Advertisement

Neural Computing and Applications

, Volume 31, Issue 11, pp 7201–7210 | Cite as

A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map

  • Hussam A. AhmedEmail author
  • Mohamad Fadli Zolkipli
  • Musheer Ahmad
Original Article

Abstract

Substitution boxes are essential nonlinear components responsible to impart strong confusion and security in most of modern symmetric ciphers. Constructing efficient S-boxes has been a prominent topic of interest for security experts. With an aim to construct cryptographically efficient S-box, a novel scheme based on firefly (FA) optimization and chaotic map is proposed in this paper. The anticipated approach generates initial S-box using chaotic map. The meta-heuristic FA is applied to find notable configuration of S-box that satisfies the criterions by guided search for near-optimal features by minimizing fitness function. The performance of proposed approach is assessed through well-established criterions such as bijectivity, nonlinearity, strict avalanche criteria, bit independence criteria, differential uniformity, and linear approximation probability. The obtained experimental results are compared with some recently investigated S-boxes to demonstrate that the proposed scheme has better proficiency of constructing efficient S-boxes.

Keywords

Substitution box Firefly algorithm Discrete chaotic map Symmetric ciphers 

Notes

Compliance with ethical standards

Conflict of interest

The authors declare that there is no conflict of interests.

References

  1. 1.
    Özkaynak F, Yavuz S (2013) Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn 74(3):551–557MathSciNetzbMATHCrossRefGoogle Scholar
  2. 2.
    Ahmad M, Ahmad F, Nasim Z, Bano Z, Zafar S (2015) Designing chaos based strong substitution box. In: Paper presented at the eighth international conference on contemporary computing (IC3), pp 97–100Google Scholar
  3. 3.
    Hussain I, Shah T, Gondal M (2012) A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyn 70(3):1791–1794MathSciNetCrossRefGoogle Scholar
  4. 4.
    Shannon CE (1949) Communication theory of secrecy systems. Bell Labs Tech J 28(4):656–715MathSciNetzbMATHCrossRefGoogle Scholar
  5. 5.
    Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst I Fundam Theory Appl 48(2):163–169MathSciNetzbMATHCrossRefGoogle Scholar
  6. 6.
    Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fractals 23(2):413–419zbMATHCrossRefGoogle Scholar
  7. 7.
    Wang Y, Wong K-W, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A 376(6):827–833zbMATHCrossRefGoogle Scholar
  8. 8.
    Khan M, Shah T, Mahmood H, Gondal MA, Hussain I (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70(3):2303–2311MathSciNetCrossRefGoogle Scholar
  9. 9.
    Lambić D (2017) A novel method of S-box design based on discrete chaotic map. Nonlinear Dyn 87(4):2407–2413MathSciNetCrossRefGoogle Scholar
  10. 10.
    Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design. Procedia Comput Sci 57:572–580CrossRefGoogle Scholar
  11. 11.
    Hussain I, Shah T, Gondal MA, Khan WA, Mahmood H (2013) A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput Appl 23(1):97–104CrossRefGoogle Scholar
  12. 12.
    Özkaynak F, Özer A (2010) A method for designing strong S-Boxes based on chaotic Lorenz system. Phys Lett A 374(36):3733–3738zbMATHCrossRefGoogle Scholar
  13. 13.
    Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and Teaching–Learning-Based Optimization. Nonlinear Dyn 88(2):1059–1074CrossRefGoogle Scholar
  14. 14.
    Yang X-S (2013) Multiobjective firefly algorithm for continuous optimization. Eng Comput 29(2):175–184CrossRefGoogle Scholar
  15. 15.
    Kazem A, Sharifi E, Hussain FK, Saberi M, Hussain OK (2013) Support vector regression with chaos-based firefly algorithm for stock market price forecasting. Appl Soft Comput 13(2):947–958CrossRefGoogle Scholar
