{"title":"S-Boxes design based on the Lu-Chen system and their application in image encryption","authors":"M. Bavand Savadkouhi, M. Akbari Tootkaboni","doi":"10.1007/s00500-024-09912-8","DOIUrl":null,"url":null,"abstract":"<p>The substitution box (S-Box) plays a fundamental role in cryptographic algorithms. In this article, the Lu-Chen system is used to design a chaotic S-Box. We design two S-Boxes, one based on the rotation algorithm relative to the rows (or columns) and the other based on the Zigzag transformation. The performance of the new S-Boxes is evaluated with the bijective, nonlinearity, strict avalanche criterion, output bit independence criterion, differential approximation probability, linear approximation probability, algebraic degree and not having a fixed point and opposite fixed point. The analysis results show that the proposed S-Boxes have suitable cryptographic properties. In addition, an image encryption algorithm based on two generated S-Boxed, and a generalized Lai–Massey structure is presented. Experimental results show that the proposed method has achieved acceptable security.</p>","PeriodicalId":22039,"journal":{"name":"Soft Computing","volume":"27 1","pages":""},"PeriodicalIF":3.1000,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Soft Computing","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s00500-024-09912-8","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
The substitution box (S-Box) plays a fundamental role in cryptographic algorithms. In this article, the Lu-Chen system is used to design a chaotic S-Box. We design two S-Boxes, one based on the rotation algorithm relative to the rows (or columns) and the other based on the Zigzag transformation. The performance of the new S-Boxes is evaluated with the bijective, nonlinearity, strict avalanche criterion, output bit independence criterion, differential approximation probability, linear approximation probability, algebraic degree and not having a fixed point and opposite fixed point. The analysis results show that the proposed S-Boxes have suitable cryptographic properties. In addition, an image encryption algorithm based on two generated S-Boxed, and a generalized Lai–Massey structure is presented. Experimental results show that the proposed method has achieved acceptable security.
期刊介绍:
Soft Computing is dedicated to system solutions based on soft computing techniques. It provides rapid dissemination of important results in soft computing technologies, a fusion of research in evolutionary algorithms and genetic programming, neural science and neural net systems, fuzzy set theory and fuzzy systems, and chaos theory and chaotic systems.
Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. By linking the ideas and techniques of soft computing with other disciplines, the journal serves as a unifying platform that fosters comparisons, extensions, and new applications. As a result, the journal is an international forum for all scientists and engineers engaged in research and development in this fast growing field.