True-chaotic substitution box based on Boolean functions

  • PDF / 2,626,956 Bytes
  • 17 Pages / 439.37 x 666.142 pts Page_size
  • 54 Downloads / 169 Views

DOWNLOAD

REPORT


True-chaotic substitution box based on Boolean functions Iqtadar Hussaina Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar Received: 19 April 2020 / Accepted: 3 August 2020 © Società Italiana di Fisica and Springer-Verlag GmbH Germany, part of Springer Nature 2020

Abstract With the exponential increase in communication sector, the risk of information management also increases. Although there is enormous input from the cybersecurity perspective, still a lot must be done. The substitution box is the most vital component in symmetric encryption algorithms, and various proposals have been presented using chaos. Unfortunately, the full potential of chaos in constructing substitution boxes has not been exploited before. In this paper, we have constructed strong and robust substitution boxes based on Boolean functions incorporating chaos. First, we have developed a new algebraic structure based on the Boolean functions. Second, we have incorporated logistic chaotic map with the proposed algebraic structure to construct strong and robust true-chaotic S-Boxes. Third, the constructed S-Boxes are tested against statistical and security analysis including linear and differential cryptanalysis to demonstrate their strength and robustness. The simulation results and analysis demonstrated that the constructed substitution boxes can resist wellknown attacks. Finally, we have done the comparative analysis for statistical, security and cryptanalysis with other well-known works to demonstrate the superiority of our work.

1 Introduction There is exponential increase in communication technologies, especially in wireless medium. The fifth generation implemented in today’s age has really shrunk the world [1, 2]. The best part is that the growth in wireless communication is not stopping at all; instead, there is tremendous advancement in wireless generations such as with seventh generation. Further, the growth is not only in wide area networks of wireless sector such as cellular communication network, but also in local area networks such as Wi-Fi, Bluetooth and Zigbee. The Internet of things and its vast applications in the areas of smart homes, power grid, health care, banking and so on are one of the examples of the growth in the wireless communications. With this progress and evolution, wireless communication channel possesses serious security issues [3–6]. The need of reliability and security is much more in wireless channel as compared to wired one because it is more prone to errors and easier to hack [7]. The reliability can be provided by utilizing sophisticated error detection and correction schemes [8]. For security, there are several domains which need a lot of attention, from network to data itself. To secure end-to-end systems, cultured encryption algorithms can be employed [9–11]. The Advanced

a e-mail: [email protected] (corresponding author)

0123456789().: V,-vol

123

663

Page 2 of 17

Eur. Phys. J. Plus

(2020) 135:663

Encryption Standard (AES) [12] is widely used encryption