Next Article in Journal
Universal Features in Phonological Neighbor Networks
Previous Article in Journal
The Entropy of Deep Eutectic Solvent Formation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes

1
Department of Information Technology, University of Jeddah, Jeddah 21589, Saudi Arabia
2
Department of Computer Engineering, Jamia Millia Islamia, New Delhi 110025, India
3
Department of Physics, Aristotle University of Thessaloniki, 54124 Thessaloniki, Greece
4
Department of Computer Engineering, Aligarh Muslim University, Aligarh 202002, India
*
Author to whom correspondence should be addressed.
Submission received: 25 May 2018 / Revised: 28 June 2018 / Accepted: 9 July 2018 / Published: 12 July 2018
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
In this paper, we present a novel method to construct cryptographically strong bijective substitution-boxes based on the complicated dynamics of a new hyperchaotic system. The new hyperchaotic system was found to have good characteristics when compared with other systems utilized for S-box construction. The performance assessment of the proposed S-box method was carried out based on criteria, such as high nonlinearity, a good avalanche effect, bit-independent criteria, and low differential uniformity. The proposed method was also analyzed for the batch-generation of 8 × 8 S-boxes. The analyses found that through a proposed purely chaos-based method, an 8 × 8 S-box with a maximum average high nonlinearity of 108.5, or S-boxes with differential uniformity as low as 8, can be retrieved. Moreover, small-sized S-boxes with high nonlinearity and low differential uniformity are also obtainable. A performance comparison of the anticipated method with recent S-box proposals proved its dominance and effectiveness for a strong bijective S-box construction.

1. Introduction

Recent advancements in cloud computing, smart devices, social media, etc., for communication have substantially raised the amount of users’ private data. Consequently, the issue of ensuring and maintaining end to end confidentiality of sensitive data has become more prominent than before. To provide data secrecy for storage and communication, block cryptosystems have been playing a crucial role in the past few decades. In modern block ciphers, cryptographically potent S-boxes are meant to serve this purpose to meet Shannon’s requirement of confusion. S-boxes are cornerstone components in many substitution-permutation (S-P) networks or Fiestal networks-based block cryptosystems, such as the famous data encryption standard (DES), Blowfish, advanced encryption standard (AES), Anubis, PRESENT, etc. [1]. According to C.E. Shannon, the confusion establishes a correlation between a secret key and the encrypted text such that it is as complicated and intricate as possible [2]. To achieve a strong confusion, applying complicated and highly nonlinear transformations is demanded. The security of block ciphers directly relies on the strength of the S-boxes employed. Therefore, designing methods that are credible to yield strong S-boxes have drawn the attention of security experts and researchers worldwide [3].
An n × n substitution-box takes a small block of n bits and transforms it to an output that is n bits long. It acts as a nonlinear mapping S: {0, 1}n → {0, 1}n [4], and can be viewed as a Boolean vector that consists of n Boolean functions, each in n-variable as S: gn(x)gn−1(x)……g1(x), where each gi(x) is a function from {0, 1}n to {0, 1}, and gi(a) = bi for i = 1, 2, ……, n [5]. A Boolean function gi is balanced if its outputs have an equal distribution of 0’s and 1’s. A bijective S-box of size n × n, involving balanced component functions, has distinct pre-images in the range [0, 2n − 1]. The bijectivity of the S-box is verified through the satisfaction of h w t ( i = 1 n a i g i ) = 2 n 1 [5], where, hwt() denotes the hamming weight, a i { 0 , 1 } , and (a1, a2, …, a8) ≠ (0, 0, …, 0). Bijective S-boxes of different sizes have significance in many cryptographic primitives and S-P network based ciphers. They have been utilized in many popular ciphers such as AES, PRESENT, ARIA, KASUMI, hash function KECCAK, etc. [1]. Recently, the application of S-boxes has also been investigated for the design of image encryption, video encryption, watermarking, pseudo-random sequence design, etc.
Chaos is a ubiquitous phenomenon in nature that is being widely utilized for numerous applications in various fields of study, such as engineering, mathematics, physics, biology, and so on [6]. It has deterministic and noise-like behavior, and it is present in nonlinear dynamical systems. The generated sequences from chaotic systems are extremely sensitive to their initial conditions, have a long periodicity, ergodicity, and spread spectrum [7]. These features of chaotic systems have a close correlation with properties of cryptography. Therefore, they have been a preferred choice for designing security primitives and cryptosystems in chaos-based cryptography for long time [8].
A dynamical system is said to have a high sensitivity to initial conditions and parameters provided that it has positive Lyapunov exponent(s). The Lyapunov exponent (LE) of a nonlinear dynamical system refers to the pace of separation of infinitesimally close trajectories. Mathematically, it is defined as:
L E i = l i m t 1 t log 2 [ p i ( t ) p i ( 0 ) ]
where pi(t) denotes the length of the respective ellipsoidal principal axis. An n-D system has n number of Lyapunov exponents. Presence of only one positive exponent indicates the existence of chaotic behavior in a system. Whereas, if it has at least two positive LEs, then the system is hyperchaotic in nature [9]. Simple-structured and one positive LE dynamical systems tend to possess weak security due to a common correlation that allows it to be cryptanalyzed [10]. Compared to chaotic systems, hyperchaotic systems tend to show more complex dynamics. The minimum dimension for a dynamic system to exhibit hyperchaotic nature should be 4-D. The research has matured in the direction of designing higher dimensional hyperchaotic systems and the present focus is on designing 5-D systems with better dynamics and characteristics [10,11,12,13,14,15]. Hyperchaotic systems have found applications in the area of security for realizing cryptosystems [16], hash functions [17], secure communication [18], S-boxes [19], etc.
In the recent past, a number of high-dimensional chaotic systems have been utilized to design methods for S-box generation. Of late, Islam et al. investigated a 4-D hyperchaotic system where two pseudo-random 8-bit integer sequences were produced, which gave rise to an S-box after a two-position swap operation [19]. In Reference [20], Özkaynak adopted a Lorenz chaotic system by sampling the system trajectory after gaps of time steps. A coding table was formed, which resulted in an S-box after some shifting operations. The method of Khan et al. [21] explored multiple systems, namely 3D Lorenz and Rössler chaotic systems, to randomly generate all possible elements of an 8 × 8 S-box. The same author investigated a fractional order Rössler chaotic system and suggested a simple method to synthesise S-boxes in Reference [22]. It was noted that their design is consistent for secure communication. Liu et al. [23] applied a 3-D four-wing chaotic system to generate S-boxes with a good performance. In Reference [24], another simple method was developed for S-boxes based on a fractional-order Chen chaotic system. Cavusoglu et al. [25] scaled the 3-D Zhongtang chaotic system to design a random number generator (RNG) for constructing 8 × 8 S-boxes based on this RNG.
In this paper, a new high-dimensional hyperchaotic system is explored for generating strong S-boxes. The proposed hyperchaos-based S-box construction method is capable of synthesizing strong bijective S-boxes, and was found to possess excellent cryptographic strength when compared with some recent S-box proposals. The main contributions of this paper include the following:
  • A 5-D hyperchaotic system is proposed that has twelve terms, seven system parameters, and three cubic nonlinear product terms.
  • Based on the new hyperchaotic system, an S-boxes construction method is proposed to synthesize efficient 8 × 8 S-boxes, and these are compared with recent methods.
  • Performance of the same method is also investigated for a generation of small-sized bijective S-boxes ranging from size 4 × 4 to 7 × 7, and is compared with some rare and prominent methods.
The remaining content of the paper is as follows. The model of the newly proposed 5-D hyperchaotic system is discussed and analyzed in Section 2. The proposed method for constructing strong S-boxes is presented in Section 3. Performance assessment of proposed method for S-boxes is performed in Section 4 and compared with some of the most recent S-box methods. This section is subsequently followed by conclusions drawn in Section 5.

