Abstract
An S-box is the most important part of a symmetric encryption algorithm. Various schemes are put forward by using chaos theory. In this paper, a construction method of S-boxes with good cryptographic properties is proposed. The output of an S-box can be regarded as a group of Boolean functions. Therefore, we can use the different properties of chaos and Bent functions to generate a random Bent function with a high nonlinearity. By constructing a set of Bent functions as the output of an S-box, we can create an S-box with good cryptological properties. The nonlinearity, differential uniformity, strict avalanche criterion and the independence criterion of output bits are then analyzed and tested. A security analysis shows that the proposed S-box has excellent cryptographic properties.
1. Introduction
With the rapid development of modern information technology, the popularity of computer and communication networks is more and more extensive. The problem of information security is becoming more and more prominent and is gradually becoming a problem that people cannot ignore. Information encryption technology plays an important role in modern information security communication, as a powerful weapon to protect the security of information. An S-box [1,2,3,4,5,6] is the only nonlinear component in many block cipher algorithms, which has the effect of scrambling the whole block cipher algorithm. Therefore, its cipher strength determines the security strength of the whole block cipher algorithm.
In recent years, many achievements have been made in the construction of chaotic S-boxes [7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30]. In 2018, Eesa et al. [31] proposed a new method to construct a strong cryptographic bijective S-box based on the complex dynamics of a new hyperchaotic system. Lambić [32] proposed an S-box design method based on an improved one-dimensional discrete chaotic map, which took advantage of the special case of Lambić’s chaotic map based on a permutation synthesis. In 2019, Zahid et al. [33] proposed an innovative technique to construct an S-box using cubic fractional transformation (CFT). Lu et al. [34] proposed a novel S-box design algorithm based on a new compound chaotic system, which was constructed by a concatenated Tent and Logistic chaotic system. In 2020, Chew et al. [35] proposed an S-box structure based on a linear fractional transformation and permutation function. Wang et al. [36] proposed a genetic algorithm for constructing biological S-boxes with a high nonlinearity. The main idea was to construct an S-box by combining the characteristics of a chaotic system and a swarm intelligence algorithm. Han et al. [37] superimposed the two chaotic maps Tent and Henon and introduced the idea of image scrambling into the design of the S-box, which enhanced the randomness of the key sequence of the ZUC stream cipher algorithm.
This paper presents an effective method to obtain chaotic S-boxes with important cryptographic properties. The principal innovation of this paper is to use a chaotic function to generate a chaotic Bent function [38,39,40,41]. This method considers that an S-box can be regarded as a group of Boolean functions. Therefore, we will design a finite number of random Bent functions by using the random distribution characteristics of logistic mapping. The output of several Bent functions then composes the S-box. In our research, the nonlinearity, differential uniformity, strict avalanche criterion and the independence criterion of output bits are analyzed and tested. A security analysis shows that the proposed S-box has important cryptographic properties.
Outline: in the second part, the definition and construction of the Bent function and the logistic discrete chaotic system are introduced. The third part introduces the construction method of the S-box based on the Bent function and logistic and the balancing method. The fourth part compares and analyzes the cryptographic characteristics of different S-box construction methods. Finally, in the fifth part, the paper is summarized.
2. Basic Knowledge
2.1. Bent Function
2.1.1. Definition of Boolean Function
Definition 1.
Let be a binary finite field and be a positive integer and the mapping be a Boolean function.
The algebraic normal form of an n-dimensional Boolean function:
If the set of all n-dimensional Boolean functions is recorded as , let . The number of is called the weight of the function , which is recorded as . If an n-dimensional Boolean function satisfies , then the function is said to be balanced.
Let , the Hamming distance of and , be defined as:
where represents the number of elements in set .
It is easy to find: .
2.1.2. Definition of a Bent Function
Let , the Fourier transform of function , be:
where , the inner product of , is defined as .
Definition 2.
Let , if for any , then is called a Bent function.