  16. 16.
    Fister I, Fister I Jr, Yang X-S, Brest J (2013) A comprehensive review of firefly algorithms. Swarm Evol Comput 13:34–46CrossRefGoogle Scholar
  17. 17.
    Yang X-S (2010) Firefly algorithm, stochastic test functions and design optimisation. Int J Bio-Inspired Comput 2(2):78–84CrossRefGoogle Scholar
  18. 18.
    Lukasik S, Zak S (2009) Firefly algorithm for continuous constrained optimization tasks. In: International conference on computational collective intelligence, pp 97–106Google Scholar
  19. 19.
    Yang X-S, Hosseini SSS, Gandomi AH (2012) Firefly algorithm for solving non-convex economic dispatch problems with valve loading effect. Appl Soft Comput 12(3):1180–1186CrossRefGoogle Scholar
  20. 20.
    Senthilnath J, Omkar S, Mani V (2011) Clustering using firefly algorithm: performance study. Swarm Evol Comput 1(3):164–171CrossRefGoogle Scholar
  21. 21.
    Fister Jr I, Yang X-S, Fister I, Brest J (2012) Memetic firefly algorithm for combinatorial optimization. arXiv preprint arXiv:1204.5165
  22. 22.
    Horng M-H (2012) Vector quantization using the firefly algorithm for image compression. Expert Syst Appl 39(1):1078–1091CrossRefGoogle Scholar
  23. 23.
    Yang X-S, Deb S, Hanne T, He X (2015) Attraction and diffusion in nature-inspired optimization algorithms. Neural Comput Appl, pp 1–8Google Scholar
  24. 24.
    Yang X-S (2014) Cuckoo search and firefly algorithm. Studies in computational intelligence, vol 516. Springer, SwitzerlandCrossRefGoogle Scholar
  25. 25.
    Gandomi A, Yang X-S, Talatahari S, Alavi A (2013) Firefly algorithm with chaos. Commun Nonlinear Sci Numer Simul 18(1):89–98MathSciNetzbMATHCrossRefGoogle Scholar
  26. 26.
    Yang X-S (2015) Analysis of firefly algorithms and automatic parameter tuning. In: Emerging research on swarm intelligence and algorithm optimization. IGI Global, pp 36–49Google Scholar
  27. 27.
    Yang X-S (2009) Firefly algorithms for multimodal optimization. International symposium on stochastic algorithms, pp 169–178Google Scholar
  28. 28.
    Yang X-S (2010) Firefly algorithm, Levy flights and global optimization. Research and development in intelligent systems XXVI:209–218Google Scholar
  29. 29.
    Yang X-S (2010) Nature-inspired metaheuristic algorithms. Luniver Press, BeckingtonGoogle Scholar
  30. 30.
    Farahani SM, Abshouri A, Nasiri B, Meybodi M (2011) A Gaussian firefly algorithm. Int J Mach Learn Comput 1(5):448CrossRefGoogle Scholar
  31. 31.
    Yang X-S, He X (2013) Firefly algorithm: recent advances and applications. Int J Swarm Intell 1(1):36–50CrossRefGoogle Scholar
  32. 32.
    Pal SK, Rai C, Singh AP (2012) Comparative study of firefly algorithm and particle swarm optimization for noisy non-linear optimization problems. Int J Intell Syst Appl 4(10):50Google Scholar
  33. 33.
    Lehmer DH (1960) Teaching combinatorial tricks to a computer. Proc Symp Appl Math Comb Anals 10:179–193MathSciNetzbMATHCrossRefGoogle Scholar
  34. 34.
    Lambić D (2015) A new discrete chaotic map based on the composition of permutations. Chaos Solitons Fractals 78:245–248MathSciNetzbMATHCrossRefGoogle Scholar
  35. 35.
    Özkaynak F (2015) A novel method to improve the performance of chaos based evolutionary algorithms. Optik-Int J Light Electron Opt 126(24):5434–5438CrossRefGoogle Scholar
  36. 36.
    Lambić D, Nikolić M (2017) Pseudo-random number generator based on discrete-space chaotic map. Nonlinear Dyn 90(1):223–232MathSciNetCrossRefGoogle Scholar
  37. 37.
    Daemen J, Rijmen V (1999) AES proposal: Rijndael. In: First advanced encryption conference, CaliforniaGoogle Scholar
  38. 38.
    Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72MathSciNetzbMATHCrossRefGoogle Scholar
  39. 39.
    Matsui M (1993) Linear cryptanalysis method for DES cipher. Workshop on the theory and application of cryptographic techniques, pp 386–397Google Scholar