2. 5-D Hyperchaotic System

Our novel 5-D nonlinear dynamical system is governed by the following state equations:
x ˙ = c 1 x + c 1 y y ˙ = c 2 x + c 2 y + w x z u z ˙ = c 3 y c 4 z c 5 u + x y u u ˙ = c 6 u + x y z w ˙ = c 7 x c 7 y }
where, ci (1 ≤ i ≤ 7) are the system’s seven constants and x(0), y(0), z(0), u(0), w(0) are the initial conditions that decide its trajectories in phase space. Computation of Lyapunov exponents is performed following the well-known procedure reported in Reference [26]. Interestingly, when parameters are set as ci = {30, 10, 15.7, 5, 2.5, 4.45, 38.5}, the obtained Lyapunov exponents for system (2) are LE1 = 4.90182, LE2 = 0.38463, LE3 = 0, LE4 = −15.86286, and LE5 = −31.90952, thereby confirming the existence of hyperchaos as there are two positive exponents. The proposed 5-D hyperchaotic system (2) holds some positive characteristics, which are as follows:
  • It contains three cubic-order nonlinear product terms, which is rare as the order of nonlinear product terms is usually quadratic; this strengthens the system against some parameter identification attacks [27].
  • It has a large number of systems parameters, namely seven; these are with five initial conditions that heavily enlarge the secret key space of the respective security primitive to make brute-force attack impractical.
  • The value of the largest Lyapunov exponent is 4.90182, which is quite high. This value is substantially higher than 0.9899 [10], 0.0981 [11], 0.0792 [12], 0.4195 [13], and 0.5441 [14] in recent 5-D hyperchaotic systems. A larger positive Lyapunov exponent shows that system trajectories vary more sharply in phase space and this makes the system’s dynamics more complicated by establishing stronger sensitivity to initial conditions.
  • It is invariant under coordinate transformation (x, y, z, u, w) → (−x, −y, −z, −u, −w); that is, the symmetry persists for all system variables.
  • The Kaplan-Yorke (Lyapunov) dimension DKY for any dynamical system is defined as [28]:
    D K Y = j + 1 | L E j + 1 | i = 1 j L E i
    where, j is the largest integer for which i = 1 j L E i 0 and i = 1 j + 1 L E i < 0 . The Lyapunov dimension DKY for the hyperchaotic system (2) is DKY = 3.334, which indicates that the Lyapunov dimension of our system is fractional.
  • The vector field of our system (2) has negative divergence as:
    V = x ˙ x + y ˙ y + z ˙ z + u ˙ u + w ˙ w = c 1 + c 2 c 4 c 6 < 0
    This indicates that the system (2) is dissipative in nature, with an exponential contraction rate of d V d t = e ( c 1 c 2 + c 4 + c 6 ) t . Dissipation is needed to attract trajectories in the system’s phase space.
The characteristics of the proposed nonlinear system (2) are compared with some high-dimensional chaotic/hyperchaotic systems adopted by researchers to construct S-boxes in Table 1. It is worth noting that unlike our method, in all high dimensional system based S-box methods [19,20,21,22,23,24,25,29], the systems were not modeled by S-box investigators. The comparison table ascertains that system (2) holds excellent characteristics over other adopted systems. Figure 1 displays the phase portraits of the proposed system in various planes and phase spaces. It should be noted that the phase portrait is only an indicative tool for displaying a system’s dynamic behavior. Thus, from the phase portraits, we assume the system’s (2) complex behavior, which is confirmed by the calculation of the Lyapunov exponents for a chosen set of the system’s parameters.

