[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Cryptography often involves substituting (and converting) the secret information into dummy data so that it could reach the desired destination without leakage. Within symmetric key cryptography, substitution-box (S-box) is often adopted to perform the actual block cipher substitution. To address the nonlinear requirement of cryptography (i.e., ensuring the generated S-box is sufficiently robust against linear and differential cryptanalysis attacks), many chaos-based metaheuristic algorithms have been developed in the literature. This paper introduces a new variant of a metaheuristic algorithm based on Tiki-Taka algorithm, called selective chaotic maps Tiki-Taka algorithm (SCMTTA). Unlike competing works (which typically integrates a single chaotic map into a particular metaheuristic algorithm), SCMTTA assembles five chaotic maps (i.e., tent map, logistic map, Chebyshev map, singer map and sine map) as part of the algorithm itself in order to further enhance ergodicity and unpredictability of the generated solution. Based on a simple penalized and reward mechanism, one best performing chaotic map will be selected in the current cycle, while the poor performing one will miss its current turn. Experimental results on the case study related to the generation of 8 × 8 substitution-box demonstrate that the proposed SCMTTA gives competitive performance against other existing works due to its ability to adaptively modify its chaotic behavior based on the performance feedback of the current search process.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press

    MATH  Google Scholar 

  2. Hussain I, Shah T, Gondal MA (2012) A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyn 70(3):1791–1794. https://doi.org/10.1007/s11071-012-0573-1

    Article  MathSciNet  Google Scholar 

  3. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

    Article  MathSciNet  MATH  Google Scholar 

  4. Alhadawi HS, Zolkipli MF, Ahmad M (2018) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Appl 31:7201–7210. https://doi.org/10.1007/s00521-018-3557-3

    Article  Google Scholar 

  5. Özkaynak F, Yavuz S (2013) Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn 74(3):551–557. https://doi.org/10.1007/s11071-013-0987-4

    Article  MathSciNet  MATH  Google Scholar 

  6. Ivanov G, Nikolov N, Nikova S (2016) Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties. Cryptogr Commun 8(2):247–276. https://doi.org/10.1007/s12095-015-0170-5

    Article  MathSciNet  MATH  Google Scholar 

  7. Tian Y, Lu Z (2016) S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm. J Syst Eng Electron 27(1):232–241

    Google Scholar 

  8. Carlet C (2005) On highly nonlinear S-boxes and their inability to thwart DPA attacks. In: Progress in cryptology. Springer, Berlin. pp. 49–62, doi: doi: https://doi.org/10.1007/11596219_5

  9. Picek S, Marchiori E, Batina L, Jakobovic D (2014) Combining evolutionary computation and algebraic constructions to find cryptography-relevant Boolean functions. In: International conference on parallel problem solving from nature. Springer, Cham. pp. 822–831. https://doi.org/10.1007/978-3-319-10762-2_81

  10. Carlet C (2008) On the higher order nonlinearities of Boolean functions and S-boxes, and their generalizations. In: International conference on sequences and their applications. Springer, Berlin. pp. 345–367. https://doi.org/10.1007/978-3-540-85912-3_31

  11. Rashid MFFAb (2020) Tiki-taka algorithm: a novel metaheuristic inspired by football playing style. Eng Comput. https://doi.org/10.1108/ec-03-2020-0137

    Article  Google Scholar 

  12. Khaji E (2014) Soccer league optimization: a heuristic algorithm inspired by the football system in european countries. http://arxiv.org/abs/1406.4462. pp. 1–6

  13. Kashan AH (2009) League championship algorithm: a new algorithm for numerical function optimization. In: Proceedings of the international conference of soft computing and pattern recognition. pp. 43–48, doi: https://doi.org/10.1109/SoCPaR.2009.21

  14. Osaba E, Diaz F, Onieva E (2013) A novel meta-heuristic based on soccer concepts to solve routing problems. In: Proceedings of the 15th annual conference companion on genetic and evolutionary computation. Association for Computing Machinery, pp. 1743–1744. Doi: https://doi.org/10.1145/2464576.2480776

  15. Fadakar E, Ebrahimi M (2016) A new metaheuristic football game inspired algorithm. In: Proceedings of the 1st conference on swarm intelligence and evolutionary computation. pp. 6–11. https://doi.org/10.1109/CSIEC.2016.7482120