Let , then the Walsh transformation of is:
According to Definition 2 and Formula (4), if satisfies , then is a Bent function.
2.1.3. Maiorana MC Farland Type Multi Output Bent Function
The Maiorana MC Farland type Bent function is one of the most well-known basic construction types of Bent function. Rothaus [42], Maiorana, MC Farland [43] and Dillon [44] have made in-depth studies on the construction of this type of Bent function.
If are positive integers, then functions can be expressed as a set of Boolean functions, and function can be called multiple output Boolean functions, where is called the coordinate function of .
Definition 3.
If the Boolean function has the form of Formula (5), then is called the Maiorana MC Farland type Bent function.
If all are Maiorana MC Farland type Bent functions, is called the Maiorana MC Farland type multi output Bent function.
2.2. Logistic Discrete Chaotic System
The proposed algorithm is based on the Bent functions incorporating chaos. We employed a one-dimensional logistic chaotic map due to its simplicity. The difference iteration equation of the logistic chaotic map is expressed as:
In the formula (7), the initial value and system parameter is of the logistic chaotic map. The dynamic behavior of the logistic chaotic map is closely related to the system parameter .
The bifurcation characteristics of a logistic chaotic map are shown in Figure 1, which shows the two-dimensional relationship between the numerical distribution of the iterative chaotic sequence and the system parameter . Previous studies have shown that when , most of the Lyapunov exponents of logistic chaotic maps are greater than 0 and they are in a chaotic state. At this time, with the increase of the value, the complexity of its dynamic behavior increases and the logistic map reaches the chaotic state through periodic doubling. In this range, there are several times when the Lyapunov exponent is less than 0. In this case, a period window will appear; that is, the mapping oscillates between certain values. Only when the system parameter will the iterative values be mapped to the whole [0,1] interval, which is called the full mapping state.
Figure 1.
Bifurcation characteristics of a logistic chaotic map.
The two-dimensional phase diagram of a logistic chaotic map is shown in Figure 2. When , the logistic chaotic map is in the shape of a steel helmet and its iterative values are distributed in the [0,1] interval. As the number of iterations increases, the chaotic trajectory becomes unpredictable and spreads to the whole phase space. Therefore, based on the above characteristics of the logistic chaotic map, we chose to construct our discrete chaotic system.
Figure 2.
The two-dimensional phase diagram of a logistic chaotic map.
2.2.1. Randomness Test
The randomness of digital chaotic sequences is an important index. The special publication 800-22 test set published by NIST was used to detect the different properties of random sequences. The test set has become the basic standard of sequence randomness testing and has been adopted by many chaotic sequence researchers. In this paper, the threshold quantization method was used to quantify the logistic chaotic system. The NIST randomness test was carried out on the generated digital chaotic sequence and the influence of system parameters and sequence length on the randomness performance was studied so as to provide a theoretical support for the construction of a digital chaotic sequence in an S-box.
Every index of NIST testing was obtained through a certain testing algorithm. Whether the value of each index was greater than or equal to 0.01 was taken as the test result. If the value met the test requirements, the specific value would be displayed. If the p value did not meet the test requirements, it would be displayed as “”. A larger p value indicated a better randomness of the tested sequence. Considering the size of running memory and the speed of running, the sample size was 100 and the test length was 1000 and 10,000 bits, respectively. To avoid contingency, three parameters of the system were selected for the logistic chaotic mapping.
The NIST test results of the logistic chaotic map under three sets of system parameters are shown in Table 1. When and , digital chaotic sequences of 1000 and 10,000 bits could pass ten NIST tests; when , digital chaotic sequences of 1000 bits could pass ten NIST tests while the digital chaotic sequences of 10,000 bits could only pass three NIST tests.
Table 1.
NIST test of a logistic chaotic map threshold quantization.