3. Proposed Bijective S-Box Generation Method

The method proposed to efficiently search for S-boxes using the new 5-D hyperchaotic system is provided below. This method performs a random search on the basis of the maximization of nonlinearity to find an optimal configuration of the SG S-box. The proposed method calls the hyperchaos5D() routine, which solves system (2) using Runge-Kutta of order 4 with a step size of 0.001, and takes the initial conditions of five state variables to produce the variable’s floating values after t0 or τ iterations. Routine reverse() is intended to reverse the input vector. CreateS() is used to prepare an S-box candidate using a random input vector, and the sort() function performs sorting of the input array in increasing order. The routine nonlinearity() is meant to compute the average of the nonlinearities of all component Boolean functions of the input S-box. The details of the nonlinearity metric are discussed in Section 4. The max() function returns the largest among all inputs and index [1,5] return the largest value in the input vector.
The proposed method prefers an S-box over previous methods on the basis of nonlinearity of the S-boxes. Since these two are considered to be mainly responsible for strong confusion, nonlinear transformation, and the potential to mitigate differential and linear attacks. S-box SG is updated as SP if and only if SP is no worse than SG on the grounds of nonlinearity. The target nonlinearities for the bijective S-box of dimension n = 4, 5, 6, 7, 8 are 4, 12, 24, 56, 112, respectively [30].
1. Assign initial values to size n, parameters ci, initial conditions for x, y, z, u, w, t0, τ, itr_max
   Set nl_max = 0, numel = 2n, len = numel/2, x1(0) = x, x2(0) = y, x3(0) = z, x4(0) = u, x5(0) = w
2.  Take SP, SG as two empty look-up tables(LUTs) and five empty arrays Xj, each of size numel
3. Iterate system (2) t0 times to die out the transient effect and discard xj except the last:
    [x1, x2, x3, x4, x5] = hyperchaos5D(x1(0), x2(0), x3(0), x4(0), x5(0), t0)
    x1(0) = x1, x2(0) = x2, x3(0) = x3, x4(0) = x4, x5(0) = x5
4. Generate the lower halves of the random arrays Xj as:
    for k = 1 to len
    [x1, x2, x3, x4, x5] = hyperchaos5D(x1(0), x2(0), x3(0), x4(0), x5(0), τ)
    xj(0) = (xj × 10,000) − floor(xj × 10,000)
    Xj(k + len) = xj(0)
    end
5. Generate new higher halves of the random arrays Xj as:
    Xj = reverse(Xj)
    for k = 1 to len
    [x1, x2, x3, x4, x5] = hyperchaos5D(x1(0), x2(0), x3(0), x4(0), x5(0), τ)
    xj(0) = (xj × 10,000) − floor(xj × 10,000)
    Xj(k + len) = xj(0)
    end
6. Create S-box candidates:
    Sj = CreateS(Xj)
7. Compute nonlinearity of candidates Sj:
    nlj = nonlinearity(Sj)
8. Choose the local best candidate:
    [nlP, index] = max(nl1, nl2, nl3, nl4, nl5)
    SP = Sindex // where, Sindex = Sj for j = index
9. Update the global best candidate (if required):
    If (nlPnl_max)
    SG = SP
    nl_max = nlP
    end
10. Repeat from step 5 for itr_max times.
11. Declare SG as the final S-box and display as LUT.
S = CreateS(X)
1. Y = sort(X)
2. for k1 = 1 to numel
3.  t = Y(k1)
4.  for k2 = 1 to numel
5.   if(t = = X(k2))
6.    S(k1) = k2 − 1
7.    break
8.   end
9.  End
10. end

4. Performance Analysis

For the simulation, the experimental values are initialized as ci as provided earlier, x1(0) = 0.8, x2(0) = 4.9, x3(0) = 7.6, x4(0) = 3.7, x5(0) = 6.5, t0 = 1000, and τ = 2. The secret key includes ci, xj(0), t0, and τ. In order to avoid the problem of dynamic degradation, we carried out all floating point computation as per the IEEE-754 floating point standard of double floating point arithmetic. In our working 15-digit precision implementation system, the key space is more than 10180 ≈ 2598, which quite large enough to resist brute-force attack. The proposed S-box obtained for n = 8 is shown in Table 2. It is well-known that an S-box is deemed strong if it satisfies a number of performance criteria. This section deals with the performance analysis of the proposed 8 × 8 S-box against a number of well-accepted criteria, such as bijectivity, nonlinearity, strict avalanche criteria, bits independent criterion, differential uniformity, and linear approximation probability [19,20,21,22,23,24,25,31]. The security strength of the S-box in Table 2 is compared with recent S-boxes.

4.1. Bijectiveness

A bijective function is a combination of one-to-one (injective) and onto (surjective) mapping functions. It implies that every element of one set is paired with exactly one element of the other set, and vice versa, with no unpaired elements. This is an important property that is used to test the cryptographic liability of S-boxes. It is verified from S-box LUTs that a proposed S-box satisfies the bijectivity property as it has distinct pre-images in a specified range.

4.2. Nonlinearity

In the nonlinearity analysis, the constituent Boolean functions were assessed with reference to the behavior of the input/output bit patterns. The set of all affine functions is used to compare the distance from the given Boolean function. Once the initial distance is determined, the bits in the truth table of the Boolean function were modified to approximate to the closest affine function. The number of modifications required to reach the closest affine functions determined the nonlinearity of the Boolean function. In practice, the nonlinearity of the Boolean function g in n-variable is measured using Equation (3) through Walsh spectrum [32]:
n l ( g ) = 2 n 1 ( 1 2 n max ω { 0 , 1 } n | W S g ( ω ) | )
where WSg(ω) is the Walsh spectrum of function g, computed as:
W S g ( ω ) = x { 0 , 1 } n ( 1 ) g ( x ) x . ω
where, x.ω refers to a bit-by-bit dot product and ω {0, 1}n. It is also expressed as the least hamming distance between the set of all non-constant linear combinations of function g and set of all affine functions on {0, 1}n [33]. The best affine and linear approximation attacks [34,35] show the significance of constructing S-boxes with high nonlinearity. The nonlinearity of Boolean functions in the proposed 8 × 8 S-box, provided in Table 3, are found as nl(g1) = 110, nl(g2) = 108, nl(g3) = 110, nl(g4) =106, nl(g5) = 108, nl(g6) = 108, nl(g7) = 110, and nl(g8) = 108, showing that nlmin = 106, nlmax = 110, and nlavg = 108.5. The nonlinearity values of all component functions were quite high, and larger than or equal to 106. It clearly shows the nonlinearity of the proposed S-box.

4.3. Strict Avalanche Criteria

The idea of a strict avalanche criterion (SAC) is a generalization of the avalanche effect, introduced by Webster and Tavares in 1985 [36], is based on Shannon’s property of diffusion and implies that a little change in input causes a significant effect in the output. According to Webster and Tavares, if a Boolean function satisfies SAC, it means that if we change any one of the input bits, then all the output bits should change with a probability of a half. The SAC can be evaluated through an 8 × 8 dependency matrix by a procedure suggested in Reference [36]. The average of this matrix is referred to as the SAC value. We calculated the dependency matrix for the proposed S-box and this is shown in Table 4. It can be seen that almost all values are somewhat close to 0.5. The average of the dependency matrix is SAC = 0.5017, which is fairly close to the theoretical SAC with an offset of only 0.0017; this shows that the proposed S-box exhibited a good avalanche effect and satisfied the stated criteria well.