  16. Kennedy J, Eberhart R (1995) Particle swarm optimization. Proc Int Conf Neural Netw 4:1942–1948. https://doi.org/10.1109/ICNN.1995.488968

    Article  Google Scholar 

  17. Mirjalili S (2015) Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl-Based Syst 89:228–249. https://doi.org/10.1016/j.knosys.2015.07.006

    Article  Google Scholar 

  18. Zhao W, Wang L, Zhang Z (2019) Atom search optimization and its application to solve a hydrogeologic parameter estimation problem. Knowl-Based Syst 163:283–304. https://doi.org/10.1016/j.knosys.2018.08.030

    Article  Google Scholar 

  19. Arora S, Singh S (2019) Butterfly optimization algorithm: A novel approach for global optimization. Soft Comput 23(3):715–734. https://doi.org/10.1007/s00500-018-3102-4

    Article  Google Scholar 

  20. Abdullah JM, Ahmed T (2019) Fitness dependent optimizer: inspired by the bee swarming reproductive process. IEEE Access 7:43473–43486. https://doi.org/10.1109/ACCESS.2019.2907012

    Article  Google Scholar 

  21. Heidari AA, Mirjalili S, Faris H, Aljarah I, Mafarja M, Chen H (2019) Harris hawks optimization: algorithm and applications. Futur Gener Comput Syst 97:849–872. https://doi.org/10.1016/j.future.2019.02.028

    Article  Google Scholar 

  22. Yapici H, Cetinkaya N (2019) A new meta-heuristic optimizer: Pathfinder algorithm. Appl Soft Comput 78:545–568. https://doi.org/10.1016/j.asoc.2019.03.012

    Article  Google Scholar 

  23. Alhadawi HS, Lambić D, Zolkipli MF, Ahmad M (2020) Globalized firefly algorithm and chaos for designing substitution box. J Inf Secur Appl 55:1–13. https://doi.org/10.1016/j.jisa.2020.102671

    Article  Google Scholar 

  24. Strogatz SH (2018) Nonlinear dynamics and chaos with student solutions manual: with applications to physics, biology, chemistry, and engineering. CRC Press

    Book  Google Scholar 

  25. Qiu J, Ji W, Rudas IJ, Gao H (2020) Asynchronous sampled-data filtering design for fuzzy-affine-model-based stochastic nonlinear systems. IEEE Trans Cybern. https://doi.org/10.1109/TCYB.2020.3020885

    Article  Google Scholar 

  26. Qiu J, Wang T, Sun K, Rudas IJ, Gao H (2021) Disturbance observer-based adaptive fuzzy control for strict-feedback nonlinear systems with finite-time prescribed performance. IEEE Trans Fuzzy Syst. https://doi.org/10.1109/TFUZZ.2021.3053327

    Article  Google Scholar 

  27. Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design. Proc Comput Sci 57:572–580. https://doi.org/10.1016/j.procs.2015.07.394

    Article  Google Scholar 

  28. Belazi A, El-Latif AAA (2017) A simple yet efficient S-box method based on chaotic sine map. Optik 130:1438–1444. https://doi.org/10.1016/j.ijleo.2016.11.152

    Article  Google Scholar 

  29. Daemen J, Rijmen V (2020) The design of rijndael (Information Security and Cryptography). Springer, Berlin

    MATH  Google Scholar 

  30. Nyberg K (1993) Differentially uniform mappings for cryptography. Proc Theor Appl Cryptograph Tech. https://doi.org/10.1007/3-540-48285-7_6

    Article  MATH  Google Scholar 

  31. Qu L, Tan Y, Tan CH, Li C (2013) Constructing differentially 4-uniform permutations over F(2^2k ) via the switching method. IEEE Trans Inf Theory 59(7):4675–4686. https://doi.org/10.1109/TIT.2013.2252420

    Article  MathSciNet  MATH  Google Scholar 

  32. Qu L, Tan Y, Li C, Gong G (2016) More constructions of differentially 4-uniform permutations on F(2^2k). Des Codes Crypt 78(2):391–408. https://doi.org/10.1007/s10623-014-0006-x