A NIST test showed that the one-dimensional discrete chaotic map logistic could achieve a better quantization effect when it was close to the full map and its random performance gradually decreased with the decrease of system parameters and the increase of the sequence length. Therefore, this paper chose to construct a logistic discrete chaotic system, which could meet the requirement of the randomness of a digital sequence.
3. Construction of an S-Box Based on a Bent Function and a Logistic Chaotic System
3.1. The Construction of a Multi Output Bent Function Based on a Logistic Chaotic System
The main idea of this method was to construct a pseudo-random sequence generator by using the advantages of logistic mapping such as a high complexity, large parameter space and sensitivity to initial values. A large number of pseudo-random sequences with a good performance and great difference could be obtained by slightly changing the initial values and parameters. The pseudo-random sequence was quantized into a binary sequence to construct the Maiorana MC Farland type Bent function and then the highly nonlinear S-box was constructed.
The threshold quantization method was used in the selection of the value quantization method of the chaotic sequence. The specific quantization method can be expressed as the chaotic value in the interval (0,0.5) is quantized as 0 and the value in the interval [0.5,1) is quantized as 1. In Section 2.2.1, we tested the digital sequence generated by the threshold quantization method with NIST and the results showed that the sequence generated when met the requirement of randomness. The quantized binary sequence was taken as the constants and coefficients of in Equation (8).
Based on the Boolean function constructed by a chaotic sequence, eight Bent functions were constructed as the output of an 8 ∗ 8 S-box.
3.2. Balancing Method
The S-box constructed in Section 3.1 did not meet the balance requirements. Therefore, the S-box needed to be processed.
The first step was to traverse all of the elements in the S-box. All duplicate outputs were found and all elements with the same output except the first element were replaced with 256.
The second step was to store the elements that did not exist in the S-box in the array . was the element in .
Finally, we filled the elements in array into the elements containing 256 in turn.
3.3. Construction of Chaotic S-Boxes with a High Nonlinearity
The structure of an S-box module based on an Maiorana MC Farland type Bent function and a discrete chaotic system is shown in Figure 3.
Figure 3.
An S-box generation module based on the Bent function and discrete chaotic system.
According to the above method, the S-box generated based on a logistic chaotic system and a Bent function output is shown in Table 2. When the input was 00101000, the first four bits 0010 were 2 and the last four bits 1000 were 8. The corresponding output was the second row and the eighth column in the Table. The output data 1E were converted into the 8-bit binary number 00011110.
Table 2.
The chaotic S-box based on a Bent function.
4. Performance Analysis of an S-Box
4.1. Nonlinearity
The nonlinearity of the Boolean function refers to the distance between the Boolean function and the affine function. In order to resist the attack of linear cryptography, the distance between the Boolean function and the affine function should be as large as possible. The nonlinearity represented by the Walsh cyclic spectrum is defined as:
It can be seen from the results in Table 3 that Ni was the nonlinearity of the Boolean function corresponding to each bit of the S-box. Compared with the S-box constructed by other chaotic systems, the proposed method had a higher than average nonlinearity. It could better resist the attack of optimal linear approximation.
Table 3.
The nonlinearity of an S-box.
4.2. Differential Uniformity
The uniformity of differential distribution is an important security index of the cryptographic function. The success of a differential cryptoanalysis is realized by the nonuniformity of the differential distribution of the Boolean function. The better the uniformity of difference, the stronger the ability to resist a differential attack. The index used to describe the uniformity of the differential distribution of the Boolean function is the differential uniformity. Generally, the differential approximation probability is used to describe the input/output XOR distribution of .
The smaller the difference uniformity , the higher the security of the S-box.
The following conclusion can be drawn from Table 4. It can be seen from Table 4a that the maximum value was 10 except in the first row and first column in the difference distribution table of the S-box in this paper. As can be seen from Table 4b, compared with other chaotic S-boxes, the differential approximation probability of the S-box in this paper was moderate, which showed that the S-box had a strong ability to resist a differential attack.
Table 4.