4.4. Bits Independence Criteria

The bits independent criterion (BIC) manages testing an individual bit at the input of the cipher by playing out the flip operation. It implies that all the avalanche vectors ought to be match pair-wise independent for a given arrangement of vectors produced by complementing a solitary plaintext bit. The avalanche vectors are created by bit patterns generated because of flipping bit(s) at the inputs. It is an attractive property for any cryptographic primitive. The S-box fulfills BIC if the function g = gi xor gj (ij, 1 ≤ i, j ≤ 8) is highly nonlinear and also satisfies the SAC [32]. Based on this method, BIC for the proposed S-box was verified by computing the nonlinearity and SAC of g = gi xor gj [37]. The result of BIC for nonlinearity is provided in Table 5 and that of the BIC for the SAC is in Table 6. The average of the BIC-nonlinearity is 104 with a least value of 100 (a commendable score), and the average of the BIC-SAC matrix is 0.5006, which is very close to 0.5. The scores indicate that the proposed S-box is competent enough to satisfy the output bits independence criteria.

4.5. Differential Uniformity

The differential uniformity (DU) measure is associated with the change in the output or the differential output observed with respect to a change in input. Its intensity determines the S-box’s ability to resist the differential cryptanalysis framed by Biham and Shamir to break the famous DES block cipher [38]. The differential uniformity of an S-box ensures uniform mapping of the input and output differentials. It denotes the maximum likelihood of generating an output differential δb = bi xor bj when the input differential is δa = ai xor aj. Mathematically, it is expressed as [23,38,39]:
d u S = max δ a 0 , δ b ( # { a A | S ( a ) S ( a δ a ) = δ b } )
where, # denotes cardinality, and X is the set of all inputs x. The output exclusive XOR score as explained should have equal likelihood for a corresponding input score. As a good S-box design guideline, the maximum differential uniformity has to be kept as small as possible to resist differential cryptanalysis. Following the approach, an input/output XOR distribution matrix, for differential, is obtained for the proposed S-box and is provided in Table 7. The maximum differential uniformity for our S-box was 10, which is the highest value of the differential matrix in Table 7. The count of this highest value in differential table is only 4. This value of DU is compared with some recent S-boxes in Table 8 to show the effectiveness of proposed S-boxes.

4.6. Comparison

The comparison is done in Table 8 based on the criteria discussed in previous subsections. The outcomes of the comparisons are as follows:
The nonlinearity strength of the proposed S-box is worth noting as its average value nlavg of 108.5 was the highest among all S-box methods in Table 8. The nlmin is similar to three S-boxes in References [40,41,50,52], and better than all other S-boxes. Similarly, the nlmax value was comparable to two S-boxes investigated in References [25,33], and larger than the remaining S-boxes. Thus, the proposed S-box provided high nonlinearity, and in turn, strong confusion, and good resistance to linear and affine approximation attacks while transforming input plaintext bits to output bits.
The ideal value for SAC is 0.5, any value closer to this is considered as better than others. According to Table 8, our SAC of 0.5017 is closer to the ideal value and better than the SAC of almost all S-boxes in Table 8. However, all SAC scores in Table 8 were more or less close to 0.5 with almost negligible offsets. The proposed S-box satisfied the SAC criteria very well, and marginally outperformed most of the other S-boxes.
According to the BIC test, referring to Table 5 and Table 6 for our S-box, the average of the BIC-nonlinearity is 104, which is higher than the value reported in References [20,22,24,25,29,39,40,42,44,45,46,48,49,51], and the BIC-SAC is 0.5026, which is again quite close to 0.5 and better than in References [23,24,25,40,42,44,45,46,47,48,50,51]. The BIC performance of the proposed S-box for nonlinearity and SAC is satisfactory.
The S-box should have adequacy to thwart differential cryptanalysis as practiced by Biham and Shamir [38]. It is well accepted that an S-box having a lower DU offers more resistance to this cryptanalysis. It is worth noting that the DU of the proposed S-box was only 10, which is similar to the DU of the S-boxes investigated in References [19,20,23,24,25,39,40,43,49,50,52], and better than the DU of the S-boxes in References [21,22,29,33,41,42,43,44,45,46,47,48,51]. This means there is an excellent fulfillment of our method on the DU criteria of strong S-boxes.

4.7. Analysis of the Batch-Generation of 8 × 8 S-Boxes

This subsection deals with the performance analysis of all intermediate 8 × 8 SP S-boxes obtained while running the proposed method for itr_max = 100,000. The features of these S-box structures, such as average nonlinearity, differential uniformity, SAC, BIC-nonlinearity, and BIC-SAC, are shown graphically in Figure 2. The statistics of these S-boxes for worst, best, average cases, and different conditions are reported in Table 9 and Table 10.
Performance statistics showed that the batch-generation capability of the proposed method was excellent. Reason being, the worst, best, and average nonlinearities of all intermediate S-boxes are 102, 108.5, and 104.665, respectively, which is far better than the respective statistics of 99.25, 106.75, and 103.55, respectively, of S-box structures by Özkaynak’s recent method [40]. This means that all generated 100,000 S-boxes had an average nonlinearity equal to or above 102. The proposed method generated 90.932% S-boxes with average nonlinearity higher than or equal to 104, and 53.467% had a nonlinearity greater than or equal to 105. As far as differential uniformity is concerned, there were 40.871% S-boxes having a DU less of than or equal to 10. The worst DU was 18, and only 16 such S-boxes exists; the best achievable DU with the proposed method was 8, and there are five S-boxes with this lowest DU. By way of comparison, 18 and 10 are the worst and best achievable DU scores in Reference [40]. The features of all five S-boxes having the lowest DU by the proposed method are listed in Table 11. If we change the preference criteria in the proposed method to update the SG S-box from nonlinearity to differential uniformity, then the best obtainable S-box is S3 listed in Table 11. It is worth noting that the features of S-box S3 when compared with existing ones listed in Table 8 are cryptographically better than most of the S-boxes of Table 8. For the SAC criteria, there were 1717 S-boxes which have a SAC equal to the ideal value that is exactly 0.5. Our worst, best, and average SAC was 0.5249, 0.5, and 0.5019, respectively, which was slightly better than respective scores of 0.4832, 0.5264, and 0.5020, respectively, in Reference [40]. The number of S-boxes satisfying 0.495 ≤ SAC ≤ 0.505 is 62677. The worst, best, and average BIC-nonlinearity values were 100.5, 105.57, and 103.53, respectively. There exist more than 56% of all S-boxes whose BIC-Nonlinearity was higher than 103.5, and more than 21% with a BIC-NL above 104. Regarding BIC-SAC, the worst, best, and average scores are 0.5135, 0.5, and 0.5019, respectively, and as much as 85.7% of all S-boxes had a BIC-SAC in [0.495, 0.505]. Thereby, all generated S-boxes showed good satisfaction of the BIC property.
Thus, it is evident that the batch-generation capability of the proposed method for bijective S-boxes construction is commendable as it satisfies cryptographic properties reasonably well under different cases and conditions.

