An Efficient Substitution Box design with a chaotic logistic map and Linear Congruential Generator for secure communication in Smart cities
DOI:
https://doi.org/10.4108/eetsc.v7i1.2845Keywords:
Security, smart city, Cryptography, Encryption, AES, s-boxAbstract
The study provides a unique method for creating an efficient substitution box (S-box) for advanced encryption standards using a Chaotic Logistic Map (CLM) and a Linear Congruential Generator (LCG) (AES) for secure communications in a smart city. The Pseudo-Random Number Generator (PRNG), which is further examined, is constructed using an extensive search of reasonable possibilities for the initial seed and set parameters. Using statistical testing, the performance analysis of the new S-box is assessed. Additionally, the resilience of differential, as well as linear cryptanalysis, is shown. It is derived using other features, including nonlinearity, the Bit Independence Criterion (BIC), and the Strict Avalanche Criterion (SAC). The suggested S-box has good potential and is usable for symmetric key cryptography, according to the features of the new S-cryptographic box.
Downloads
References
Tirumala, S. S., Nepal, N., & Ray, S. K. (2022). Raspberry pi-based intelligent cyber defense systems for SMEs and smart-homes: An exploratory study. EAI Endorsed Transactions on Smart Cities, 6(18), e4-e4. DOI: https://doi.org/10.4108/eetsc.v6i18.2345
Namasivayam, B. (2022). AI for Healthy Meal Preparation in Smart Cities. EAI Endorsed Transactions on Smart Cities, 6(4), e1-e1. DOI: https://doi.org/10.4108/eetsc.v6i4.2267
McCurdy, A., Peoples, C., Moore, A., & Zoualfaghari, M. (2021). Waste Management in Smart Cities: A Survey on Public Perception and the Implications for Service Level Agreements. EAI Endorsed Transactions on Smart Cities, 5(16).
Sajid, A., Shah, S. W., & Magsi, T. (2022). Comprehensive Survey on Smart Cities Architectures and Protocols. EAI Endorsed Transactions on Smart Cities, 6(18). DOI: https://doi.org/10.4108/eetsc.v6i18.2065
Daemen J, Rijmen V. The Design of RIJNDAEL: AES The Advanced Encryption Standard.SpringerVerlag: Berlin, 2002. DOI: https://doi.org/10.1007/978-3-662-04722-4_1
Khan, M., Azam, N. A. (2015). Right-translated AES gray S-boxes. Security and Communication Networks, 8(9), 1627-1635. DOI: https://doi.org/10.1002/sec.1110
Ferguson N, Schroeppel R, Whiting D. A simple algebraic representation of Rijndael. In Selected Areas in Cryptography SAC01, LNCS2259, 2001; 103?11. DOI: https://doi.org/10.1007/3-540-45537-X_8
Shannon, C.E., 1949. Communication theory of secrecy systems. The Bell system technical journal, 28(4), pp.656-715. DOI: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Jakimoski, G., Kocarev, L.: Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. 48(2), 163 (2001) DOI: https://doi.org/10.1109/81.904880
G. Tang, X. Liao, Y. Chen, A novel method for designing S-boxes based on chaotic maps, Chaos Solitons Fractals 23 (2005) 41319 DOI: https://doi.org/10.1016/j.chaos.2004.04.023
Muhammad Asif Gondal, Abdul Raheem, Iqtadar Hussain, A scheme for obtaining secure S-Boxes based on chaotic baker map, 3D Res. 5 (August)(2014) 17 DOI: https://doi.org/10.1007/s13319-014-0017-4
Hussain, I., Shah, T., Gondal, MA and Mahmood, H., 2013. An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dynamics, 71(1), pp.133-140. DOI: https://doi.org/10.1007/s11071-012-0646-1
Hua, Z., Li, J., Chen, Y., and Yi, S., 2021. Design and application of an S-box using a complete Latin square. Nonlinear Dynamics, 104(1), pp.807- 825. DOI: https://doi.org/10.1007/s11071-021-06308-3
Lu, Q., Zhu, C. and Deng, X., 2020. An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access, 8, pp.25664-25678. DOI: https://doi.org/10.1109/ACCESS.2020.2970806
Belazi, A. and Abd El-Latif, A.A., 2017. A simple yet efficient S-box method based on chaotic sine map. Optik, 130, pp.1438-1444. DOI: https://doi.org/10.1016/j.ijleo.2016.11.152
