Reference Hub3
S-Box Construction Method Based on the Combination of Quantum Chaos and PWLCM Chaotic Map

S-Box Construction Method Based on the Combination of Quantum Chaos and PWLCM Chaotic Map

Jun Peng, Shangzhu Jin, Shaoning Pang, Du Zhang, Lixiao Feng, Zuojin Li, Yingxu Wang
Copyright: © 2021 |Volume: 15 |Issue: 4 |Pages: 17
ISSN: 1557-3958|EISSN: 1557-3966|EISBN13: 9781799859857|DOI: 10.4018/IJCINI.20211001.oa24
Cite Article Cite Article

MLA

Peng, Jun, et al. "S-Box Construction Method Based on the Combination of Quantum Chaos and PWLCM Chaotic Map." IJCINI vol.15, no.4 2021: pp.1-17. http://doi.org/10.4018/IJCINI.20211001.oa24

APA

Peng, J., Jin, S., Pang, S., Zhang, D., Feng, L., Li, Z., & Wang, Y. (2021). S-Box Construction Method Based on the Combination of Quantum Chaos and PWLCM Chaotic Map. International Journal of Cognitive Informatics and Natural Intelligence (IJCINI), 15(4), 1-17. http://doi.org/10.4018/IJCINI.20211001.oa24

Chicago

Peng, Jun, et al. "S-Box Construction Method Based on the Combination of Quantum Chaos and PWLCM Chaotic Map," International Journal of Cognitive Informatics and Natural Intelligence (IJCINI) 15, no.4: 1-17. http://doi.org/10.4018/IJCINI.20211001.oa24

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) plays a crucial role to resist cryptanalysis. In this article, we incorporate quantum chaos and PWLCM chaotic map into a new method of S-box design. The secret key is transformed to generate a six tuple system parameter, which is involved in the generation process of chaotic sequences of two chaotic systems. The output of one chaotic system will disturb the parameters of another chaotic system in order to improve the complexity of encryption sequence. S-box is obtained by XOR operation of the output of two chaotic systems. Over the obtained 500 key-dependent S-boxes, we test the S-box cryptographical properties on bijection, nonlinearity, SAC, BIC, differential approximation probability, respectively. Performance comparison of proposed S-box with those chaos-based one in the literature has been made. The results show that the cryptographic characteristics of proposed S-box has met our design objectives and can be applied to data encryption, user authentication and system access control.