4.8. Performance of Small-Sized S-Boxes

In addition, we investigated the proposed method for the construction of small-sized bijective S-boxes of sizes 4 × 4, 5 × 5, 6 × 6, and 7 × 7. Different small-sized S-boxes obtained with the proposed method for different n are provided in Table 12. Their nonlinearity scores and differential uniformities are listed in Table 13. The generic methods that can synthesize S-boxes of varied small sizes are rarely investigated. In the literature, there exist optimization-based methods for the synthesis of bijective S-boxes for 5 ≤ n ≤ 8. In 1998, one such approach was suggested by Millan, which was based on a hill climbing technique for the evolution of S-boxes [53]. Fuller et al. applied a heuristic technique to optimize the power mapping-based S-boxes through some iterated mutation operations suggested by him [54]. In Reference [55], Laskari et al. adopted a particle swarm optimization and differential evolution techniques to obtain a number of optimized bijective S-boxes. Tesar designed a special genetic algorithm with a total tree search to evolve small-sized S-boxes in Reference [56]. Of late, Picek et al. has designed a new cost function for evolving S-boxes and different evolutionary techniques, such as genetic algorithm (GA), genetic with tree search (GaT), and local search algorithm (LSA), were analyzed for evolving S-boxes with a new cost function [30]. To justify the improved performance of our method, results were compared with these existing methods in Table 14. We reported the best results for all methods. It is clear from Table 14 that the proposed S-boxes had a significantly higher nonlinearity than existing methods for all sizes. The comparison verified the better performance of our proposed method for the construction of small-sized bijective S-boxes as well.

5. Conclusions

This paper reports a design procedure for cryptographic substitution-boxes using a hyper-chaotic system. Firstly, a new five-dimensional hyperchaotic system was modeled, which holds some merits over the existing systems. Then, the new hyper-chaotic system was utilized to propose a method for bijective S-box construction. The anticipated method systematically searched the best possible S-box for a given size on the basis of nonlinearity by exploiting the dynamics of new hyperchaotic system. Some standard performance criteria were applied to assess the security strength of the proposed S-box method. The obtained results were compared with some recent S-box proposals to justify the upright performance of the proposed method. The effectiveness of the batch-generation capability of our method was analyzed statistically. It showed that it was possible to obtain 8 × 8 S-boxes with a differential uniformity of 8. Additionally, the same method was also investigated to yield small-sized S-boxes. It has been shown that our method was competent enough to yield better nonlinear small-sized S-boxes. To the best of our knowledge, this is first chaos-based method that attempts to synthesis small-sized S-boxes. The S-box construction method is key-dependent and a large number of strong S-boxes can be obtained with a minute change of any of the key components. The proposed method for S-box generation satisfied all the criteria of a strong S-box very well, and the constructed S-boxes were suited for usage in a strong block cipher design and other security applications.