    Article  MathSciNet  MATH  Google Scholar 

  33. Mileva A, Stojanova A, Bikov D (2020) Investigation of some cryptographic properties of the 8x8 S-boxes created by Quasigroups. Comput Sci J Moldova 28(84):346–372

    MathSciNet  MATH  Google Scholar 

  34. Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circuits and Sys I Fundament Theor Appl 48(2):163–169. https://doi.org/10.1109/81.904880

    Article  MathSciNet  MATH  Google Scholar 

  35. Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons Fract 23(2):413–419. https://doi.org/10.1016/j.chaos.2004.04.023

    Article  MATH  Google Scholar 

  36. Özkaynak F, Özer AB (2010) A method for designing strong S-Boxes based on chaotic Lorenz system. Phys Lett A 374(36):3733–3738. https://doi.org/10.1016/j.physleta.2010.07.019

    Article  MATH  Google Scholar 

  37. Khan M, Shah T, Mahmood H, Gondal MA, Hussain I (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70(3):2303–2311. https://doi.org/10.1007/s11071-012-0621-x

    Article  MathSciNet  Google Scholar 

  38. Millan W (1998) How to improve the nonlinearity of bijective S-boxes. In: Boyd C, Dawson E (eds) Proceedings of the information security and privacy. Springer, Berlin, pp 181–192

    Chapter  Google Scholar 

  39. Zamli KZ, Kader MA, Azad S, Ahmed BS (2021) "Hybrid Henry gas solubility optimization algorithm with dynamic cluster-to-algorithm mapping. Neural Comput Appl. https://doi.org/10.1007/s00521-020-05594-z

    Article  Google Scholar 

  40. Al-Omoush AA, Alsewari AA, Alamri HS, Zamli KZ (2019) "Comprehensive review of the development of the harmony search algorithm and its applications. IEEE Access 7:14233–14245. https://doi.org/10.1109/ACCESS.2019.2893662

    Article  Google Scholar 

  41. Wang Y, Wong K-W, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A 376(6–7):827–833. https://doi.org/10.1016/j.physleta.2012.01.009s

    Article  MATH  Google Scholar 

  42. Tian Y, Lu Z (2017) Chaotic S-box: intertwining logistic map and bacterial foraging optimization. Math Probl Eng 2017:1–12. https://doi.org/10.1155/2017/6969312

    Article  MathSciNet  MATH  Google Scholar 

  43. Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and teaching–learning-based optimization. Nonlinear Dyn 88(2):1059–1074. https://doi.org/10.1007/s11071-016-3295-y

    Article  Google Scholar 

  44. Farah MAB, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn 99:3041–3064. https://doi.org/10.1007/s11071-019-05413-8

    Article  Google Scholar 

  45. Ahmed HA, Zolkipli MF, Ahmad M (2019) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Appl 31(11):7201–7210. https://doi.org/10.1007/s00521-018-3557-3

    Article  Google Scholar 

  46. Alhadawi HS, Majid MA, Lambić D, Ahmad M (2020) A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-10048-8

    Article  Google Scholar 

  47. Alzaidi AA, Ahmad M, Ahmed HS, Solami EA (2018) Sine cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map. Complexity 2018:1–16. https://doi.org/10.1155/2018/9389065

    Article  Google Scholar 

  48. Branstad DK, Gait J, Katzke S (1977) Report of the workshop on cryptography in support of computer security. National Bureau of Standards, NBS IR-77-1291

  49. Detombe J, Tavares SE (1992) Proceedings of the advances in cryptology. In: Lecture notes in computer science, Springer-Verlag,pp. 165–181

  50. Webster AF, Tavares SE (1986) On the design of S-boxes. In: Williams HC (ed) Proceedings of the advances in cryptology. Springer, Berlin, pp 523–534

    Chapter  Google Scholar 

  51. Matsui M (1994) Linear cryptanalysis method for DES cipher. In: Helleseth T (ed) Proceedings of the advances in cryptology. Springer, Berlin, pp 386–397

    Google Scholar 

  52. Prouff E (2005) DPA attacks and S-boxes. In: H. Gilbert and H. Handschuh, (Eds.,), Proceedings of the fast software encryption. Springer, Berlin, Heidelberg, Berlin Heidelberg, in Lecture Notes in Computer Science, pp. 424–441, doi: https://doi.org/10.1007/11502760_29

