Quick Search:

Chaos and Cellular Automata-Based Substitution Box and Its Application in Cryptography

Shafique, Arslan, Khan, Kashif Hesham, Hazzazi, Mohammad Mazyad ORCID: https://orcid.org/0000-0002-7945-9994, Bahkali, Ismail ORCID: https://orcid.org/0000-0002-3603-4259, Bassfar, Zaid ORCID: https://orcid.org/0000-0003-1172-885X and Rehman, Mujeeb Ur ORCID: https://orcid.org/0000-0002-4228-385X (2023) Chaos and Cellular Automata-Based Substitution Box and Its Application in Cryptography. Mathematics, 11 (10). p. 2322.

[img]
Preview
Text
mathematics-11-02322.pdf - Published Version
Available under License Creative Commons Attribution.

| Preview

Abstract

Substitution boxes are the key factor in symmetric-key cryptosystems that determines their ability to resist various cryptanalytic attacks. Creating strong substitution boxes that have multiple strong cryptographic properties at the same time is a challenging task for cryptographers. A significant amount of research has been conducted on S-boxes in the past few decades, but the resulting S-boxes have been found to be vulnerable to various cyberattacks. This paper proposes a new method for creating robust S-boxes that exhibit superior performance and possess high scores in multiple cryptographic properties. The hybrid S-box method presented in this paper is based on Chua’s circuit chaotic map, two-dimensional cellular automata, and an algebraic permutation group structure. The proposed 16×16
S-box has an excellent performance in terms of security parameters, including a minimum nonlinearity of 102, the absence of fixed points, the satisfaction of bit independence and strict avalanche criteria, a low differential uniformity of 5, a low linear approximation probability of 0.0603, and an auto-correlation function of 28. The analysis of the performance comparison indicates that the proposed S-box outperforms other state-of-the-art S-box techniques in several aspects. It possesses better attributes, such as a higher degree of inherent security and resilience, which make it more secure and less vulnerable to potential attacks.

Item Type: Article
Status: Published
DOI: https://doi.org/10.3390/math11102322
School/Department: School of Science, Technology and Health
URI: https://ray.yorksj.ac.uk/id/eprint/8004

University Staff: Request a correction | RaY Editors: Update this record