Author Contributions

This paper is the result of collaborated work of all the authors in all aspects.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Knudsen, L.R.; Robshaw, M.J. The Block Cipher Companion; Information Security and Cryptography; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
  2. Shannon, C.E. Communication Theory of Secrecy Systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  3. Ahmad, M.; Doja, M.N.; Beg, M.M.S. ABC Optimization Based Construction of Strong Substitution-Boxes. Wirel. Pers. Commun. 2018, 101, 1715–1729. [Google Scholar] [CrossRef]
  4. Makarim, R.H.; Tezcan, C. Relating Undisturbed Bits to Other Properties of Substitution Boxes; Lecture Notes in Computer Science Lightweight Cryptography for Security and Privacy; Springer: Cham, Switzerland, 2015; pp. 109–125. [Google Scholar]
  5. Picek, S.; Jakobovic, D.; Miller, J.F.; Marchiori, E.; Batina, L. Evolutionary Methods for the Construction of Cryptographic Boolean Functions; Lecture Notes in Computer Science Genetic Programming; Springer: Cham, Switzerland, 2015; pp. 192–204. [Google Scholar]
  6. Crilly, A.J.; Earnshaw, R.; Jones, H. (Eds.) Applications of Fractals and Chaos: The Shape of Things; Springer Science & Business Media: New York, NY, USA, 2013. [Google Scholar]
  7. Kocarev, L.; Galias, Z.; Lian, S. (Eds.) Intelligent Computing Based on Chaos; Springer: Berlin/Heidelberg, Germany, 2009. [Google Scholar]
  8. Kocarev, L.; Lian, S. (Eds.) Chaos-Based Cryptography: Theory, Algorithms and Applications; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
  9. Sprott, J.C. Elegant Chaos; World Scientific Singapore: Singapore, 2010. [Google Scholar]
  10. Yang, Q.; Bai, M. A new 5D hyperchaotic system based on modified generalized Lorenz system. Nonlinear Dyn. 2016, 88, 189–221. [Google Scholar] [CrossRef]
  11. Ojoniyi, O.S.; Njah, A.N. A 5D hyperchaotic Sprott B system with coexisting hidden attractors. Chaos Solitons Fractals 2016, 87, 172–181. [Google Scholar] [CrossRef]
  12. Vaidyanathan, S.; Pham, V.-T.; Volos, C.K. A 5-D hyperchaotic Rikitake dynamo system with hidden attractors. Eur. Phys. J. Spec. Top. 2015, 224, 1575–1592. [Google Scholar] [CrossRef]
  13. Vaidyanathan, S.; Volos, C.; Pham, V.-T. Hyperchaos, adaptive control and synchronization of a novel 5-D hyperchaotic system with three positive Lyapunov exponents and its SPICE implementation. Arch. Control Sci. 2014, 24, 409–446. [Google Scholar] [CrossRef] [Green Version]
  14. Yang, Q.; Chen, C. A 5D Hyperchaotic System with Three Positive Lyapunov Exponents Coined. Int. J. Bifurc. Chaos 2013, 23, 1350109. [Google Scholar] [CrossRef]
  15. Zarei, A. Complex dynamics in a 5-D hyper-chaotic attractor with four-wing, one equilibrium and multiple chaotic attractors. Nonlinear Dyn. 2015, 81, 585–605. [Google Scholar] [CrossRef]
  16. Ahmad, M.; Solami, E.A.; Wang, X.-Y.; Doja, M.N.; Beg, M.M.S.; Alzaidi, A. Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos. Symmetry 2018, 10, 266. [Google Scholar] [CrossRef]
  17. Jia, R.; Huang, Q.; Peng, J. Study of the Hyperchaos-based Hash Function in E-commerce Applications. In Proceedings of the 2010 International Conference on Intelligent Computation Technology and Automation, Changsha, China, 11–12 May 2010. [Google Scholar]
  18. Smaoui, N.; Karouma, A.; Zribi, M. Secure communications based on the synchronization of the hyperchaotic Chen and the unified chaotic systems. Commun. Nonlinear Sci. Numer. Simul. 2011, 16, 3279–3293. [Google Scholar] [CrossRef]
  19. Islam, F.U.; Liu, G. Designing S-Box Based on 4D-4Wing Hyperchaotic System. 3D Res. 2017, 8, 9. [Google Scholar] [CrossRef]
  20. Özkaynak, F.; Özer, A.B. A method for designing strong S-Boxes based on chaotic Lorenz system. Phys. Lett. A 2010, 374, 3733–3738. [Google Scholar] [CrossRef]
  21. Khan, M.; Shah, T.; Mahmood, H.; Gondal, M.A. An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn. 2012, 71, 489–492. [Google Scholar] [CrossRef]
  22. Khan, M.; Shah, T. An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process. 2013, 9, 1335–1338. [Google Scholar] [CrossRef]
  23. Liu, G.; Yang, W.; Liu, W.; Dai, Y. Designing S-boxes based on 3-D four-wing autonomous chaotic system. Nonlinear Dyn. 2015, 82, 1867–1877. [Google Scholar] [CrossRef]
  24. Özkaynak, F.; Çelik, V.; Özer, A.B. A new S-box construction method based on the fractional-order chaotic Chen system. Signal Image Video Process. 2016, 11, 659–664. [Google Scholar] [CrossRef]
  25. Çavuşoğlu, Ü.; Zengin, A.; Pehlivan, I.; Kaçar, S. A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn. 2016, 87, 1081–1094. [Google Scholar] [CrossRef]
  26. Wolf, A.; Swift, J.B.; Swinney, H.L.; Vastano, J.A. Determining Lyapunov exponents from a time series. Physica D Nonlinear Phenom. 1985, 16, 285–317. [Google Scholar] [CrossRef] [Green Version]
  27. Wang, L.; Liu, J.; Lu, Z.-R. Incremental response sensitivity approach for parameter identification of chaotic and hyperchaotic systems. Nonlinear Dyn. 2017, 89, 153–167. [Google Scholar] [CrossRef]
  28. Kaplan, J.L.; Yorke, J.A. Chaotic Behavior of Multidimensional Difference Equations; Functional Differential Equations and Approximation of Fixed Points Lecture Notes in Mathematics; Springer: Berlin/Heidelberg, Germany, 1979; pp. 204–227. [Google Scholar]
  29. Belazi, A.; Rhouma, R.; Belghith, S. A novel approach to construct S-box based on Rossler system. In Proceedings of the 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, 24–28 August 2015. [Google Scholar]
  30. Picek, S.; Cupic, M.; Rotim, L. A New Cost Function for Evolution of S-Boxes. Evolut. Comput. 2016, 24, 695–718. [Google Scholar] [CrossRef] [PubMed]
  31. Braeken, A. Cryptographic Properties of Boolean Functions and S-Boxes. Ph.D Thesis, Katholieke Universiteit Leuven, Leuven, Belgium, 2006. [Google Scholar]
  32. Cusick, T.W.; Stanica, P. Cryptographic Boolean Functions and Applications; Elsevier: Amsterdam, The Netherlands, 2009. [Google Scholar]
  33. Khan, M.; Shah, T. A novel construction of substitution box with Zaslavskii chaotic map and symmetric group. J. Intell. Fuzzy Syst. 2015, 28, 1509–1517. [Google Scholar]
