Jun Peng, Shangzhu Jin, Shaoning Pang, Du Zhang, Lixiao Feng, Zuojin Li, Yingxu Wang
{"title":"基于量子混沌与PWLCM混沌映射相结合的s盒构造方法","authors":"Jun Peng, Shangzhu Jin, Shaoning Pang, Du Zhang, Lixiao Feng, Zuojin Li, Yingxu Wang","doi":"10.4018/IJCINI.20211001.OA24","DOIUrl":null,"url":null,"abstract":"For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) plays a crucial role to resist cryptanalysis. This article incorporates quantum chaos and PWLCM chaotic map into a new method of S-box design. The secret key is transformed to generate a sextuple system parameter, which is involved in the generation process of chaotic sequences of two chaotic systems. The output of one chaotic system will disturb the parameters of another chaotic system in order to improve the complexity of encryption sequence. S-box is obtained by XOR operation of the output of two chaotic systems. Over the obtained 500 key-dependent S-boxes, the authors test the S-box cryptographical properties on bijection, nonlinearity, SAC, BIC, differential approximation probability, respectively. Performance comparison of proposed S-box with those chaos-based one in the literature has been made. The results show that the cryptographic characteristics of proposed S-box has met the design objectives and can be applied to data encryption, user authentication and system access control.","PeriodicalId":43637,"journal":{"name":"International Journal of Cognitive Informatics and Natural Intelligence","volume":"38 1","pages":"1-17"},"PeriodicalIF":0.6000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"S-Box Construction Method Based on the Combination of Quantum Chaos and PWLCM Chaotic Map\",\"authors\":\"Jun Peng, Shangzhu Jin, Shaoning Pang, Du Zhang, Lixiao Feng, Zuojin Li, Yingxu Wang\",\"doi\":\"10.4018/IJCINI.20211001.OA24\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) plays a crucial role to resist cryptanalysis. This article incorporates quantum chaos and PWLCM chaotic map into a new method of S-box design. The secret key is transformed to generate a sextuple system parameter, which is involved in the generation process of chaotic sequences of two chaotic systems. The output of one chaotic system will disturb the parameters of another chaotic system in order to improve the complexity of encryption sequence. S-box is obtained by XOR operation of the output of two chaotic systems. Over the obtained 500 key-dependent S-boxes, the authors test the S-box cryptographical properties on bijection, nonlinearity, SAC, BIC, differential approximation probability, respectively. Performance comparison of proposed S-box with those chaos-based one in the literature has been made. The results show that the cryptographic characteristics of proposed S-box has met the design objectives and can be applied to data encryption, user authentication and system access control.\",\"PeriodicalId\":43637,\"journal\":{\"name\":\"International Journal of Cognitive Informatics and Natural Intelligence\",\"volume\":\"38 1\",\"pages\":\"1-17\"},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2021-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Cognitive Informatics and Natural Intelligence\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/IJCINI.20211001.OA24\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cognitive Informatics and Natural Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/IJCINI.20211001.OA24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
S-Box Construction Method Based on the Combination of Quantum Chaos and PWLCM Chaotic Map
For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) plays a crucial role to resist cryptanalysis. This article incorporates quantum chaos and PWLCM chaotic map into a new method of S-box design. The secret key is transformed to generate a sextuple system parameter, which is involved in the generation process of chaotic sequences of two chaotic systems. The output of one chaotic system will disturb the parameters of another chaotic system in order to improve the complexity of encryption sequence. S-box is obtained by XOR operation of the output of two chaotic systems. Over the obtained 500 key-dependent S-boxes, the authors test the S-box cryptographical properties on bijection, nonlinearity, SAC, BIC, differential approximation probability, respectively. Performance comparison of proposed S-box with those chaos-based one in the literature has been made. The results show that the cryptographic characteristics of proposed S-box has met the design objectives and can be applied to data encryption, user authentication and system access control.
期刊介绍:
The International Journal of Cognitive Informatics and Natural Intelligence (IJCINI) encourages submissions that transcends disciplinary boundaries, and is devoted to rapid publication of high quality papers. The themes of IJCINI are natural intelligence, autonomic computing, and neuroinformatics. IJCINI is expected to provide the first forum and platform in the world for researchers, practitioners, and graduate students to investigate cognitive mechanisms and processes of human information processing, and to stimulate the transdisciplinary effort on cognitive informatics and natural intelligent research and engineering applications.