메뉴 건너뛰기




Volumn 70, Issue 3, 2012, Pages 2303-2311

A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems

Author keywords

Chaos; Lorenz system; Substitution box

Indexed keywords

CHAOTIC LORENZ SYSTEM; CRYPTOGRAPHIC SYSTEMS; DIFFERENTIAL APPROXIMATIONS; DIFFERENTIAL CRYPTANALYSIS; LINEAR APPROXIMATIONS; LORENZ SYSTEM; NONLINEAR MAPPINGS; NONLINEARITY ANALYSIS; NOVEL TECHNIQUES; PLAINTEXT; ROUND KEY; S-BOXES; SECURE DATA; STRICT AVALANCHE; SUBSTITUTION BOXES; SUBSTITUTION SYSTEMS; SUBSTITUTION-PERMUTATION NETWORKS;

EID: 84870945374     PISSN: 0924090X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11071-012-0621-x     Document Type: Article
Times cited : (152)

References (41)
  • 1
    • 4243121393 scopus 로고
    • Advances in cryptology: Proceedings of CRYPTO
    • Adams, C., Tavares, S.: In: Advances in Cryptology: Proceedings of CRYPTO. Lect. Notes. Comput., vol. 89, pp. 612-615 (1989)
    • (1989) Lect. Notes. Comput. , vol.89 , pp. 612-615
    • Adams, C.1    Tavares, S.2
  • 2
    • 0345303927 scopus 로고    scopus 로고
    • Cryptanalysis of a discrete chaotic cryptosystem using external key
    • Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys. Lett. A 319, 334-339 (2000)
    • (2000) Phys. Lett. A , vol.319 , pp. 334-339
    • Alvarez, G.1    Montoya, F.2    Romera, M.3    Pastor, G.4
  • 3
    • 0037421353 scopus 로고    scopus 로고
    • Cryptanalysis of a chaotic secure communication system
    • Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a chaotic secure communication system. Phys. Lett. A 306, 200-205 (2003)
    • (2003) Phys. Lett. A , vol.306 , pp. 200-205
    • Alvarez, G.1    Montoya, F.2    Romera, M.3    Pastor, G.4
  • 4
    • 0345303927 scopus 로고    scopus 로고
    • Cryptanalysis of a discrete chaotic cryptosystem using external key
    • Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys. Lett. A 319, 334-339 (2003)
    • (2003) Phys. Lett. A , vol.319 , pp. 334-339
    • Alvarez, G.1    Montoya, F.2    Romera, M.3    Pastor, G.4
  • 5
    • 2442662577 scopus 로고    scopus 로고
    • Cryptanalysis of dynamic look-up table based chaotic cryptosystems
    • Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys. Lett. A 326, 211-218 (2004)
    • (2004) Phys. Lett. A , vol.326 , pp. 211-218
    • Alvarez, G.1    Montoya, F.2    Romera, M.3    Pastor, G.4
  • 6
    • 68749105566 scopus 로고    scopus 로고
    • Comments on "modified Baptista type chaotic cryptosystem via matrix secret key"
    • [Phys. Lett. A 372 (2008) 5427]
    • Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Comments on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]. Phys. Lett. A 373, 3398-3400 (2009)
    • (2009) Phys. Lett. A , vol.373 , pp. 3398-3400
    • Alvarez, G.1    Montoya, F.2    Romera, M.3    Pastor, G.4
  • 7
    • 0042786512 scopus 로고    scopus 로고
    • Cryptography with chaos
    • Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240, 50-54 (1998)
    • (1998) Phys. Lett. A , vol.240 , pp. 50-54
    • Baptista, M.S.1
  • 8
    • 0026397734 scopus 로고
    • Differential cryptanalysis of DESlike cryptosystems
    • Biham, E., Shamir, A.: Differential cryptanalysis of DESlike cryptosystems. J. Cryptol. 4(1), 3-72 (1991)
    • (1991) J. Cryptol. , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 9
    • 33747348397 scopus 로고    scopus 로고
    • An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
    • Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos Solitons Fractals 31, 571-577 (2007)
    • (2007) Chaos Solitons Fractals , vol.31 , pp. 571-577
    • Chen, G.1    Chen, Y.2    Liao, X.3
  • 10
    • 85020558749 scopus 로고