The differential uniformity of an S-box.
4.3. Strict Avalanche Criterion
The strict avalanche criterion is used to measure the randomness of the input change of an S-box to the output change. The avalanche characteristics indicates that if any bit in the input vector is flipped, the probability of the output bit flipping is close to 0.5 and then the S-box satisfies the strict avalanche criterion.
The following conclusions can be drawn from Table 5. Table 5a shows that there was no case where the input changed but the output did not change. As can be seen from Table 5b, compared with other chaotic S-boxes, the average value of the correlation matrix was closer to 0.5 so the S-boxes proposed in this paper satisfied more strict avalanche criteria than the others.
Table 5.
The strict avalanche criterion of an S-box.
4.4. Independence Criterion of Output Bits
The method of measuring the output bit independence of an S-box was first proposed by Adams [45]. The definition of correlation is as follows. For the two output bits and of an S-box. If is highly nonlinear and satisfies the correlation requirement of the strict avalanche effect, the correlation coefficient of each output bit pair is close to 0 when one input bit is reversed. Therefore, the BIC performance of an S-box can be measured by calculating the nonlinearity of and its satisfaction to SAC.
The following conclusions can be drawn from Table 6. From the nonlinear values of the matrix in Table 6a, we could see that the S-box satisfied the nonlinear characteristics. The elements of the matrix in Table 6b were closer to 0.5 so the S-box in this paper satisfied the strict avalanche effect more than other chaotic S-boxes. Compared with other chaotic S-boxes in Table 6c, the proposed S-box had excellent output bit independence.
Table 6.
The independence criterion of output bits of an S-box.
5. Conclusions
In this paper, we proposed the chaotic S-boxes to be used in symmetric encryption algorithms. The logistic chaotic map was employed along with Bent functions to give the elements of the S-boxes. This method made full use of the properties of chaotic functions. Logistic mapping was mainly used to generate Bent functions with high nonlinear values. We verified several security analyses such as nonlinearity, difference uniformity, strict avalanche criterion and the independence criterion of output bits. The results of the obtained S-box showed that all of the criteria for a good S-box were approximately fulfilled.
Author Contributions
Conceptualization, methodology, data curation, writing—original draft preparation, Z.J.; supervision, project administration, Q.D.; Both authors have read and agreed to the published version of the manuscript.
Funding
This work is supported financially by National Natural Science Foundation of China (No. 61471158).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
All comparative data indicators can be found in the reference.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Fan, M.H.; Yang, F.F. Dynamic S-box construction based on chaotic map in block cIPher. Radio Eng. 2016, 46, 33–36. [Google Scholar]
- Zang, H.Y.; Huang, H.F. Research on Algorithm of generating S-box based on homogenized chaotic system. J. Electron. Inf. 2017, 39, 575–581. [Google Scholar]
- Zhu, H.H.; Tong, X.J.; Zhang, M. A novel method of designing S-box based on dynamic compound chaotic system. J. Nanjing Univ. Nat. Sci. 2018, 54, 543–547. [Google Scholar]
