yingjie1, DONG Youheng2   

  1. 1 Department of Cyber Space Security,Beijing Electronic Science and Technology Institute,Beijing 100071,China
    2 School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100089,China
  • Received:2022-09-05 Revised:2022-12-15 Online:2023-11-15 Published:2023-11-06
  • About author:ZHAO Geng,born in 1964,Ph.D,professor,Ph.D supervisor,is a senior member of China Computer Federation.His main research interests include chaotic secure communication and information security.GAO Shirui,born in 1998,postgra-duate.Her main research interest is chaos block cipher.
  • Supported by:
    Sharp Subject Project Construction in Colleges and Universities in Beijing(3201017) and National Natural Science Foundation of China(61772047).

Abstract: S-box is the basic non-linear module of most block cipher algorithms,which can meet the obfuscation and proliferation requirements of block cipher algorithms.In order to improve the safety of chaotic S-boxes,this paper uses an anti-degenerative chaotic system to generate S-box elements,and generates an S-box based on elementary cellular automata to generate S-box retrieval table.The anti-degradation chaotic system can avoid the situation that the Skew Tent system enters the fixed point and eliminate the phenomenon of the system entering a short period of time at low precision.Because the elementary cellular automata is an operation on the binary domain and satisfies the discreteness in time and space,the elementary cellular automata is applied to the chaotic block cipher without considering the problem of dynamics degradation.In the case of global chaos rules,if the number of cells is enough,the pseudorandom of the output can be guaranteed.The use of elementary cellular automata to generate a search table for the S-box can not only ensure the confusion principle of S-box design,but also simplify the steps of S-box generation.Finally,the security analysis and comparison of the designed S-box shows that the S-box generated by the proposed method has good security,satisfies the principle of confusion and diffusion of block ciphers,and can be used in the design of chaotic block cipher algorithms.

Key words: S-box, Anti-degradation, Chaos, Elementary cellular automata, Lorenz system, Skew Tent system

CLC Number: 

