Abstract
Cryptography often involves substituting (and converting) the secret information into dummy data so that it could reach the desired destination without leakage. Within symmetric key cryptography, substitution-box (S-box) is often adopted to perform the actual block cipher substitution. To address the nonlinear requirement of cryptography (i.e., ensuring the generated S-box is sufficiently robust against linear and differential cryptanalysis attacks), many chaos-based metaheuristic algorithms have been developed in the literature. This paper introduces a new variant of a metaheuristic algorithm based on Tiki-Taka algorithm, called selective chaotic maps Tiki-Taka algorithm (SCMTTA). Unlike competing works (which typically integrates a single chaotic map into a particular metaheuristic algorithm), SCMTTA assembles five chaotic maps (i.e., tent map, logistic map, Chebyshev map, singer map and sine map) as part of the algorithm itself in order to further enhance ergodicity and unpredictability of the generated solution. Based on a simple penalized and reward mechanism, one best performing chaotic map will be selected in the current cycle, while the poor performing one will miss its current turn. Experimental results on the case study related to the generation of 8 × 8 substitution-box demonstrate that the proposed SCMTTA gives competitive performance against other existing works due to its ability to adaptively modify its chaotic behavior based on the performance feedback of the current search process.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press
Hussain I, Shah T, Gondal MA (2012) A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyn 70(3):1791–1794. https://doi.org/10.1007/s11071-012-0573-1
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Alhadawi HS, Zolkipli MF, Ahmad M (2018) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Appl 31:7201–7210. https://doi.org/10.1007/s00521-018-3557-3
Özkaynak F, Yavuz S (2013) Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn 74(3):551–557. https://doi.org/10.1007/s11071-013-0987-4
Ivanov G, Nikolov N, Nikova S (2016) Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties. Cryptogr Commun 8(2):247–276. https://doi.org/10.1007/s12095-015-0170-5
Tian Y, Lu Z (2016) S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm. J Syst Eng Electron 27(1):232–241
Carlet C (2005) On highly nonlinear S-boxes and their inability to thwart DPA attacks. In: Progress in cryptology. Springer, Berlin. pp. 49–62, doi: doi: https://doi.org/10.1007/11596219_5
Picek S, Marchiori E, Batina L, Jakobovic D (2014) Combining evolutionary computation and algebraic constructions to find cryptography-relevant Boolean functions. In: International conference on parallel problem solving from nature. Springer, Cham. pp. 822–831. https://doi.org/10.1007/978-3-319-10762-2_81
Carlet C (2008) On the higher order nonlinearities of Boolean functions and S-boxes, and their generalizations. In: International conference on sequences and their applications. Springer, Berlin. pp. 345–367. https://doi.org/10.1007/978-3-540-85912-3_31
Rashid MFFAb (2020) Tiki-taka algorithm: a novel metaheuristic inspired by football playing style. Eng Comput. https://doi.org/10.1108/ec-03-2020-0137
Khaji E (2014) Soccer league optimization: a heuristic algorithm inspired by the football system in european countries. http://arxiv.org/abs/1406.4462. pp. 1–6
Kashan AH (2009) League championship algorithm: a new algorithm for numerical function optimization. In: Proceedings of the international conference of soft computing and pattern recognition. pp. 43–48, doi: https://doi.org/10.1109/SoCPaR.2009.21
Osaba E, Diaz F, Onieva E (2013) A novel meta-heuristic based on soccer concepts to solve routing problems. In: Proceedings of the 15th annual conference companion on genetic and evolutionary computation. Association for Computing Machinery, pp. 1743–1744. Doi: https://doi.org/10.1145/2464576.2480776
