An Efficient Substitution Box design with a chaotic logistic map and Linear Congruential Generator for secure communication in Smart cities

Authors

DOI:

https://doi.org/10.4108/eetsc.v7i1.2845

Keywords:

Security, smart city, Cryptography, Encryption, AES, s-box

Abstract

The study provides a unique method for creating an efficient substitution box (S-box) for advanced encryption standards using a Chaotic Logistic Map (CLM) and a Linear Congruential Generator (LCG) (AES) for secure communications in a smart city. The Pseudo-Random Number Generator (PRNG), which is further examined, is constructed using an extensive search of reasonable possibilities for the initial seed and set parameters. Using statistical testing, the performance analysis of the new S-box is assessed. Additionally, the resilience of differential, as well as linear cryptanalysis, is shown. It is derived using other features, including nonlinearity, the Bit Independence Criterion (BIC), and the Strict Avalanche Criterion (SAC). The suggested S-box has good potential and is usable for symmetric key cryptography, according to the features of the new S-cryptographic box.

Downloads

Download data is not yet available.

Author Biography

Noshina Tariq, Air University

Department of Avionics Engineering, Air University, Islamabad, Pakistan

References

Tirumala, S. S., Nepal, N., & Ray, S. K. (2022). Raspberry pi-based intelligent cyber defense systems for SMEs and smart-homes: An exploratory study. EAI Endorsed Transactions on Smart Cities, 6(18), e4-e4. DOI: https://doi.org/10.4108/eetsc.v6i18.2345

Namasivayam, B. (2022). AI for Healthy Meal Preparation in Smart Cities. EAI Endorsed Transactions on Smart Cities, 6(4), e1-e1. DOI: https://doi.org/10.4108/eetsc.v6i4.2267

McCurdy, A., Peoples, C., Moore, A., & Zoualfaghari, M. (2021). Waste Management in Smart Cities: A Survey on Public Perception and the Implications for Service Level Agreements. EAI Endorsed Transactions on Smart Cities, 5(16).

Sajid, A., Shah, S. W., & Magsi, T. (2022). Comprehensive Survey on Smart Cities Architectures and Protocols. EAI Endorsed Transactions on Smart Cities, 6(18). DOI: https://doi.org/10.4108/eetsc.v6i18.2065

Daemen J, Rijmen V. The Design of RIJNDAEL: AES The Advanced Encryption Standard.SpringerVerlag: Berlin, 2002. DOI: https://doi.org/10.1007/978-3-662-04722-4_1

Khan, M., Azam, N. A. (2015). Right-translated AES gray S-boxes. Security and Communication Networks, 8(9), 1627-1635. DOI: https://doi.org/10.1002/sec.1110

Ferguson N, Schroeppel R, Whiting D. A simple algebraic representation of Rijndael. In Selected Areas in Cryptography SAC01, LNCS2259, 2001; 103?11. DOI: https://doi.org/10.1007/3-540-45537-X_8

Shannon, C.E., 1949. Communication theory of secrecy systems. The Bell system technical journal, 28(4), pp.656-715. DOI: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

Jakimoski, G., Kocarev, L.: Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. 48(2), 163 (2001) DOI: https://doi.org/10.1109/81.904880

G. Tang, X. Liao, Y. Chen, A novel method for designing S-boxes based on chaotic maps, Chaos Solitons Fractals 23 (2005) 41319 DOI: https://doi.org/10.1016/j.chaos.2004.04.023

Muhammad Asif Gondal, Abdul Raheem, Iqtadar Hussain, A scheme for obtaining secure S-Boxes based on chaotic baker map, 3D Res. 5 (August)(2014) 17 DOI: https://doi.org/10.1007/s13319-014-0017-4

Hussain, I., Shah, T., Gondal, MA and Mahmood, H., 2013. An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dynamics, 71(1), pp.133-140. DOI: https://doi.org/10.1007/s11071-012-0646-1

Hua, Z., Li, J., Chen, Y., and Yi, S., 2021. Design and application of an S-box using a complete Latin square. Nonlinear Dynamics, 104(1), pp.807- 825. DOI: https://doi.org/10.1007/s11071-021-06308-3

Lu, Q., Zhu, C. and Deng, X., 2020. An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access, 8, pp.25664-25678. DOI: https://doi.org/10.1109/ACCESS.2020.2970806

Belazi, A. and Abd El-Latif, A.A., 2017. A simple yet efficient S-box method based on chaotic sine map. Optik, 130, pp.1438-1444. DOI: https://doi.org/10.1016/j.ijleo.2016.11.152