  53. Mazumdar B, Mukhopadhyay D, Sengupta I (2013) Constrained search for a class of good bijective S-boxes with improved DPA resistivity. IEEE Trans Inf Forensics Secur 8(12):2154–2163. https://doi.org/10.1109/TIFS.2013.2285522

    Article  Google Scholar 

Download references

Acknowledgements

The work reported in this paper is funded by the Universiti Malaysia Pahang Grant: An Automatic Researcher Profiling System for UMP employing UMPIR data (RDU 192211).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kamal Z. Zamli.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

S-box evaluation criteria [48] include bijectivity, nonlinearity, strict avalanche criteria (SAC), bit independence criteria (BIC), differential approximation probability (DP), linear approximation probability (LP) and transparency order (TO).

1.1 Bijective

A n × n S-box can fulfill the bijective property [49] if the Boolean functions \(f_{i} \left( {1 \le i \le n} \right)\) of an S-box satisfy the following equation:

$$wt\left( {\mathop \sum \limits_{{i = 1}}^{n} a_{i} f_{i} } \right) = 2^{{n - 1}}$$

where \(wt()\) is the Hamming weight, \(a_{i} \in \left\{ {0,~1} \right\}\), and \(\left( {a_{1} ,a_{2} ,~.~.~.~,a_{n} } \right)~ \ne \left( {0,~0,~.~.~.~,~0} \right)\). Every \(f_{i}\) is basically required to be 0/1 balanced and the S-box is bijective.

1.2 Nonlinearity

The nonlinearity \(N_{{\text{f}}}\) of \(f\left( x \right)\) is defined as in Eq. (2) where \(f\left( x \right):F_{2}^{n} \to F_{2}\) and \(f\left( x \right)\) is a Boolean function as follows:

$$N_{f} = \mathop {\min }\limits_{{l \in L_{n} }} d_{H} \left( {f,l} \right)$$

where \(L_{n}\) denotes an affine function set, \({\text{d}}_{H} \left( {f,l} \right)\) represents the Hamming distance between \(f\) and \(l\).

In practical application, Walsh spectrum is adopted to calculate the nonlinearity score, which is defined as follows:

$$S_{{\left( f \right)}} \left( \omega \right) = \mathop \sum \limits_{{x \in GF\left( {2^{n} } \right)}} \left( { - 1} \right)^{{f\left( x \right) \oplus x \cdot \omega }}$$

where \(\omega\) is the element of \(GF\left( {2^{n} } \right)\), \(x \cdot \omega\) is the dot product between \(x\) and \(\omega\).

Therefore, the nonlinearity \(N_{{\text{f}}}\) is evaluated as follows:

$$N_{f} = 2^{{n - 1}} - \frac{1}{2}\left( {\mathop {\max }\limits_{{w \in GF\left( 2 \right)^{n} }} \left| {S_{f} \left( w \right)} \right|} \right) = 128.0{\text{ }} - \frac{1}{2}\left( {\mathop {\max }\limits_{{w \in GF\left( 2 \right)^{n} }} \left| {S_{f} \left( w \right)} \right|} \right)~\,{\text{for}}~\,n = 8$$

In this case, the objective function is to maximize \(N_{f}\). For 8 × 8 S-box, the best nonlinearity score is 112.

1.3 Strict avalanche criteria (SAC)

A function can satisfy SAC if the probability of altering the output bits is half whenever a single input bit is complemented [50]. Generally, the SAC of an S-box is checked by employing a dependency matrix. The S-box is deemed to almost satisfy the SAC if each element and the mean value of the matrix are both close to the ideal value of 0.5.

1.4 Bit independence criterion (BIC)

BIC implies that for a given set of avalanche vectors, all avalanche variables should be pair-wise independent. The avalanche vectors are generated by complementing a single plaintext bit. The correlation coefficient between a pair of avalanche variables is required to measure the degree of independence. For two avalanche variables A and B:

$$\rho \left\{ {A,B} \right\} = \frac{{\text{cov} \left\{ {A,B} \right\}}}{{\sigma \left\{ A \right\}\sigma \left\{ B \right\}}}$$

where the correlation coefficient and covariance of \(A\) and \(B\) are denoted by \(\rho \left\{ {A,B} \right\}\) and \(\text{cov} \left\{ {A,B} \right\}\), respectively, where \(\text{cov} \left\{ {A,B} \right\} = E\left\{ {AB} \right\}~ - ~E\left\{ A \right\}~ \times ~E\left\{ B \right\}\) and \(\sigma ^{2} \left\{ A \right\} = ~E\left\{ {A^{2} } \right\}~ - ~\left( {E\left\{ A \right\}} \right)^{2}\).