Fadakar E, Ebrahimi M (2016) A new metaheuristic football game inspired algorithm. In: Proceedings of the 1st conference on swarm intelligence and evolutionary computation. pp. 6–11. https://doi.org/10.1109/CSIEC.2016.7482120
Kennedy J, Eberhart R (1995) Particle swarm optimization. Proc Int Conf Neural Netw 4:1942–1948. https://doi.org/10.1109/ICNN.1995.488968
Mirjalili S (2015) Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl-Based Syst 89:228–249. https://doi.org/10.1016/j.knosys.2015.07.006
Zhao W, Wang L, Zhang Z (2019) Atom search optimization and its application to solve a hydrogeologic parameter estimation problem. Knowl-Based Syst 163:283–304. https://doi.org/10.1016/j.knosys.2018.08.030
Arora S, Singh S (2019) Butterfly optimization algorithm: A novel approach for global optimization. Soft Comput 23(3):715–734. https://doi.org/10.1007/s00500-018-3102-4
Abdullah JM, Ahmed T (2019) Fitness dependent optimizer: inspired by the bee swarming reproductive process. IEEE Access 7:43473–43486. https://doi.org/10.1109/ACCESS.2019.2907012
Heidari AA, Mirjalili S, Faris H, Aljarah I, Mafarja M, Chen H (2019) Harris hawks optimization: algorithm and applications. Futur Gener Comput Syst 97:849–872. https://doi.org/10.1016/j.future.2019.02.028
Yapici H, Cetinkaya N (2019) A new meta-heuristic optimizer: Pathfinder algorithm. Appl Soft Comput 78:545–568. https://doi.org/10.1016/j.asoc.2019.03.012
Alhadawi HS, Lambić D, Zolkipli MF, Ahmad M (2020) Globalized firefly algorithm and chaos for designing substitution box. J Inf Secur Appl 55:1–13. https://doi.org/10.1016/j.jisa.2020.102671
Strogatz SH (2018) Nonlinear dynamics and chaos with student solutions manual: with applications to physics, biology, chemistry, and engineering. CRC Press
Qiu J, Ji W, Rudas IJ, Gao H (2020) Asynchronous sampled-data filtering design for fuzzy-affine-model-based stochastic nonlinear systems. IEEE Trans Cybern. https://doi.org/10.1109/TCYB.2020.3020885
Qiu J, Wang T, Sun K, Rudas IJ, Gao H (2021) Disturbance observer-based adaptive fuzzy control for strict-feedback nonlinear systems with finite-time prescribed performance. IEEE Trans Fuzzy Syst. https://doi.org/10.1109/TFUZZ.2021.3053327
Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design. Proc Comput Sci 57:572–580. https://doi.org/10.1016/j.procs.2015.07.394
Belazi A, El-Latif AAA (2017) A simple yet efficient S-box method based on chaotic sine map. Optik 130:1438–1444. https://doi.org/10.1016/j.ijleo.2016.11.152
Daemen J, Rijmen V (2020) The design of rijndael (Information Security and Cryptography). Springer, Berlin
Nyberg K (1993) Differentially uniform mappings for cryptography. Proc Theor Appl Cryptograph Tech. https://doi.org/10.1007/3-540-48285-7_6
Qu L, Tan Y, Tan CH, Li C (2013) Constructing differentially 4-uniform permutations over F(2^2k ) via the switching method. IEEE Trans Inf Theory 59(7):4675–4686. https://doi.org/10.1109/TIT.2013.2252420
Qu L, Tan Y, Li C, Gong G (2016) More constructions of differentially 4-uniform permutations on F(2^2k). Des Codes Crypt 78(2):391–408. https://doi.org/10.1007/s10623-014-0006-x
Mileva A, Stojanova A, Bikov D (2020) Investigation of some cryptographic properties of the 8x8 S-boxes created by Quasigroups. Comput Sci J Moldova 28(84):346–372
Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circuits and Sys I Fundament Theor Appl 48(2):163–169. https://doi.org/10.1109/81.904880
Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons Fract 23(2):413–419. https://doi.org/10.1016/j.chaos.2004.04.023
Özkaynak F, Özer AB (2010) A method for designing strong S-Boxes based on chaotic Lorenz system. Phys Lett A 374(36):3733–3738. https://doi.org/10.1016/j.physleta.2010.07.019
Khan M, Shah T, Mahmood H, Gondal MA, Hussain I (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70(3):2303–2311. https://doi.org/10.1007/s11071-012-0621-x
