A Novel Approach for Designing Dynamical S-Boxes Using Hyperchaotic System

Author(s):  
Jun Peng ◽  
Du Zhang ◽  
Xiaofeng Liao

In the information security field, the substitution boxes (S-boxes) have been extensively used in many cryptographic systems. This paper presents a novel approach for generating dynamically cryptographically S-boxes using a four-dimensional hyperchaotic Lorenz system. Within the algorithm, the initial condition is employed to drive the hyper-chaotic system to generate a chaotic sequence which is used to construct a chaotic key-dependent S-box. With different system initial conditions, many of distinct S-boxes can be obtained dynamically. Some cryptographic properties for a good S-box such as bijection, nonlinearity, SAC (Strict Avalanche Criterion), BIC (Bit Independence Criterion), and differential approximation probability are found to hold in the obtained S-boxes. The analytic results indicated that all the criteria for designing strong S-boxes can be achieved. The comparison of the proposed method for generating S-boxes with other chaos-based schemes indicates that our S-boxes have a better performance with respect to some properties. Finally, the authors give an example of a digital image encryption algorithm using their S-box and the results of image statistical analysis show that the algorithm has the desirable cryptographic properties.

2020 ◽  
Vol 2020 ◽  
pp. 1-12 ◽  
Author(s):  
F. J. Farsana ◽  
K. Gopakumar

With the advancement in modern computational technologies like cloud computing, there has been tremendous growth in the field of data processing and encryption technologies. In this contest there is an increasing demand for successful storage of the data in the encrypted domain to avoid the possibility of data breach in shared networks. In this paper, a novel approach for speech encryption algorithm based on quantum chaotic system is designed. In the proposed method, classical bits of the speech samples are initially encoded in nonorthogonal quantum state by the secret polarizing angle. In the quantum domain, encoded speech samples are subjected to bit-flip operation according to the Controlled–NOT gate followed by Hadamard transform. Complete superposition of the quantum state in both Hadamard and standard basis is achieved through Hadamard transform. Control bits for C-NOT gate as well as Hadamard gate are generated with a modified Lu˙-hyperchaotic system. Secret nonorthogonal rotation angles and initial conditions of the hyperchaotic system are the keys used to ensure the security of the proposed algorithm. The computational complexity of the proposed algorithm has been analysed both in quantum domain and classical domain. Numerical simulation carried out based on the above principle showed that the proposed speech encryption algorithm has wider keyspace, higher key sensitivity and robust against various differential and statistical cryptographic attacks.


2008 ◽  
Vol 22 (19) ◽  
pp. 1859-1865 ◽  
Author(s):  
XINGYUAN WANG ◽  
DAHAI NIU ◽  
MINGJUN WANG

A nonlinear active tracking controller for the four-dimensional hyperchaotic Lorenz system is designed in the paper. The controller enables this hyperchaotic system to track all kinds of reference signals, such as the sinusoidal signal. The self-synchronization of the hyperchaotic Lorenz system and the different-structure synchronization with other chaotic systems can also be realized. Numerical simulation results show the effectiveness of the controller.


2011 ◽  
Vol 25 (05) ◽  
pp. 711-721 ◽  
Author(s):  
CHAO MA ◽  
XINGYUAN WANG

This paper presents a novel unified hyperchaotic system that contains the hyperchaotic Lorenz system and the hyperchaotic Chen system as two dual systems at the two extremes of its parameter spectrum. The new system is hyperchaotic over almost the whole range of the system parameter and continuously transfers from the hyperchaotic Lorenz system to the hyperchaotic Chen system. The new findings are not only demonstrated by computer simulations but also verified with bifurcation analysis, Lyapunov exponents and Lyapunov dimension.


Complexity ◽  
2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Taiyong Li ◽  
Minggao Yang ◽  
Jiang Wu ◽  
Xin Jing

In the era of the Internet, image encryption plays an important role in information security. Chaotic systems and DNA operations have been proven to be powerful for image encryption. To further enhance the security of image, in this paper, we propose a novel algorithm that combines the fractional-order hyperchaotic Lorenz system and DNA computing (FOHCLDNA) for image encryption. Specifically, the algorithm consists of four parts: firstly, we use a fractional-order hyperchaotic Lorenz system to generate a pseudorandom sequence that will be utilized during the whole encryption process; secondly, a simple but effective diffusion scheme is performed to spread the little change in one pixel to all the other pixels; thirdly, the plain image is encoded by DNA rules and corresponding DNA operations are performed; finally, global permutation and 2D and 3D permutation are performed on pixels, bits, and acid bases. The extensive experimental results on eight publicly available testing images demonstrate that the encryption algorithm can achieve state-of-the-art performance in terms of security and robustness when compared with some existing methods, showing that the FOHCLDNA is promising for image encryption.


Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1066
Author(s):  
Khalid M. Hosny ◽  
Sara T. Kamal ◽  
Mohamed M. Darwish ◽  
George A. Papakostas

In the age of Information Technology, the day-life required transmitting millions of images between users. Securing these images is essential. Digital image encryption is a well-known technique used in securing image content. In image encryption techniques, digital images are converted into noise images using secret keys, where restoring them to their originals required the same keys. Most image encryption techniques depend on two steps: confusion and diffusion. In this work, a new algorithm presented for image encryption using a hyperchaotic system and Fibonacci Q-matrix. The original image is confused in this algorithm, utilizing randomly generated numbers by the six-dimension hyperchaotic system. Then, the permutated image diffused using the Fibonacci Q-matrix. The proposed image encryption algorithm tested using noise and data cut attacks, histograms, keyspace, and sensitivity. Moreover, the proposed algorithm’s performance compared with several existing algorithms using entropy, correlation coefficients, and robustness against attack. The proposed algorithm achieved an excellent security level and outperformed the existing image encryption algorithms.


Entropy ◽  
2019 ◽  
Vol 21 (3) ◽  
pp. 245 ◽  
Author(s):  
Amjad Zahid ◽  
Muhammad Arshad ◽  
Musheer Ahmad

A symmetric block cipher employing a substitution–permutation duo is an effective technique for the provision of information security. For substitution, modern block ciphers use one or more substitution boxes (S-Boxes). Certain criteria and design principles are fulfilled and followed for the construction of a good S-Box. In this paper, an innovative technique to construct substitution-boxes using our cubic fractional transformation (CFT) is presented. The cryptographic strength of the proposed S-box is critically evaluated against the state of the art performance criteria of strong S-boxes, including bijection, nonlinearity, bit independence criterion, strict avalanche effect, and linear and differential approximation probabilities. The performance results of the proposed S-Box are compared with recently investigated S-Boxes to prove its cryptographic strength. The simulation and comparison analyses validate that the proposed S-Box construction method has adequate efficacy to generate efficient candidate S-Boxes for usage in block ciphers.


Sign in / Sign up

Export Citation Format

Share Document