Assume \(f_{1} ,f_{2} , \ldots\) denote the Boolean functions of S-box. According to Webster and Tavares in [50], \(f_{i} \oplus f_{k} ~\left( {j \ne k,~1 \le j,~k \le n} \right)\) should be highly nonlinear and fulfill the avalanche criterion if the S-box met the output BIC. Thus, by calculating the SAC and the nonlinearity of \(f_{i} \oplus f_{k}\), BIC can be verified.

1.5 Differential approximation probability (DP)

Ideally, the S-box should have differential uniformity. The differential uniformity is achieved via the differential input mapping to differential output mapping. To ensure the uniform mapping probability, an input differential \(\Delta {x}_{i}\) should uniquely map to an output differential \(\Delta {y}_{i}\) for each i. In this case, the XOR distribution between inputs and outputs of S-box must be determined. Mathematically, the measurement of differential uniformity of a given S-box is the differential approximation probability DP defined as follows:

$${\text{DP}}\left( {\Delta x - \Delta y} \right) = \left( {\frac{{\# \{ x \in X|S\left( x \right) \oplus S\left( {x \oplus \Delta x} \right) = \Delta y\} }}{{2^{m} }}} \right)$$

where \(X\) is the set of \(2^{m}\) possible input values.

The smaller the DP score, the stronger the ability of the S-box to resist the differential cryptanalysis attacks, and vice versa.

1.6 Linear approximation probability (LP)

The maximum value of the imbalance of an event is represented by the linear approximation probability LP. The parity of input and output bits selected by the mask Γx and Γy, respectively, is equal. Matsui in [51] defines the linear approximation probability (or probability of bias) of a given S-box as follows:

$${\text{LP}} = \mathop {\max }\limits_{{\Gamma x,\Gamma y \ne 0}} \left| {\frac{{\# \{ x \in X|x \cdot \Gamma x = S\left( x \right) \cdot \Gamma y\} ti}}{{2^{m} }} - \frac{1}{2}} \right|$$

where \(\Gamma x\) and \(\Gamma y\) are the input and output masks, respectively; \(X\) is the set of \(2^{m}\) possible inputs.

1.7 Transparency order (TO)

Transparency order metric is a resistance measuring metric for the S-box to differential power analysis (DPA) attacks [52]. Some cryptographically strong Boolean functions or S-boxes have been found to be poorly robust in DPA attacks such as AES reverse mappings [53]. The mathematical formulation of transparency order \(\tau _{S}\) for an S-box [52, 53] is presented as follows:

$$\tau _{S} = \mathop {\max }\limits_{{\beta \in F_{2}^{n} }} \left( {\left| {n - 2{\text{HW}}\left( \beta \right)} \right| - \frac{1}{{2^{{2n}} - 2^{n} }}\mathop \sum \limits_{{\alpha \in F_{2}^{{n^{*} }} }} \left| {\mathop \sum \limits_{{\begin{array}{*{20}c} {v \in F_{2}^{n} } \\ {{\text{HW}}\left( v \right) = 1} \\ \end{array} }}^{m} \left( { - 1} \right)^{{v.\beta }} W_{{\alpha ,S}} \left( {0,v} \right)} \right|} \right)$$

where \({\text{HW}}\left( \beta \right)\) denotes the Hamming weight of \(\beta\), and \(W_{{\alpha ,S}} \left( {u,v} \right)\) is calculated as follows:

$$W_{{\alpha ,S}} \left( {u,v} \right) = \sum \left( { - 1} \right)^{{v.\left\{ {S\left( x \right) \oplus S\left( {x \oplus \alpha } \right)} \right\} \oplus u.x}}$$

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zamli, K.Z., Kader, A., Din, F. et al. Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization. Neural Comput & Applic 33, 16641–16658 (2021). https://doi.org/10.1007/s00521-021-06260-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-021-06260-8

Keywords

Navigation