Millan W (1998) How to improve the nonlinearity of bijective S-boxes. In: Boyd C, Dawson E (eds) Proceedings of the information security and privacy. Springer, Berlin, pp 181–192
Zamli KZ, Kader MA, Azad S, Ahmed BS (2021) "Hybrid Henry gas solubility optimization algorithm with dynamic cluster-to-algorithm mapping. Neural Comput Appl. https://doi.org/10.1007/s00521-020-05594-z
Al-Omoush AA, Alsewari AA, Alamri HS, Zamli KZ (2019) "Comprehensive review of the development of the harmony search algorithm and its applications. IEEE Access 7:14233–14245. https://doi.org/10.1109/ACCESS.2019.2893662
Wang Y, Wong K-W, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A 376(6–7):827–833. https://doi.org/10.1016/j.physleta.2012.01.009s
Tian Y, Lu Z (2017) Chaotic S-box: intertwining logistic map and bacterial foraging optimization. Math Probl Eng 2017:1–12. https://doi.org/10.1155/2017/6969312
Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and teaching–learning-based optimization. Nonlinear Dyn 88(2):1059–1074. https://doi.org/10.1007/s11071-016-3295-y
Farah MAB, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn 99:3041–3064. https://doi.org/10.1007/s11071-019-05413-8
Ahmed HA, Zolkipli MF, Ahmad M (2019) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Appl 31(11):7201–7210. https://doi.org/10.1007/s00521-018-3557-3
Alhadawi HS, Majid MA, Lambić D, Ahmad M (2020) A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-10048-8
Alzaidi AA, Ahmad M, Ahmed HS, Solami EA (2018) Sine cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map. Complexity 2018:1–16. https://doi.org/10.1155/2018/9389065
Branstad DK, Gait J, Katzke S (1977) Report of the workshop on cryptography in support of computer security. National Bureau of Standards, NBS IR-77-1291
Detombe J, Tavares SE (1992) Proceedings of the advances in cryptology. In: Lecture notes in computer science, Springer-Verlag,pp. 165–181
Webster AF, Tavares SE (1986) On the design of S-boxes. In: Williams HC (ed) Proceedings of the advances in cryptology. Springer, Berlin, pp 523–534
Matsui M (1994) Linear cryptanalysis method for DES cipher. In: Helleseth T (ed) Proceedings of the advances in cryptology. Springer, Berlin, pp 386–397
Prouff E (2005) DPA attacks and S-boxes. In: H. Gilbert and H. Handschuh, (Eds.,), Proceedings of the fast software encryption. Springer, Berlin, Heidelberg, Berlin Heidelberg, in Lecture Notes in Computer Science, pp. 424–441, doi: https://doi.org/10.1007/11502760_29
Mazumdar B, Mukhopadhyay D, Sengupta I (2013) Constrained search for a class of good bijective S-boxes with improved DPA resistivity. IEEE Trans Inf Forensics Secur 8(12):2154–2163. https://doi.org/10.1109/TIFS.2013.2285522
Acknowledgements
The work reported in this paper is funded by the Universiti Malaysia Pahang Grant: An Automatic Researcher Profiling System for UMP employing UMPIR data (RDU 192211).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
S-box evaluation criteria [48] include bijectivity, nonlinearity, strict avalanche criteria (SAC), bit independence criteria (BIC), differential approximation probability (DP), linear approximation probability (LP) and transparency order (TO).
1.1 Bijective
A n × n S-box can fulfill the bijective property [49] if the Boolean functions \(f_{i} \left( {1 \le i \le n} \right)\) of an S-box satisfy the following equation:
where \(wt()\) is the Hamming weight, \(a_{i} \in \left\{ {0,~1} \right\}\), and \(\left( {a_{1} ,a_{2} ,~.~.~.~,a_{n} } \right)~ \ne \left( {0,~0,~.~.~.~,~0} \right)\). Every \(f_{i}\) is basically required to be 0/1 balanced and the S-box is bijective.
1.2 Nonlinearity
The nonlinearity \(N_{{\text{f}}}\) of \(f\left( x \right)\) is defined as in Eq. (2) where \(f\left( x \right):F_{2}^{n} \to F_{2}\) and \(f\left( x \right)\) is a Boolean function as follows:
where \(L_{n}\) denotes an affine function set, \({\text{d}}_{H} \left( {f,l} \right)\) represents the Hamming distance between \(f\) and \(l\).