    • Advances in cryptology: Proceedings of EURO-CRYPT
    • Dawson, M., Tavares, S.: In: Advances in Cryptology: Proceedings of EURO-CRYPT. Lect. Notes. Comput., vol. 91, pp. 352-367 (1991)
    • (1991) Lect. Notes. Comput. , vol.91 , pp. 352-367
    • Dawson, M.1    Tavares, S.2
  • 11
    • 35148829532 scopus 로고
    • Advances in cryptology: Proceedings of CRYPTO
    • Detombe, J., Tavares, S.: In: Advances in Cryptology: Proceedings of CRYPTO. Lecture Notes in Comput. Sci., vol. 92, pp. 165-181 (1992)
    • (1992) Lecture Notes in Comput. Sci. , vol.92 , pp. 165-181
    • Detombe, J.1    Tavares, S.2
  • 12
    • 4243129231 scopus 로고    scopus 로고
    • A novel method for designing S-boxes based on chaotic maps
    • Guoping, T., Xiaofeng, L., Yong, C.: A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fractals 23, 413-419 (2005)
    • (2005) Chaos Solitons Fractals , vol.23 , pp. 413-419
    • Guoping, T.1    Xiaofeng, L.2    Yong, C.3
  • 13
    • 84863989374 scopus 로고    scopus 로고
    • Nonlinear dynamics, cryptanalysis and improvement of an extended chaotic mapsbased key agreement protocol
    • doi:10.1007/s11071-012-0335-0
    • He, D., Chen, Y., Chen, J.: Nonlinear dynamics, cryptanalysis and improvement of an extended chaotic mapsbased key agreement protocol. Nonlinear Dyn. (2012). doi:10.1007/s11071-012-0335-0
    • (2012) Nonlinear Dyn.
    • He, D.1    Chen, Y.2    Chen, J.3
  • 15
    • 80054812135 scopus 로고    scopus 로고
    • Comparative analysis of S-boxes based on graphical SAC
    • Hussain, I., Shah, T., Mahmood, H., Afzal, M.: Comparative analysis of S-boxes based on graphical SAC. Int. J. Comput. Appl. 2(5), 975-8887 (2010)
    • (2010) Int. J. Comput. Appl. , vol.2 , Issue.5 , pp. 975-8887
    • Hussain, I.1    Shah, T.2    Mahmood, H.3    Afzal, M.4
  • 16
    • 84864917746 scopus 로고    scopus 로고
    • Construction of new S-box using a linear fractional transformation
    • Hussain, I., Shah, T., Gondal, M.A., Khan,W.A.: Construction of new S-box using a linear fractional transformation. World Appl. Sci. J. 14(12), 1779-1785 (2011)
    • (2011) World Appl. Sci. J. , vol.14 , Issue.12 , pp. 1779-1785
    • Hussain, I.1    Shah, T.2    Gondal, M.A.3    Khan, W.A.4
  • 17
    • 80053462731 scopus 로고    scopus 로고
    • Some analysis of S-box based on residue of prime number
    • Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Some analysis of S-box based on residue of prime number. Proc. Pak. Acad. Sci. 48(2), 111-115 (2011)
    • (2011) Proc. Pak. Acad. Sci. , vol.48 , Issue.2 , pp. 111-115
    • Hussain, I.1    Shah, T.2    Gondal, M.A.3    Mahmood, H.4
  • 19
    • 84867580749 scopus 로고    scopus 로고
    • An efficient image encryption algorithm based on S8 S-box transformation and NCA map
    • doi:10.1016/j.optcom.2012.06.011
    • Hussain, I., Shah, T., Gondal, M.A.: An efficient image encryption algorithm based on S8 S-box transformation and NCA map. Opt. Commun. (2012). doi:10.1016/j.optcom.2012.06.011
    • (2012) Opt. Commun.
    • Hussain, I.1    Shah, T.2    Gondal, M.A.3
  • 20
    • 84876438336 scopus 로고    scopus 로고
    • A projective general linear group based algorithm for the construction of substitution box for block ciphers
    • doi:10.1007/s00521-012-0870-0
    • Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0870-0
    • (2012) Neural Comput. Appl.
    • Hussain, I.1    Shah, T.2    Gondal, M.A.3    Mahmood, H.4
  • 21
    • 84867728541 scopus 로고    scopus 로고
    • Analysis of S-box in image encryption using root mean square error method
    • Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Analysis of S-box in image encryption using root mean square error method. Z. Naturforsch. A 67a, 327-332 (2012)
    • (2012) Z. Naturforsch. A , vol.67 A , pp. 327-332
    • Hussain, I.1    Shah, T.2    Gondal, M.A.3    Mahmood, H.4
  • 22
    • 84865803149 scopus 로고    scopus 로고
    • Generalized majority logic criterion to analyze the statistical strength of S-boxes
    • Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z. Naturforsch. A 67a, 282-288 (2012)
    • (2012) Z. Naturforsch. A , vol.67 A , pp. 282-288
    • Hussain, I.1    Shah, T.2    Gondal, M.A.3    Mahmood, H.4
  • 23
    • 84866731670 scopus 로고    scopus 로고
    • Construction of S8 Lui J S-boxes and their application
    • doi:10.1016/j.camwa.2012.05.017
    • Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Construction of S8 Lui J S-boxes and their application. Comput. Math. Appl. (2012). doi:10.1016/j.camwa.2012.05.017
    • (2012) Comput. Math. Appl.
    • Hussain, I.1    Shah, T.2    Gondal, M.A.3    Mahmood, H.4
  • 24
    • 84876438336 scopus 로고    scopus 로고
    • A projective general linear group based algorithm for the construction of substitution box for block ciphers
    • doi:10.1007/s00521-012-0870-0
    • Hussain, I., Shah, T., Mahmood, H., Gondal, M.A.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0870-0
    • (2012) Neural Comput. Appl.
    • Hussain, I.1    Shah, T.2    Mahmood, H.3    Gondal, M.A.4
  • 25
    • 84879838956 scopus 로고    scopus 로고
    • A group theoretic approach to construct cryptographically strong substitution boxes
    • doi:10.1007/s00521-012-0914-5
    • Hussain, I., Shah, T., Mahmood, H., Gondal, M.A.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0914-5
    • (2012) Neural Comput. Appl.
    • Hussain, I.1    Shah, T.2    Mahmood, H.3    Gondal, M.A.4
  • 26
    • 84865783598 scopus 로고    scopus 로고
    • S8 affine power affine S-boxes and their application
    • doi:10.1007/s00521-012-1036-9
    • Hussain, I., Shah, T., Mahmood, H., Gondal, M.A.: S8 affine power affine S-boxes and their application. Neural Comput. Appl. (2012). doi:10.1007/s00521- 012-1036-9
    • (2012) Neural Comput. Appl.
    • Hussain, I.1    Shah, T.2    Mahmood, H.3    Gondal, M.A.4
  • 27
    • 61449202019 scopus 로고    scopus 로고
    • Nonlinear dynamics and chaos methods in neuro-dynamics and complex data analysis
    • Ivancevic, T., Jain, L., Pattison, J., Hariz, A.: Nonlinear dynamics and chaos methods in neuro-dynamics and complex data analysis. Nonlinear Dyn. 56, 23-44 (2009)
    • (2009) Nonlinear Dyn. , vol.56 , pp. 23-44
    • Ivancevic, T.1    Jain, L.2    Pattison, J.3    Hariz, A.4
  • 28
    • 0035250017 scopus 로고    scopus 로고
    • Chaos and cryptography: Block encryption ciphers based on chaotic maps
    • Jakimoski, G., Kocarev, L.: Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. 48(2), 163 (2001)
    • (2001) IEEE Trans. Circuits Syst. , vol.48 , Issue.2 , pp. 163
    • Jakimoski, G.1    Kocarev, L.2
  • 29
    • 84861748201 scopus 로고    scopus 로고
    • An extended chaotic maps-based key agreement protocol with user anonymity
    • doi:10.1007/s11071-011-0247-0254
    • Lee, C.-C., Chen, C.-L., Wu, C.-Y., Huang, S.-Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. (2011). doi:10.1007/s11071-011-0247-4
    • (2011) Nonlinear Dyn.
    • Lee, C.-C.1    Chen, C.-L.2    Wu, C.-Y.3    Huang, S.-Y.4
  • 30
    • 18244420943 scopus 로고    scopus 로고
    • Improving security of a chaotic encryption approach
    • Li, S., Mou, X., Ji, Z., Zhang, J., Cai, Y.: Improving security of a chaotic encryption approach. Phys. Lett. A 290, 127-160 (2001)