Radwan, A.G., 2013. On some generalized discrete logistic maps. Journal of advanced research, 4(2), pp.163-171. DOI: https://doi.org/10.1016/j.jare.2012.05.003

Marsaglia, G., 1972. The structure of linear congruential sequences. In Applications of number theory to numerical analysis (pp. 249-285). Academic Press. DOI: https://doi.org/10.1016/B978-0-12-775950-0.50013-3

Zamli, K. Z., Kader, A., Din, F., Alhadawi, H. S. (2021). Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization. Neural Computing and Applications, 1-18 DOI: https://doi.org/10.1007/s00521-021-06260-8

Javeed, A., Shah, T. (2020). Design of an S-box using RabinovichFabrikant system of differential equations perceiving third order nonlinearity. Multimedia Tools and Applications, 79(9), 6649-6660 DOI: https://doi.org/10.1007/s11042-019-08393-4

Wang, Y., Xie, Q., Wu, Y., Du, B. (2009, June). A software for Xbox performance analysis and test. In 2009 International Conference on Electronic Commerce and Business Intelligence (pp. 125-128). IEEE DOI: https://doi.org/10.1109/ECBI.2009.15

Pedro Miguel Sosa. Calculating nonlinearity of boolean functions with Walsh-Hadamard transform. 2016

A. Webster, S. Tavares, On the design of S-boxes Advances in Cryptology: Proc. of Crypto?5, Santa Barbara, USA. Lecture

M. Matsui, Linear cryptanalysis method of DES cipher Advances in Cryptology, Proc. Eurocrypt?3. LNCS, vol. 765, Springer, Berlin, 1994, pp. 386 DOI: https://doi.org/10.1007/3-540-48285-7_33

Anees, A. and Ahmed, Z., 2015. A technique for designing substitution box based on van der pol oscillator. Wireless Personal Communications, 82(3), pp.1497-1503. DOI: https://doi.org/10.1007/s11277-015-2295-4

Khan, M., Shah, T. and Batool, S.I., 2016. Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Computing and Applications, 27(3), pp.677-685. DOI: https://doi.org/10.1007/s00521-015-1887-y

Khan, M. and Asghar, Z., 2018. A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural computing and applications, 29(4), pp.993-999 DOI: https://doi.org/10.1007/s00521-016-2511-5

Kim, J., Phan, R. C. W. (2009, June). A cryptanalytic view of the NSA's Skipjack block cipher design. In International Conference on Information Security and Assurance (pp. 368-381). Springer, Berlin, Heidelberg DOI: https://doi.org/10.1007/978-3-642-02617-1_38

Yahya, M., Abdullah, S., Almagrabi, A. O., & Botmart, T. (2022). Analysis of S-Box Based on Image Encryption Application Using Complex Fuzzy Credibility Frank Aggregation Operators. IEEE Access, 10, 88858-88871. DOI: https://doi.org/10.1109/ACCESS.2022.3197882

Heron, S. (2009). Advanced encryption standard (AES). Network Security, 2009(12), 8-12. DOI: https://doi.org/10.1016/S1353-4858(10)70006-4

Hassan, M. Abul, et al. "Energy efficient hierarchical based fish eye state routing protocol for flying ad-hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21.1 (2021): 465-471. DOI: https://doi.org/10.11591/ijeecs.v21.i1.pp465-471

Hassan, Muhammad Abul, et al. "Unmanned Aerial Vehicles Routing Formation using fisheye state routing for flying ad-hoc networks." the 4th international conference on future networks and distributed systems (ICFNDS). 2020. DOI: https://doi.org/10.1145/3440749.3442600

Javed, Abdul Rehman, et al. "Integration of blockchain technology and federated learning in vehicular (IoT) networks: A comprehensive survey." Sensors 22.12 (2022): 4394. DOI: https://doi.org/10.3390/s22124394

Sajid, Faiqa, et al. "Secure and Efficient Data Storage Operations by Using Intelligent Classification Technique and RSA Algorithm in IoT-Based Cloud Computing." Scientific Programming 2022 (2022). DOI: https://doi.org/10.1155/2022/2195646

Ali, Sher, et al. "New Trends and Advancement in Next Generation Mobile Wireless Communication (6G): A Survey." Wireless Communications and Mobile Computing 2021 (2021). DOI: https://doi.org/10.1155/2021/9614520

Downloads

Published

23-03-2023

How to Cite

[1]
M. A. Hashmi and Noshina Tariq, “An Efficient Substitution Box design with a chaotic logistic map and Linear Congruential Generator for secure communication in Smart cities ”, EAI Endorsed Trans Smart Cities, vol. 7, no. 1, p. e6, Mar. 2023.