- Praveen, A.; Amandeep, S.; Adem, K. Development of key-dependent dynamic S-boxes with dynamic irreducible polynomial and affine constant. Adv. Mech. Eng. 2018, 10, 1687814018781638. [Google Scholar]
- Wang, J.; Pan, B.W.; Tang, C.; Ding, Q. Construction Method and Performance Analysis of Chaotic S-box Based on Fireworks Algorithm. Int. J. Bifurc. Chaos 2019, 29, 1950158. [Google Scholar] [CrossRef]
- Ahmad, M.; Solami, E.A. Evolving Dynamic S-boxes Using Fractional-Order Hopfield Neural Network Based Scheme. Entropy 2020, 22, 717. [Google Scholar] [CrossRef] [PubMed]
- Islam, F.U.; Liu, G. Designing S-box Based on 4D-4Wing Hyperchaotic System. 3D Res. 2017, 8, 9. [Google Scholar] [CrossRef]
- Özkaynak, F.; Özer, A.B. A method for designing strong S-boxes based on chaotic Lorenz system. Phys. Lett. A 2010, 374, 3733–3738. [Google Scholar] [CrossRef]
- Khan, M.; Shah, T.; Mahmood, H.; Gondal, M.A. An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn. 2012, 71, 489–492. [Google Scholar] [CrossRef]
- Khan, M.; Shah, T. An efficient construction of S-box with fractional chaotic system. Signal Image Video Process. 2013, 9, 1335–1338. [Google Scholar] [CrossRef]
- Liu, G.; Yang, W.; Liu, W.; Dai, Y. Designing S-boxes based on 3-D four-wing autonomous chaotic system. Nonlinear Dyn. 2015, 82, 1867–1877. [Google Scholar] [CrossRef]
- Özkaynak, F.; Çelik, V.; Öze, A.B. A new S-box construction method based on the fractional-order chaotic Chen system. Signal Image Video Process. 2016, 11, 659–664. [Google Scholar] [CrossRef]
- Çavuşoğlu, Ü.; Pehlivan, I.; Zengin, A.; Kaçar, S. A novel approach for strong S-box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn. 2016, 87, 1081–1094. [Google Scholar] [CrossRef]
- Belazi, A.; Khan, M.; Abd El-Latif, A.A.; Belghith, S. Belghith. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn. 2016, 87, 337–361. [Google Scholar] [CrossRef]
- Özkayna, F. Construction of robust S-boxes based on chaotic systems. Neural Comput. Appl. 2017, 31, 3317–3326. [Google Scholar] [CrossRef]
- Ullah, A.; Jamal, S.S.; Shah, T. A novel scheme for image encryption using S-box and chaotic system. Nonlinear Dyn. 2017, 91, 359–370. [Google Scholar] [CrossRef]
- Farwa, S.; Muhammad, N.; Shah, T.; Ahmad, S. A Novel Image Encryption Based on Algebraic S-box and Arnold Transform. 3D Res. 2017, 8, 26. [Google Scholar] [CrossRef]
- Ahmad, M.; Bhatia, D.; Hassan, Y. A Novel Ant Colony Optimization Based Scheme for S-box Design. Procedia Comput. Sci. 2015, 57, 572–580. [Google Scholar] [CrossRef]
- Abdul, R.; Awais, Y.; Umer, S.; Nasir, S.; Atta, U.; Adil, W. A Novel Construction of S-box Involving Coset Diagram and a Bijective Map. Secur. Commun. Netw. 2017, 2017, 5101934. [Google Scholar]
- Khan, M.; Asghar, Z. A novel construction of S-box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput. Appl. 2016, 29, 993–999. [Google Scholar] [CrossRef]
- Jamal, S.S.; Khan, M.U.; Shah, T. A Watermarking Technique with Chaotic Fractional S-box Transformation. Wirel. Pers. Commun. 2016, 90, 2033–2049. [Google Scholar] [CrossRef]
- Khan, M.; Shah, T.; Batool, S.I. A new implementation of chaotic S-boxes in CAPTCHA. Signal Image Video Process. 2015, 10, 293–300. [Google Scholar] [CrossRef]
- Khan, M.; Shah, T.; Batool, S.I. Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput. Appl. 2015, 27, 677–685. [Google Scholar] [CrossRef]
- Anees, A.; Ahmed, Z. A Technique for Designing S-box Based on Van der Pol Oscillator. Wirel. Pers. Commun. 2015, 82, 1497–1503. [Google Scholar] [CrossRef]