  34. Ding, C.; Xiao, G.; Shan, W. The Stability Theory of Stream Ciphers; LNCS 561; Springer Science & Business Media: New York, NY, USA, 1991. [Google Scholar]
  35. Matsui, M. Linear Cryptanalysis Method for DES Cipher; Advances in Cryptology—EUROCRYPT ’93 Lecture Notes in Computer Science; Springer: Heidelberg/Berlin, Germany, 1993; pp. 386–397. [Google Scholar]
  36. Webster, A.F.; Tavares, S.E. On the Design of S-Boxes; Lecture Notes in Computer Science Advances in Cryptology—CRYPTO ’85 Proceedings; Springer: Heidelberg/Berlin, Germany, 1985; pp. 523–534. [Google Scholar]
  37. Adams, C.; Tavares, S. The structured design of cryptographically good s-boxes. J. Cryptol. 1990, 3, 27–41. [Google Scholar] [CrossRef]
  38. Biham, E.; Shamir, A. Differential Cryptanalysis of DES-like Cryptosystems; Advances in Cryptology-CRYPT0’ 90 Lecture Notes in Computer Science; Springer: Heidelberg/Berlin, Germany, 1991; pp. 2–21. [Google Scholar]
  39. Belazi, A.; Khan, M.; El-Latif, A.A.A.; Belghith, S. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn. 2016, 87, 337–361. [Google Scholar] [CrossRef]
  40. Özkaynak, F. Construction of robust substitution boxes based on chaotic systems. Neural Comput. Appl. 2017, 1–10. [Google Scholar] [CrossRef]
  41. Ullah, A.; Jamal, S.S.; Shah, T. A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn. 2017, 91, 359–370. [Google Scholar] [CrossRef]
  42. Farwa, S.; Muhammad, N.; Shah, T.; Ahmad, S. A Novel Image Encryption Based on Algebraic S-box and Arnold Transform. 3D Res. 2017, 8, 26. [Google Scholar] [CrossRef]
  43. Ahmad, M.; Bhatia, D.; Hassan, Y. A Novel Ant Colony Optimization Based Scheme for Substitution Box Design. Procedia Comput. Sci. 2015, 57, 572–580. [Google Scholar] [CrossRef]
  44. Razaq, A.; Yousaf, A.; Shuaib, U.; Siddiqui, N.; Ullah, A.; Waheed, A. A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map. Secur. Commun. Netw. 2017, 2017, 1–16. [Google Scholar] [CrossRef] [Green Version]
  45. Khan, M.; Asghar, Z. A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput. Appl. 2016, 29, 993–999. [Google Scholar] [CrossRef]
  46. Jamal, S.S.; Khan, M.U.; Shah, T. A Watermarking Technique with Chaotic Fractional S-Box Transformation. Wirel. Pers. Commun. 2016, 90, 2033–2049. [Google Scholar] [CrossRef]
  47. Khan, M.; Shah, T.; Batool, S.I. A new implementation of chaotic S-boxes in CAPTCHA. Signal Image Video Process. 2015, 10, 293–300. [Google Scholar] [CrossRef]
  48. Khan, M.; Shah, T.; Batool, S.I. Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput. Appl. 2015, 27, 677–685. [Google Scholar] [CrossRef]
  49. Anees, A.; Ahmed, Z. A Technique for Designing Substitution Box Based on Van der Pol Oscillator. Wirel. Pers. Commun. 2015, 82, 1497–1503. [Google Scholar] [CrossRef]
  50. Lambić, D. S-box design method based on improved one-dimensional discrete chaotic map. J. Inf. Telecommun. 2018, 2, 181–191. [Google Scholar] [CrossRef] [Green Version]
  51. Silva-García, V.; Flores-Carapia, R.; Rentería-Márquez, C.; Luna-Benoso, B.; Aldape-Pérez, M. Substitution box generation using Chaos: An image encryption application. Appl. Math. Comput. 2018, 332, 123–135. [Google Scholar] [CrossRef]
  52. Ahmed, H.A.; Zolkipli, M.F.; Ahmad, M. A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput. Appl. 2018, 1–10. [Google Scholar] [CrossRef]
  53. Millan, W. How to Improve the Nonlinearity of Bijective S-Boxes; Information Security and Privacy Lecture Notes in Computer Science; Springer: Heidelberg/Berlin, Germany, 1998; pp. 181–192. [Google Scholar]
  54. Fuller, J.; Millan, W.; Dawson, E. Multi-objective optimisation of bijective S-boxes. New Gener. Comput. 2005, 23, 201–218. [Google Scholar] [CrossRef]
  55. Laskari, E.; Meletiou, G.; Vrahatis, M. Utilizing Evolutionary Computation Methods for the Design of S-Boxes. In Proceedings of the 2006 International Conference on Computational Intelligence and Security, Guangzhou, China, 3–6 November 2006. [Google Scholar]
  56. Tesar, P. A new method for generating high non-linearity s-boxes. Radioengineering 2010, 19, 23–26. [Google Scholar]
Figure 1. Phase portraits of the 5-D hyperchaotic system (2) (a) projection on the x-y plane; (b) projection on the x-u plane; (c) projection on the z-w plane; (d) 3-D view in x-y-z space; (e) 3-D view in x-z-u space; and (f) 3-D view in y-u-w space.
Figure 1. Phase portraits of the 5-D hyperchaotic system (2) (a) projection on the x-y plane; (b) projection on the x-u plane; (c) projection on the z-w plane; (d) 3-D view in x-y-z space; (e) 3-D view in x-z-u space; and (f) 3-D view in y-u-w space.
Entropy 20 00525 g001aEntropy 20 00525 g001b
Figure 2. Performance of generation of 100,000 8 × 8 S-boxes for (a) average nonlinearity, (b) maximum differential uniformity, (c) SAC, (d) average BIC-nonlinearity, and (e) BIC-SAC.
Figure 2. Performance of generation of 100,000 8 × 8 S-boxes for (a) average nonlinearity, (b) maximum differential uniformity, (c) SAC, (d) average BIC-nonlinearity, and (e) BIC-SAC.
Entropy 20 00525 g002aEntropy 20 00525 g002b
Table 1. Comparison of high dimensional chaotic/hyperchaotic systems adopted for 8 × 8 S-box construction.
Table 1. Comparison of high dimensional chaotic/hyperchaotic systems adopted for 8 × 8 S-box construction.
S-Box MethodType of ChaosDimensionLEDKY
Ref. [19]Hyperchaotic4-D0.09052.0529
Ref. [20,21]Lorenz chaotic3-D0.9062.062
Ref. [22]fractional Rössler chaotic3-DNRNR
Ref. [23]Chaotic3-D0.0642.05
Ref. [24]fractional Chen chaotic3-D0.0119NR
Ref. [25]Chaotic3-DNRNR
Ref. [21,29]Rössler chaotic3-D0.07142.0132
ProposedHyperchaotic5-D4.901823.334
Table 2. Proposed 8 × 8 Substitution-box.
Table 2. Proposed 8 × 8 Substitution-box.
160176224194124251515823420023622081238173155
1493194199555711023401817411711196135221
175205821252032122411091397620643148195126129
24815928201872232133323116519745182120192116
63361331061001452162142432178204521068
894815317814147103411431152324617223793167
121807020210780292517542711312357210119
1461382223416184104186851222293816611819053
1712306711369519661111561503254123255183
24512110188209211127177169250862285292473
