A Scheme for Obtaining Secure S-Boxes Based on Chaotic Baker’s Map

3D Research - Tập 5 Số 3 - 2014
Muhammad Asif Gondal1, Abdul Raheem2, Iqtadar Hussain3
1Department of Mathematics and Sciences, Dhofar University, Salalah, Oman
2Department of Basic Sciences, Riphah International University, Islamabad, Pakistan
3National University of Computer and Emerging Sciences, Islamabad, Pakistan

Tóm tắt

Từ khóa


Tài liệu tham khảo

National Bureau of Standards: Data Encryption Standard, US. Department of Commerce, FIPS pub.46, January 1977.

Shimizu, A., Shiraishi, A., & Miyaguchi, S. (1987). Fast data encryption algorithm FEAL, advances in cryptology, proceedings of EUROCRYPT’87, Lecture Notes in Computer Science 304: 267–278.

Xusick, T., & Wood, W. (1990). The REDOC-cryptosystem, advances in cryptology, proceedings of CRYPTO’SO, Lecture Notes in Computer Science 526: 545–563.

Brown, L., Pieprzyk, J., & Seberry, J.: LOKI—A cryptographic primitive for authentication and secrecy applications, advances in cryptology, proceedings of AUSCRYPT’SO, Lecture Notes in Computer Science 453: 229–236.

Merkl, R. (1990). Fast software encryption functions, advances in cryptology, proceedings of CRYPTO’SO, Lecture Notes in Computer Science 526: 476–501.

Shannon, C. (1949). Communication theory of secrecy system. Bell Systems Technical Journal, 28, 656–715.

Biham, E., & Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1), 3–72.

Pieprzyk, J., & Finkelstein, G. (1988). Towards effective nonlinear cryptosystem design. IEEE Proceedings, Part E: Computers and Digital Techniques, 135, 325–335.

Adams, C., & Tavares, S. (1989). Good S-boxes Are easy to find, advances in cryptology, proceedings of CRYPT0’89, Lecture Notes in Computer Science pp. 612–6115.

Detombe, J., & Tavares, S. (1992). Constructing large cryptographically strong S-boxes, advances in cryptology, proceedings of CRYPTO’92, Lecture Notes in Computer Science.

Hussain, I., Azam, N. A., & Shah, T. (2014). Stego optical encryption based on chaotic S-box transformation. Optics & Laser Technology, 61, 50–56.

Hussain, I., Shah, T., & Gondal, M. A. (2013). Application of S-box and chaotic map for image encryption. Mathematical and Computer Modelling, 57(9–10), 2576–2579.

Hussain, I. (2013). A novel approach of audio watermarking based on S-box transformation. Mathematical and Computer Modelling, 57(3–4), 963–969.

Hussain, I., Shah, T., Gondal, M. A., & Mahmood, H. (2013). A novel method for designing nonlinear component for block cipher based on TD-ERCS chaotic sequence. Nonlinear Dynamics, 73, 633–637.

Hussain, I., Shah, T., Gondal, M. A., & Mahmood, H. (2013). A novel image encryption algorithm based on chaotic maps and GF(2^8) exponent transformation. Nonlinear Dynamics, 72, 399–406.

Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75, 807–816.

Jamal, S. S., Shah, T., & Hussain, I. (2013). An efficient scheme for digital watermarking using chaotic map. Nonlinear Dynamics, 73, 1469–1474.

Hussain, I., Shah, T., Gondal, M. A., & Mahmood, H. (2013). An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dynamics, 71, 133–140.

Hussain, I., Shah, T., Gondal, M. A., & Mahmood, H. (2013). Efficient method for designing chaotic S-boxes based on generalized baker’s map and TDERC chaotic sequence. Nonlinear Dynamics, 74, 271–275.

Hussain, I., & Gondal, MA. An extended image encryption using chaotic coupled map and S-box transformation, Nonlinear Dynamics, doi: 10.1007/s11071-013-1214-z .

Hussain, I., Shah, T., & Gondal, M. A. (2013). A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput & Applications, 23, 97–104.

Hussain, I., Shah, T., & Mahmood, H. (2013). A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput & Applications, 22, 1085–1093.

Hussain, I., & Shah, T. (2013). Literature survey on nonlinear components and chaotic nonlinear components of block ciphers. Nonlinear Dynamics, 74, 869–904.

Anees, A., Khan, W. A., Gondal, M. A., & Hussain, I. (2013). Application of mean of absolute deviation method for the selection of best nonlinear component based on video encryption. Z. Naturforsch, 68a, 567–572.

Shah, T., Qamar, A., & Hussain, I. (2013). Substitution box on maximal cyclic subgroup of units of a galois ring. Z. Naturforsch, 68a, 479–482.

Gondal, M. A., & Anees, A. (2013). Analysis of optimized signal processing algorithms for smart antenna systems. Neural Computing and Applications, 23(3–4), 1083–1087.

Anees, A., Siddiqui, A. M., & Ahmed, F. (2014). Chaotic substitution for highly autocorrelated data in encryption algorithms. Communications in Nonlinear Science and Numerical Simulation, 19(9), 3106–3118.

Ahmed, F., Anees, A., & Siyal, M. Y. (2014). A noise channel tolerant image encryption scheme. Wireless Personal Communications,. doi: 10.1007/s11277-014-1667-5 .