  40. 40.
    Dawson M, Tavares SE (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Workshop on the Theory and Application of of Cryptographic Techniques:352–367Google Scholar
  41. 41.
    Wang Y, Xie Q, Wu Y, Du B (2009) A software for S-box performance analysis and test. International Conference on Electronic commerce and business intelligence:125–128Google Scholar
  42. 42.
    Adams C, Tavares S (1989) Chapter-4. In: Advances in cytology. Proceedings of CRYPTO_89. Lecture Notes in Computer ScienceGoogle Scholar
  43. 43.
    Webster A, Tavares SE (1985) On the design of S-boxes. In: Conference on the theory and application of cryptographic techniques, pp 523–534Google Scholar
  44. 44.
    Pieprzyk J, Finkelstein G (1988) Towards effective nonlinear cryptosystem design. IEE Proc E-Comput Digit Tech 135(6):325–335CrossRefGoogle Scholar
  45. 45.
    Lambić D (2014) A novel method of S-box design based on chaotic map and composition method. Chaos Solitons Fractals 58:16–21zbMATHCrossRefGoogle Scholar
  46. 46.
    Cui L, Cao Y (2007) A new S-box structure named Affine-Power-Affine. Int J Innov Comput Inf Control 3(3):751–759Google Scholar
  47. 47.
    Belazi A, El-Latif AAA (2017) A simple yet efficient S-box method based on chaotic sine map. Optik-Int J Light Electron Opt 130:1438–1444CrossRefGoogle Scholar
  48. 48.
    Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos Solitons Fractals 31(3):571–579MathSciNetzbMATHCrossRefGoogle Scholar
  49. 49.
    Khan M, Shah T, Batool SI (2016) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput Appl 27(3):677–685CrossRefGoogle Scholar
  50. 50.
    Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Comput Appl 29(4):993–999CrossRefGoogle Scholar
  51. 51.
    Anees A, Ahmed Z (2015) A technique for designing substitution box based on van der pol oscillator. Wireless Pers Commun 82(3):1497–1503CrossRefGoogle Scholar
  52. 52.
    Özkaynak F (2017) Construction of robust substitution boxes based on chaotic systems. Neural Computing and Applications, pp 1–10Google Scholar
  53. 53.
    Khan M, Shah T, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73(3):1795–1801MathSciNetCrossRefGoogle Scholar
  54. 54.
    Çavuşoğlu Ünal, Zengin Ahmet, Pehlivan Ihsan, Kaçar Sezgin (2017) A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn 87(2):1081–1094zbMATHCrossRefGoogle Scholar
  55. 55.
    Jamal SS, Khan MU, Shah T (2016) A watermarking technique with chaotic fractional S-box transformation. Wireless Pers Commun 90(4):2033–2049CrossRefGoogle Scholar
  56. 56.
    Khan M, Shah T (2015) An efficient construction of substitution box with fractional chaotic system. SIViP 9(6):1335–1338MathSciNetCrossRefGoogle Scholar
  57. 57.
    Özkaynak Fatih, Çelik Vedat, Özer Ahmet Bedri (2017) A new S-box construction method based on the fractional-order chaotic Chen system. SIViP 11(4):659–664CrossRefGoogle Scholar
  58. 58.
    ul Islam F, Liu G (2017) Designing S-Box Based on 4D-4Wing Hyperchaotic System. 3D Res 8(1):9CrossRefGoogle Scholar
  59. 59.
    Chen G (2008) A novel heuristic method for obtaining S-boxes. Chaos Solitons Fractals 36(4):1028–1036MathSciNetzbMATHCrossRefGoogle Scholar
  60. 60.
    Liu G, Yang W, Liu W, Dai Y (2015) Designing S-boxes based on 3-D four-wing autonomous chaotic system. Nonlinear Dyn 82(4):1867–1877MathSciNetCrossRefGoogle Scholar

Copyright information

© The Natural Computing Applications Forum 2018

Authors and Affiliations

  • Hussam A. Ahmed
    • 1
    Email author
  • Mohamad Fadli Zolkipli
    • 1
  • Musheer Ahmad
    • 2
  1. 1.Faculty of Computer System and Software EngineeringUniversiti Malaysia PahangKuantanMalaysia
  2. 2.Department of Computer EngineeringJamia Millia IslamiaNew DelhiIndia

Personalised recommendations