    • (2001) Phys. Lett. A , vol.290 , pp. 127-160
    • Li, S.1    Mou, X.2    Ji, Z.3    Zhang, J.4    Cai, Y.5
  • 31
    • 0032685466 scopus 로고    scopus 로고
    • A perturbation method for nonlinear twodimensional maps
    • Maccari, A.: A perturbation method for nonlinear twodimensional maps. Nonlinear Dyn. 19, 295-312 (1999)
    • (1999) Nonlinear Dyn. , vol.19 , pp. 295-312
    • Maccari, A.1
  • 32
    • 77955550959 scopus 로고    scopus 로고
    • A method for designing strong Sboxes based on chaotic Lorenz system
    • Özkaynak, F., Özer, A.B.: A method for designing strong Sboxes based on chaotic Lorenz system. Phys. Lett. A 374, 3733-3738 (2010)
    • (2010) Phys. Lett. A , vol.374 , pp. 3733-3738
    • Özkaynak, F.1    Özer, A.B.2
  • 33
    • 0024106741 scopus 로고
    • Towards effective nonlinear cryptosystem design
    • Pieprzyk, J., Finkelsten, G.: Towards effective nonlinear cryptosystem design. IEE Proc. E 135, 325-335 (1988)
    • (1988) IEe Proc. e , vol.135 , pp. 325-335
    • Pieprzyk, J.1    Finkelsten, G.2
  • 34
    • 84864934556 scopus 로고    scopus 로고
    • Construction of cryptographically strong 8 × 8 S-boxes
    • Shah, T., Hussain, I., Gondal, M.A., Khan,W.A.: Construction of cryptographically strong 8 × 8 S-boxes.World Appl. Sci. J. 13(11), 2389-2395 (2011)
    • (2011) World Appl. Sci. J. , vol.13 , Issue.11 , pp. 2389-2395
    • Shah, T.1    Hussain, I.2    Gondal, M.A.3    Khan, W.A.4
  • 35
    • 80052669713 scopus 로고    scopus 로고
    • Statistical analysis of S-box in image encryption applications based on majority logic criterion
    • Shah, T., Hussain, I., Gondal, M.A., Mahmood, H.: Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int. J. Phys. Sci. 6(16), 4110-4127 (2011)
    • (2011) Int. J. Phys. Sci. , vol.6 , Issue.16 , pp. 4110-4127
    • Shah, T.1    Hussain, I.2    Gondal, M.A.3    Mahmood, H.4
  • 36
    • 84867898403 scopus 로고    scopus 로고
    • Image encryption algorithm based on PGL(2,GF(2 ∧ 8)) S-boxes and TD-ERCS chaotic sequence
    • doi:10.1007/s11071-012-0440-0
    • Shah, T., Hussain, I., Gondal, M.A.: Image encryption algorithm based on PGL(2,GF(2 ∧ 8)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dyn. (2012). doi:10.1007/s11071-012-0440-0
    • (2012) Nonlinear Dyn.
    • Shah, T.1    Hussain, I.2    Gondal, M.A.3
  • 37
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(656), 715 (1949)
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.656 , pp. 715
    • Shannon, C.E.1
  • 38
    • 78650800464 scopus 로고    scopus 로고
    • Chaos synchronization of discrete-time dynamic systems with a limited capacity communication channel
    • Wang, G.: Chaos synchronization of discrete-time dynamic systems with a limited capacity communication channel. Nonlinear Dyn. 63, 277-283 (2011)
    • (2011) Nonlinear Dyn , vol.63 , pp. 277-283
    • Wang, G.1
  • 40
    • 84862832224 scopus 로고    scopus 로고
    • A novel method to design S-box based on chaotic map and genetic algorithm
    • Wang, Y., Wong, K.W., Li, C., Li, Y.: A novel method to design S-box based on chaotic map and genetic algorithm. Phys. Lett. A 376, 827-833 (2012)
    • (2012) Phys. Lett. A , vol.376 , pp. 827-833
    • Wang, Y.1    Wong, K.W.2    Li, C.3    Li, Y.4
  • 41
    • 85020573990 scopus 로고
    • Advances in cryptology: Proceedings of CRYPTO
    • Webster, A.F., Tavares, S.: In: Advances in Cryptology: Proceedings of CRYPTO. Lect. Notes. Comput. Sci., vol. 85, pp. 523-534 (1986)
    • (1986) Lect. Notes. Comput. Sci. , vol.85 , pp. 523-534
    • Webster, A.F.1    Tavares, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.