Jun Peng, Shaoning Pang, Du Zhang, Shangzhu Jin, Lixiao Feng, Zuojin Li
{"title":"S-boxes Construction Based on Quantum Chaos and PWLCM Chaotic Mapping","authors":"Jun Peng, Shaoning Pang, Du Zhang, Shangzhu Jin, Lixiao Feng, Zuojin Li","doi":"10.1109/ICCICC46617.2019.9146028","DOIUrl":null,"url":null,"abstract":"For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) plays a crucial role to resist cryptanalysis (decoding). In this paper, we incorporate quantum chaos and PWLCM chaotic mapping into a new method of S-box design. Over the obtained 500 key-dependent S-boxes, we test the S-box cryptographical properties on bijection, nonlinearity, SAC, BIC, differential approximation probability, and sensitivity to the key, respectively. The results show that the cryptographic characteristics of proposed S-Box has met our design objectives and can be applied to data encryption, user authentication and system access control.","PeriodicalId":294902,"journal":{"name":"2019 IEEE 18th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 18th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCICC46617.2019.9146028","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) plays a crucial role to resist cryptanalysis (decoding). In this paper, we incorporate quantum chaos and PWLCM chaotic mapping into a new method of S-box design. Over the obtained 500 key-dependent S-boxes, we test the S-box cryptographical properties on bijection, nonlinearity, SAC, BIC, differential approximation probability, and sensitivity to the key, respectively. The results show that the cryptographic characteristics of proposed S-Box has met our design objectives and can be applied to data encryption, user authentication and system access control.