Radwan, A.G., 2013. On some generalized discrete logistic maps. Journal of advanced research, 4(2), pp.163-171. DOI: https://doi.org/10.1016/j.jare.2012.05.003
Marsaglia, G., 1972. The structure of linear congruential sequences. In Applications of number theory to numerical analysis (pp. 249-285). Academic Press. DOI: https://doi.org/10.1016/B978-0-12-775950-0.50013-3
Zamli, K. Z., Kader, A., Din, F., Alhadawi, H. S. (2021). Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization. Neural Computing and Applications, 1-18 DOI: https://doi.org/10.1007/s00521-021-06260-8
Javeed, A., Shah, T. (2020). Design of an S-box using RabinovichFabrikant system of differential equations perceiving third order nonlinearity. Multimedia Tools and Applications, 79(9), 6649-6660 DOI: https://doi.org/10.1007/s11042-019-08393-4
Wang, Y., Xie, Q., Wu, Y., Du, B. (2009, June). A software for Xbox performance analysis and test. In 2009 International Conference on Electronic Commerce and Business Intelligence (pp. 125-128). IEEE DOI: https://doi.org/10.1109/ECBI.2009.15
Pedro Miguel Sosa. Calculating nonlinearity of boolean functions with Walsh-Hadamard transform. 2016
A. Webster, S. Tavares, On the design of S-boxes Advances in Cryptology: Proc. of Crypto?5, Santa Barbara, USA. Lecture
M. Matsui, Linear cryptanalysis method of DES cipher Advances in Cryptology, Proc. Eurocrypt?3. LNCS, vol. 765, Springer, Berlin, 1994, pp. 386 DOI: https://doi.org/10.1007/3-540-48285-7_33
Anees, A. and Ahmed, Z., 2015. A technique for designing substitution box based on van der pol oscillator. Wireless Personal Communications, 82(3), pp.1497-1503. DOI: https://doi.org/10.1007/s11277-015-2295-4
Khan, M., Shah, T. and Batool, S.I., 2016. Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Computing and Applications, 27(3), pp.677-685. DOI: https://doi.org/10.1007/s00521-015-1887-y
Khan, M. and Asghar, Z., 2018. A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural computing and applications, 29(4), pp.993-999 DOI: https://doi.org/10.1007/s00521-016-2511-5
Kim, J., Phan, R. C. W. (2009, June). A cryptanalytic view of the NSA's Skipjack block cipher design. In International Conference on Information Security and Assurance (pp. 368-381). Springer, Berlin, Heidelberg DOI: https://doi.org/10.1007/978-3-642-02617-1_38
Yahya, M., Abdullah, S., Almagrabi, A. O., & Botmart, T. (2022). Analysis of S-Box Based on Image Encryption Application Using Complex Fuzzy Credibility Frank Aggregation Operators. IEEE Access, 10, 88858-88871. DOI: https://doi.org/10.1109/ACCESS.2022.3197882
Heron, S. (2009). Advanced encryption standard (AES). Network Security, 2009(12), 8-12. DOI: https://doi.org/10.1016/S1353-4858(10)70006-4
Hassan, M. Abul, et al. "Energy efficient hierarchical based fish eye state routing protocol for flying ad-hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21.1 (2021): 465-471. DOI: https://doi.org/10.11591/ijeecs.v21.i1.pp465-471
Hassan, Muhammad Abul, et al. "Unmanned Aerial Vehicles Routing Formation using fisheye state routing for flying ad-hoc networks." the 4th international conference on future networks and distributed systems (ICFNDS). 2020. DOI: https://doi.org/10.1145/3440749.3442600
Javed, Abdul Rehman, et al. "Integration of blockchain technology and federated learning in vehicular (IoT) networks: A comprehensive survey." Sensors 22.12 (2022): 4394. DOI: https://doi.org/10.3390/s22124394
Sajid, Faiqa, et al. "Secure and Efficient Data Storage Operations by Using Intelligent Classification Technique and RSA Algorithm in IoT-Based Cloud Computing." Scientific Programming 2022 (2022). DOI: https://doi.org/10.1155/2022/2195646
Ali, Sher, et al. "New Trends and Advancement in Next Generation Mobile Wireless Communication (6G): A Survey." Wireless Communications and Mobile Computing 2021 (2021). DOI: https://doi.org/10.1155/2021/9614520
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2023 Muhammad Asim Hashmi, Noshina Tariq
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.