  • TP309.7
[1]LI L,ZHANG H G.Serpent—a candidate for Advanced Encryption Standard AES[J].Information Security and Communications Privacy,2000(1):68-72.
[2]HE Y.Attack on reduced-round CRYPTION cipher[D].Jinan:Shandong University,2006.
[3]KNUDSEN L.A Key-schedule Weakness in SAFER K-64[J].Lecture Notes in Computer Science,1995,963(1):274-286.
[4]HU Y P,XIAO G Z,ZHANG Y Q.Modification of SAFER+[J].Journal of Xidian University,2000(6):730-735.
[5]SU X D,CUI J S,ZHANG H G.One of the candidates of advanced encryption standard AES——Rijndael[J].Information Security and Communications,2000(1):62-67,78.
[6]MASTUI M.New Block Encryption Algorithm MISTY[C]//FSE 97.Berlin:Springer Verlag,1997:54-68.
[7]ZHU D,TONG X J,ZHANG M,et al.A New S-Box Generation Method and Advanced Design Based on Combined Chaotic System[J].Symmetry,2020,12(12):2087-2087.
[8]NEUMANN J,BURKS A W.Theory of self-reproducing au-tomata[M].Urbana:University of Illinois Press,1966.
[9]LANGTON C G.Self-reproduction in cellular automata[J].Physica D:Nonlinear Phenomena,1984,10(1/2):135-144.
[10]JOSHI P,MUKHOPADHYAY D,ROYCHOWDHURY D.Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata[J].Cryptology and Information Security Series,2005,2005:396-396.
[11]DONG Y H,ZHAO G,MA Y J.Two-dimensional pseudo-random coupled map lattices system based on partitioned elementary cellular automata and its dynamic properties[J].Journal on Communications,2022,43(1):71-82.
[12]NASKAR P K,BHATTACHARYYA S,NANDY D,et al.Arobust image encryption scheme using chaotic tent map and cellular automata[J].Nonlinear Dynamics,2020,100(3):2877-2898.
[13]刘桂芬,赵文强.加法噪声驱动的随机Lorenz系统吸引子及其上半连续性[J].重庆工商大学学报(自然科学版),2022,39(1):78-84.
[14]CAO L C,LUO Y L,QIU S H,et al.A perturbation method to the tent map based on Lyapunov exponent and its application[J].Chinese Physics B,2015,24(10):82-89.
[15]WOLFRAM S.Cellular automata as models of complexity[J].Nature,1984,311(5985):419-424.
[16]LI W,PACKARD N.The structure of the elementary cellular automata rule space[J].Complex Systems,2000,4(3):281-297.
[17]JAKIMOSKI G,KOCAREV L.Chaos and cryptography:block encryption ciphers based on chaotic maps[J].IEEE Transactions on Circuits and Systems I Regular Papers,2001,48(2):163-169.
[18]HAN Y Y,HE Y R,LIU P H,et al.A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System[J].Journal of Computer Research and Development,2020,57(10):2147-2157.
[19]ZHAO G,ZHANG S M,MA Y J,et al.Design and analysis of dynamic S-box based on anti-degradation chaotic system[J].Journal of Computer Applications, 2022.42(10):3069-3073.
[20]ÖZKAYNAK F.An Analysis and Generation Toolbox for Chaotic Substitution Boxes:A Case Study Based on Chaotic Labyrinth Rene Thomas System[J].Iranian Journal of Science and Technology,Transactions of Electrical Engineering,2020,44(1):89-98.
[21]YAN W H,DING Q.A Novel S-Box Dynamic Design Based on Nonlinear-Transform of 1D Chaotic Maps[J].Electronics,2021,10(11):1313.
[22]ADAMS C,TAVARES S.The structured design of crypto-graphically good s-boxes[J].Journal of Cryptology,1990,3(1):27-41.
[23]BIHAM E,SHAMIR A.Differential Cryptanalysis of DES-like Cryptosystems[J].Journal of Cryptology,1991,4(1):63-72.
[24]HALE J K,VERDYNLUNEL S M.Introduction to Functional Differential Equations[M].New York:Springer-Verlag,1993.
[25]WEBSTER A F,TAVARES S E.On the Design of S-Boxes[J].Lecture Notes in Computer Science,1986,218(1):523-534.
[26]SONY L Y,GONG X Q,HE X F,et al.Multi-stage malicious click detection on large scale Web advertising data[C]//Proceedings of Very Large Data Bases.New York:ACM,2013:67-72.
[27]LIU Q,FANG J Q,ZHAO G,et al.Research on Chaotic Encryption System based on FPGA technology[J].Acta Physica Sinica,2012,61(13):78-83.
[1] ZHOU Xuequan, DU Nisuo, OUYANG Zhi. Chaos COOT Bird Algorithm Based on Cauchy Mutation and Differential Evolution [J]. Computer Science, 2023, 50(8): 209-220.
[2] SHI Ke-xiang, BAO Li-yong, DING Hong-wei, GUAN Zheng, ZHAO Lei. Chaos Artificial Bee Colony Algorithm Based on Homogenizing Optimization of Generated Time Series [J]. Computer Science, 2021, 48(7): 270-280.
[3] LIU Han-qing, KANG Xiao-dong, GAO Wan-chun, LI Bo, WANG Ya-ge, ZHANG Hua-li, BAI Fang. Research on Propagation of COVID-19 Based on Multiple Models [J]. Computer Science, 2021, 48(6A): 196-202.
[4] LU Yao, CHEN Kai-yan, WANG Yin-long and SHANG Qian-yi. L3 Cache Attack Against Last Round of Encryption AES Table Lookup Method [J]. Computer Science, 2020, 47(6A): 375-380.
[5] HAN Yu, ZHANG Wen-zheng, DONG Xin-feng. Design and Analysis of Trapdoor S-Box Based on Linear Partition [J]. Computer Science, 2020, 47(11A): 368-372.
[6] ZHANG He-jie,MA Wei-hua. Subway Passenger Flow Forecasting Model Based on Temporal and Spatial Characteristics [J]. Computer Science, 2019, 46(7): 292-299.
[7] LV Dong-mei, LI Guo-dong. Spatial Encryption Algorithm Based on Double Chaos and Color Image [J]. Computer Science, 2019, 46(11A): 450-454.
[8] HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482.
[9] LIANG Yan-hui, LI Guo-dong, WANG Ai-yan. Frequency Domain Adaptive Image Encryption Algorithm Based on Fractional Order Chen Hyperchaos [J]. Computer Science, 2019, 46(11A): 488-492.
[10] LIANG Yan-hui, LI Guo-dong. Image Encryption Algorithm of Chaotic Cellular Automata Based on Fractional Hyperchaos [J]. Computer Science, 2019, 46(11A): 502-506.
[11] CHEN Gui-ping,WANG Zi-niu. Multiple Encrypted Storage Technology of User Information Based on Big Data Analysis [J]. Computer Science, 2018, 45(7): 150-153.
[12] ZHANG Yan. Research on Optimal Transportation Route Based on Chaos Optimization [J]. Computer Science, 2017, 44(Z6): 133-135.
[13] ZHANG Yue, SUN Hui-xiang, WEI Zheng-lei and HAN Bo. Chaotic Gray Wolf Optimization Algorithm with Adaptive Adjustment Strategy [J]. Computer Science, 2017, 44(Z11): 119-122.
[14] CAO Xiao-mei, CHEN Hai-shan and WANG Shao-hui. Method to Construct Secure S-boxes Based on Multimap [J]. Computer Science, 2017, 44(7): 107-110.
[15] WU Xiu-li and ZHOU Yong-quan. Improved Water Wave Optimization Algorithm Based on Chaos Optimization and Simplex Method [J]. Computer Science, 2017, 44(5): 218-225.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!