In practical application, Walsh spectrum is adopted to calculate the nonlinearity score, which is defined as follows:
where \(\omega\) is the element of \(GF\left( {2^{n} } \right)\), \(x \cdot \omega\) is the dot product between \(x\) and \(\omega\).
Therefore, the nonlinearity \(N_{{\text{f}}}\) is evaluated as follows:
In this case, the objective function is to maximize \(N_{f}\). For 8 × 8 S-box, the best nonlinearity score is 112.
1.3 Strict avalanche criteria (SAC)
A function can satisfy SAC if the probability of altering the output bits is half whenever a single input bit is complemented [50]. Generally, the SAC of an S-box is checked by employing a dependency matrix. The S-box is deemed to almost satisfy the SAC if each element and the mean value of the matrix are both close to the ideal value of 0.5.
1.4 Bit independence criterion (BIC)
BIC implies that for a given set of avalanche vectors, all avalanche variables should be pair-wise independent. The avalanche vectors are generated by complementing a single plaintext bit. The correlation coefficient between a pair of avalanche variables is required to measure the degree of independence. For two avalanche variables A and B:
where the correlation coefficient and covariance of \(A\) and \(B\) are denoted by \(\rho \left\{ {A,B} \right\}\) and \(\text{cov} \left\{ {A,B} \right\}\), respectively, where \(\text{cov} \left\{ {A,B} \right\} = E\left\{ {AB} \right\}~ - ~E\left\{ A \right\}~ \times ~E\left\{ B \right\}\) and \(\sigma ^{2} \left\{ A \right\} = ~E\left\{ {A^{2} } \right\}~ - ~\left( {E\left\{ A \right\}} \right)^{2}\).
Assume \(f_{1} ,f_{2} , \ldots\) denote the Boolean functions of S-box. According to Webster and Tavares in [50], \(f_{i} \oplus f_{k} ~\left( {j \ne k,~1 \le j,~k \le n} \right)\) should be highly nonlinear and fulfill the avalanche criterion if the S-box met the output BIC. Thus, by calculating the SAC and the nonlinearity of \(f_{i} \oplus f_{k}\), BIC can be verified.
1.5 Differential approximation probability (DP)
Ideally, the S-box should have differential uniformity. The differential uniformity is achieved via the differential input mapping to differential output mapping. To ensure the uniform mapping probability, an input differential \(\Delta {x}_{i}\) should uniquely map to an output differential \(\Delta {y}_{i}\) for each i. In this case, the XOR distribution between inputs and outputs of S-box must be determined. Mathematically, the measurement of differential uniformity of a given S-box is the differential approximation probability DP defined as follows:
where \(X\) is the set of \(2^{m}\) possible input values.
The smaller the DP score, the stronger the ability of the S-box to resist the differential cryptanalysis attacks, and vice versa.
1.6 Linear approximation probability (LP)
The maximum value of the imbalance of an event is represented by the linear approximation probability LP. The parity of input and output bits selected by the mask Γx and Γy, respectively, is equal. Matsui in [51] defines the linear approximation probability (or probability of bias) of a given S-box as follows:
where \(\Gamma x\) and \(\Gamma y\) are the input and output masks, respectively; \(X\) is the set of \(2^{m}\) possible inputs.
1.7 Transparency order (TO)
Transparency order metric is a resistance measuring metric for the S-box to differential power analysis (DPA) attacks [52]. Some cryptographically strong Boolean functions or S-boxes have been found to be poorly robust in DPA attacks such as AES reverse mappings [53]. The mathematical formulation of transparency order \(\tau _{S}\) for an S-box [52, 53] is presented as follows:
where \({\text{HW}}\left( \beta \right)\) denotes the Hamming weight of \(\beta\), and \(W_{{\alpha ,S}} \left( {u,v} \right)\) is calculated as follows:
Rights and permissions
About this article
Cite this article
Zamli, K.Z., Kader, A., Din, F. et al. Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization. Neural Comput & Applic 33, 16641–16658 (2021). https://doi.org/10.1007/s00521-021-06260-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-021-06260-8