A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm
- PDF / 579,601 Bytes
- 18 Pages / 439.37 x 666.142 pts Page_size
- 86 Downloads / 221 Views
A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm Hussam S. Alhadawi 1,2
3
4
& Mazlina Abdul Majid & Dragan Lambić & Musheer Ahmad
5
Received: 9 November 2018 / Revised: 29 January 2020 / Accepted: 7 October 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to achieve the property of confusion in modern symmetric ciphers and offer resistance to cryptanalysis. The construction of strong S-boxes has gained considerable attention in the area of cryptography. In fact, the security of transmitted data is highly dependent on the strength of the S-boxes for the prevention of unauthorised access. Therefore, the creation of strong S-box with high nonlinearity score has been considered a significant challenge. This study presented a novel method for the designing of 8 × 8 S-boxes with selected cryptographic characteristics based on a cuckoo search (CS) algorithm and discretespace chaotic map. Notably, the advantage of the proposed approach is indicated through the efficient randomisation and lower adjustable parameters in CS compared to GA and PSO. Also, this approach utilised a 1D discrete-space chaotic map with virtually unlimited key space to design initial S-boxes, which is another advantage over the methods based on continuous-space chaotic maps, which consist of the limited key space. Moreover, chaotic maps have a potential to overcome the trapping problem of a standard CS in the local optima, and they were used to generate initial S-boxes to achieve the desired quality and facilitate the metaheuristic search. Accordingly, the metaheuristic CS was used to find a notable S-box configuration which fulfilled the established criteria. This objective was achieved by searching for the optimal or near-optimal features which maximised the given fitness function. The performance of the proposed method was evaluated based on the established performance evaluation criteria, including bijectivity, nonlinearity, strict avalanche criteria, bit independence criteria, differential uniformity, and linear probability. Based on the results of proposed method performance was benchmarked against the results of the recently developed S-boxes, it was indicated that the S-boxes exhibited good cryptographic features and could resist various cryptanalysis attacks. Keywords S-boxes . CS optimization . Chaos . Cryptography
* Hussam S. Alhadawi [email protected] Extended author information available on the last page of the article
Multimedia Tools and Applications
1 Introduction Cryptography is among the approaches implemented as a common way of safeguarding sensitive information for thousands of years, such as military and diplomatic communications. One of the common but critical components of cryptographic systems is the substitution boxes (S-boxes), with block cipher being the most common type of cipher system which uses the Sboxes [49]. Furthermore, the safety of most block cip
Data Loading...