2008
DOI: 10.4218/etrij.08.0207.0188
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Simple Method for Designing Chaotic S-Boxes

Abstract: A substitution box (S‐box) plays a central role in cryptographic algorithms. In this paper, an efficient method for designing S‐boxes based on chaotic maps is proposed. The proposed method is based on the mixing property of piecewise linear chaotic maps. The S‐box so constructed has very low differential and linear approximation probabilities. The proposed S‐box is more secure against differential and linear cryptanalysis compared to recently proposed chaotic S‐boxes.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
33
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 65 publications
(34 citation statements)
references
References 7 publications
1
33
0
Order By: Relevance
“…Besides, Figure 5 depicts the statistical results of the LP of comparison algorithms. These results show that the LP of the proposed S-box is not worse than that of algorithms in [25,26,28,30,32,34,37,38,41]. Furthermore, Table 6 summarizes the above-mentioned evaluating criteria results of the experimental algorithms.…”
Section: Linear Approximation Probability Analysismentioning
confidence: 78%
See 1 more Smart Citation
“…Besides, Figure 5 depicts the statistical results of the LP of comparison algorithms. These results show that the LP of the proposed S-box is not worse than that of algorithms in [25,26,28,30,32,34,37,38,41]. Furthermore, Table 6 summarizes the above-mentioned evaluating criteria results of the experimental algorithms.…”
Section: Linear Approximation Probability Analysismentioning
confidence: 78%
“…To verify the generated S-box, we analyze its cryptographic criteria and compare it with many other S-boxes designed in [6][7][8][9][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41]. Moreover, our experimental environment is i3 CPU 540 3.07 GHz, memory 2.00 GHz Inter Core, Matlab2012b.…”
Section: Cryptographic Criteria Analyses Of Proposed S-boxmentioning
confidence: 99%
“…l ¼ 2 and f 1 ; f 2 ; f 3 ; f 4 are the bijective chaotic S-boxes from [2,3,15,16], respectively, and if f 5 is the AES S-box, then the S-box from Table 2 is found. In the S-box from [2], error was corrected by replacing the value 14 by 149.…”
Section: Example Of S-box Generated With Proposed Approachmentioning
confidence: 99%
“…In the S-box from [2], error was corrected by replacing the value 14 by 149. Also, in the S-box from [15] error was corrected by replacing the value 242 by 241. These corrections have been made to eliminate repeated values from the S-boxes that influenced their bijective property.…”
Section: Example Of S-box Generated With Proposed Approachmentioning
confidence: 99%
See 1 more Smart Citation