Abstract
In numerous encryption frameworks, the first information is changed into encoded form by applying nonlinear substitutions and affecting diffusion. The goal of the nonlinear change is to accomplish high level of randomness in the image content. The choice of the source of randomness is critical because the success in cryptanalysis is demarked by the characteristics identified in the encrypted data. The chaotic frameworks show random conduct that is suitable for encryption applications where nonlinear transformations are needed in the middle of plaintext and the scrambled information. The application of nonlinear functional chaos-based system with embedded chaotic systems and binary chaotic sequences can prompt randomness and diffusion in the information. In addition to the high state of randomness, the requirement for various round keys is needed in a run of the mill substitution–permutation process. The proposed strategy kills the requirement for different round keys, which is suitable for high-speed communication frameworks. The measurable analyses performed on the proposed nonlinear algorithm which show improvement in encryption quality and safety against numerous brute-force and statistical attacks. Also, the proposed framework demonstrates high safety against differential and linear cryptanalysis.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Change history
12 August 2024
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s00521-024-10341-9
References
Baptista MS (1998) Cryptography with chaos. Phys Lett A 240:50
Alvarez G, Montoya F, Romera M, Pastor G (2003) Cryptanalysis of a chaotic secure communication system. Phys Lett A 306:200
Alvarez G, Montoya F, Romera M, Pastor G (2000) Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys Lett A 276:191
Alvarez G, Montoya F, Romera M, Pastor G (2004) Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys Lett A 326:211
Adams C, Tavares S (1989) Good S-boxes are easy to find. In: Advances in cryptology: proceedings of CRYPTO_89. Lecture notes in computer science, pp 612–615
Webster AF, Tavares S (1986) On the design of S-boxes. In: Advances in cryptology: proceedings of CRYPTO_85. Lecture notes in computer science, pp 523–534
Detombe J, Tavares S (1992) On the design of S-boxes. In: Advances in cryptology: proceedings of CRYPTO_92. Lecture notes in computer science
Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72
Dawson M, Tavares S (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In: Advances in cryptology: proceedings of EURO-CRYPT_91. Lecture notes in computer science, pp 352–367)
Matsui M (1994) Linear cryptanalysis method of DES cipher: advances in cryptology. In: Proceeding of the Eurocrypt’93. Lecture notes in computer science, vol 765, pp 386–397
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379–423
Fatih Ö, Sırma Y (2013) Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn. doi:10.1007/s11071-013-0987-4
Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst 48:163–169
Khan M, Shah T, Mahmood H, Gondal MA, Hussain I (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70:2303–2311
Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71:489–492
Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73:1795–1801
Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn 76:377–382
Khan M, Shah T An efficient construction of substitution box with fractional chaotic system, signal, image and video processing. doi:10.1007/s11760-013-0577-4
Khan M, Shah T A novel image encryption technique based on Hénon chaotic map and S8 symmetric group. Neural Comput Appl. Springer. doi:10.1007/s00521-014-1663-4
Khan M, Shah T (2014) A novel statistical analysis of chaotic S-box in image encryption. 3D Res 5:16. doi:10.1007/s13319-014-0016-5
Khan M, Shah T, Batool IB (2014) Texture analysis of chaotic coupled map lattices based image encryption algorithm. 3D Res 5:19. doi:10.1007/s13319-014-0019-2
Khan M, Shah T (2015) A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J Intell Fuzzy Syst 28:1509–1517
Khan M, Shah T (2014) A copyright protection using watermarking scheme based on nonlinear permutation and its quality metrics. Neural Comput Appl. doi:10.1007/s00521-014-1747-1
Hussain I, Shah T, Gondal MA, Mahmood H (2013) Efficient method for designing chaotic S-boxes based on generalized Baker’s map and TDERC chaotic sequence. Nonlinear Dyn. doi:10.1007/s11071-013-0963-z
Rhouma R, Soumaya M, Safya B (2009) OCML-based colour image encryption. Chaos Solitons Fractals 40:309–318
Sahar M, Amir ME (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3):1745–1754
Liu HJ, Wang XY (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327
Qais HA, Arfoa AA (2011) Image encryption based on the general approach for multiple chaotic systems. J Signal Inform Process 2:238–244
Courtois N, Pieprzyk J (2002) Cryptanalysis of block ciphers with over defined systems of equations, advances in cryptology—Asiacrypt 2002, LNCS 2501. Springer, Berlin
Courtois N (2003) Fast algebraic attacks on stream ciphers with linear feedback, Crypto 2003. In: Boneh D (ed) Lecture notes in computer science, vol 2729. Springer, Berlin, pp 176–194
Meier W, Pasalic E, Carlet C (2004) Algebraic attacks and decomposition of Boolean functions, Eurocrypt 2004. In: Cachin C, Camenisch J (eds) Lecture notes in computer science, vol 3027. Springer, Berlin, pp 474–491
Kocher P (1996) Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. LNCS 1109. Springer, Berlin, pp 104–113
Prouff E (2005) DPA attacks and S-boxes. LNCS 3557. Springer, Berlin, pp 424–441
Author information
Authors and Affiliations
Corresponding author
About this article
Cite this article
Khan, M., Shah, T. & Batool, S.I. RETRACTED ARTICLE: Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput & Applic 27, 677–685 (2016). https://doi.org/10.1007/s00521-015-1887-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-015-1887-y