- Gu, X.C.; Ding, W.X. A S-box construction algorithm based on chaotic Lorenz system. J. Chongqing Univ. Technol. 2013, 27, 97–103. [Google Scholar]
- Tao, T. Research and Implementation of Block Cryptography S-Boxes Based on Chaos. Master’s Thesis, Xi’an Electronic and Science University, Xi’an, China, 2011. [Google Scholar]
- Han, D.D.; Zang, H.Y.; Min, L.Q. Designof S-box based on theorem of generalized synchronization for discrete chaos systems. Comput. Engin. Des. 2014, 35, 11–16. [Google Scholar]
- Farah, T.; Rhouma, R.; Belghith, S. A novel method for designing S-box based on chaotic map and Teaching-Learning-Based Optimization. Nonlinear Dyn. 2017, 88, 1059–1074. [Google Scholar] [CrossRef]
- Khan, M.; Shah, T.; Mahmood, H.; Gondal, M.; Hussain, I. A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn. 2012, 70, 2303–2311. [Google Scholar] [CrossRef]
- Yin, X.F.; Yuan, X.X. On construction algorithm of strong S-boxes based on linear transformation coupling chaotic system. Comput. Appl. Softw. 2015, 32, 304–323. [Google Scholar]
- Eesa, A.S.; Musheer, A.; Christos, V.; Mohammad, D.; Mirza, B. A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes. Entropy 2018, 20, 525–541. [Google Scholar]
- Lambić, D. S-box design method based on improved onedimensional discrete chaotic map. J. Inf. Telecommun. 2018, 2, 181–191. [Google Scholar]
- Zahid, A.H.; Arshad, M.J.; Ahmad, M. A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation. Entropy 2019, 21, 245. [Google Scholar] [CrossRef]
- Lu, Q.; Zhu, C.; Wang, G. A Novel S-box Design Algorithm Based on a New Compound Chaotic System. Entropy 2019, 21, 1004. [Google Scholar] [CrossRef]
- Chew, L.C.N.; Ismai, E.S. S-box Construction Based on Linear Fractional Transformation and Permutation Function. Symmetry 2020, 12, 826. [Google Scholar] [CrossRef]
- Wang, Y.; Zhang, Z.Q.; Zhang, L.Y.; Feng, J.; Gao, J.; Lei, P. A genetic algorithm for constructing bijective S-boxes with high nonlinearity. Inf. Sci. 2020, 523, 152–166. [Google Scholar] [CrossRef]
- Han, Y.Y.; He, Y.R.; Liu, P.H.; Zhang, D.; Wang, Z.Q.; He, W.C. Construction and application of ZUC dynamic S-box based on chaotic system. Comput. Res. Dev. 2020, 10, 2147–2157. [Google Scholar]
- Pasalic, E.; Zhang, W.G. On multiple output Bent functions. Inf. Process. Lett. 2012, 112, 811–815. [Google Scholar] [CrossRef]
- Nyberg, K. Perfect nonlinear S-boxes. In Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, 8 April 1991; pp. 378–386. [Google Scholar]
- Dobbertin, H. Construction of Bent functions and balanced Boolean functions with high nonlinearity. In International Workshop on Fast Software Encryption; Springer: Berlin/Heidelberg, Germany, 1994; pp. 61–74. [Google Scholar]
- Seberry, J.; Zhang, X.M.; Zheng, Y. Nonlinearity and propagation characteristics of balanced Boolean functions. Inf. Comput. 1995, 119, 1–13. [Google Scholar] [CrossRef]
- Rothaus, O.S. On “Bent” functions. J. Comb. Theory 1976, 20, 300–305. [Google Scholar] [CrossRef]
- Mcfarland, R.L. A family of difference sets in non-cyclic groups. J. Comb. Theory 1973, 15, 1–10. [Google Scholar] [CrossRef]
- Dillon, J.F. Elementary Hadamard Difference Sets. Ph.D. Thesis, University of Maryland, College Park, MD, USA, 1974; pp. 36–65. [Google Scholar]
- Adams, C.; Tavares, S. Good S-boxes are easy to find. In CRYPTO ’89: Proceedings On Advances In Cryptology; Springer: New York, NY, USA, 1989. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).