21814417154170142913215711265122524973163
592192542719120718995130181214161024650
2262272212862201151913977102253986610849
2151521053024723924887860136114265664119
1981794413971851403558244490877983208
37242134168162240184749919316164233137217252
Table 3. Nonlinearities of the component Boolean functions in the proposed S-box.
Table 3. Nonlinearities of the component Boolean functions in the proposed S-box.
g8g7g6g5g4g3g2g1
108110108108106110108110
Table 4. Dependency matrix for SAC.
Table 4. Dependency matrix for SAC.
0.46870.53120.53120.53120.40620.50.53120.4531
0.59370.56250.50.50.50.51560.46870.5468
0.56250.53120.53120.50.51560.50.45310.4843
0.46870.50.48430.48430.51560.51560.59370.4843
0.42180.56250.51560.48430.45310.53120.54680.4843
0.40620.56250.48430.57810.46870.50.53120.5
0.51560.484370.50.46870.48430.46870.43750.4531
0.48430.50.53120.51560.51560.45310.53120.4687
Table 5. BIC results for nonlinearity.
Table 5. BIC results for nonlinearity.
g1g2g3g4g5g6g7g8
g1-104104104106102106104
g2104-104106104104102104
g3104104-102102106100104
g4104106102-106102106102
g5106104102106-100108104
g6102104106102100-106102
g7106102100106108106-108
g8104104104102104102108-
Table 6. BIC results for the SAC.
Table 6. BIC results for the SAC.
g1g2g3g4g5g6g7g8
g1-0.49600.47650.49800.51750.50580.47070.4980
g20.4960-0.47260.50.52730.48630.53320.4843
g30.47650.4726-0.51560.47260.50190.50580.4960
g40.49800.50.5156-0.48630.53900.51750.4980
g50.51750.52730.47260.4863-0.48240.50780.5019
g60.50580.48630.50190.53900.4824-0.50970.4902
g70.47070.53320.50580.51750.50780.5097-0.5253
g80.49800.48430.49600.49800.50190.49020.5253-
Table 7. Differential matrix for DU.
Table 7. Differential matrix for DU.
66686686104888688
66810688666868666
4888866688666666
6688866866668866
10866666666866666
8668668686866668
6668868666666688
8888688466686686
6666686668886666
6686666686668666
8668868688666668
8868666686666868
8688668886666888
8686866688668666
88868668866610666
868666866668886-
Table 8. Comparison of nonlinearity, SAC, and BIC scores of recent 8 × 8 S-boxes.
Table 8. Comparison of nonlinearity, SAC, and BIC scores of recent 8 × 8 S-boxes.
S-Box MethodNonlinearitySACBIC-SACBIC-NLDU
nlminnlmaxnlavg
Proposed106110108.50.50170.502610410
Ref. [19]1021081060.50020.5013104.410
Ref. [20]100106103.20.50480.5009103.710
Ref. [21]981081030.50120.4988104.0712
Ref. [22]100108104.50.49780.5009103.612
Ref. [23]104108105.800.49760.5032104.510
Ref. [24]100108104.70.49820.4942103.110
Ref. [25]1041101060.50390.5058103.3810
Ref. [29]102108105.250.49850.4985103.712
Ref. [33]98110105.50.49370.5013105.732
Ref. [39]102108105.250.49560.4996103.810
Ref. [40]106108106.70.49410.4957103.510
Ref. [41]106108107.250.50340.4980105.2912
Ref. [42]99106103.50.50660.5029103.3512
Ref. [43]1061101070.50140.5016104.2110
Ref. [44]104108106.750.50310.5074103.6412
Ref. [45]96106103.250.51510.4864103.0744
Ref. [46]98108102.250.48360.4948101.5714
Ref. [47]981081040.50390.507810412
Ref. [48]841061000.48120.4962101.916
Ref. [49]1001061030.50200.4998102.9310
Ref. [50]106108106.50.49780.5029104.2110
Ref. [51]1051071060.50660.506510312
Ref. [52]106108107.50.49430.4982104.3610
Table 9. Statistics of 100,000 generated 8 × 8 S-boxes.
Table 9. Statistics of 100,000 generated 8 × 8 S-boxes.
ParameterWorstBestAverage
Average Nonlinearity102108.5104.665
DU188-
SAC0.52490.50.5019
BIC-Nonlinearity100.5105.57103.53
BIC-SAC0.51350.50.5019
Table 10. Analysis of 100,000 generated 8 × 8 S-boxes under some conditions.
Table 10. Analysis of 100,000 generated 8 × 8 S-boxes under some conditions.
ConditionPercentage of S-Boxes
average Nonlinearity ≥ 10490.932
average Nonlinearity ≥ 10535.467
DU ≤ 1040.871
0.495 ≤ SAC ≤ 0.50562.677
BIC- Nonlinearity ≥ 103.556.109
BIC- Nonlinearity ≥ 10421.549
0.495 ≤ BIC-SAC ≤ 0.50585.7
Table 11. Features 8 × 8 S-boxes having differential uniformity equals to 8.
Table 11. Features 8 × 8 S-boxes having differential uniformity equals to 8.
#DUAverage NLSACBIC-NLBIC-SAC
S181050.4963104.210.5006
S28104.50.4963103.640.5015
S38105.750.5017103.570.4990
S48104.250.4976104.360.5035
S581050.5061102.360.5015
Table 12. Proposed small-sized bijective S-boxes.
Table 12. Proposed small-sized bijective S-boxes.
4 × 4 S-Box
11942
103714
11250
136815
5 × 5 S-box
312302815271125
14312385741
29100161926221
18249201713226
6 × 6 S-box
604862216145445
462011552516957
313912266241944
136323520373335
171041136185158
4283854021459
432728155332563
502229343074947
7 × 7 S-box
125885410918664115027106135684265
10092282361117309673493212298807643
123594770126221161011831101501143352
84144811326674658751769297982735
8311245110511653510757121127102369340
71682952162893815449492037124119
4141997662439120996025725511108126
63778510581103919018111748737810434
Table 13. Nonlinearity of the component functions and differential uniformity of the proposed small-sized S-boxes in Table 12.
Table 13. Nonlinearity of the component functions and differential uniformity of the proposed small-sized S-boxes in Table 12.
S-BoxNonlinearitiesDU
nlg1nlg2nlg3nlg4nlg5nlg6nlg7
4 × 44444 4
5 × 51012121210 6
6 × 6222424242424 6
7 × 7525252525048528
Table 14. Comparison of the average nonlinearities of the small-sized S-boxes.
Table 14. Comparison of the average nonlinearities of the small-sized S-boxes.
S-boxRef. [30]Ref. [53]Ref. [54]Ref. [55]Ref. [56]Proposed
4 × 44----4
5 × 510106101011.2
6 × 6222018222223.67
7 × 7484642484851.14
8 × 810410210498104108.5

Share and Cite

MDPI and ACS Style

Al Solami, E.; Ahmad, M.; Volos, C.; Doja, M.N.; Beg, M.M.S. A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes. Entropy 2018, 20, 525. https://0-doi-org.brum.beds.ac.uk/10.3390/e20070525

AMA Style

Al Solami E, Ahmad M, Volos C, Doja MN, Beg MMS. A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes. Entropy. 2018; 20(7):525. https://0-doi-org.brum.beds.ac.uk/10.3390/e20070525

Chicago/Turabian Style

Al Solami, Eesa, Musheer Ahmad, Christos Volos, Mohammad Najam Doja, and Mirza Mohd Sufyan Beg. 2018. "A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes" Entropy 20, no. 7: 525. https://0-doi-org.brum.beds.ac.uk/10.3390/e20070525

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop