An Improved S-Box Generation Method using Metaheuristic Optimization Technique

DOI : 10.17577/IJERTV10IS040137

Download Full-Text PDF Cite this Publication

Text Only Version

An Improved S-Box Generation Method using Metaheuristic Optimization Technique

Shubhankar Vashishta Computer Science and Engineering SRM Institute of Science and Technology Chennai, India

Lakshay Srivastava

Computer Science and Engineering SRM Institute of Science and Technology Chennai, India

Dr. C. Jothi Kumar

Computer Science and Engineering SRM Institute of Science and Technology Chennai, India

Abstract Substitution boxes (S-boxes) are a crucial nonlinear component in modern block and stream ciphers' cryptanalytic resistance. Due to their relevance, there is a wide range of S-box construction techniques. The success of AES (Advanced Encryption Standard) posed cryptographers with new challenges in creating powerful substitution-boxes using various underlying approaches. There are various parameters that play a vital role in creating a robust S-Box that is secure enough to use which includes Nonlinearity, differential uniformity, absolute indicator value of global avalanche characteristics, Bits Independence Criterion (BIC), confusion characteristics, transparency order etc. We can obtain the desired value for a parameter by using various optimization techniques like PSO, GSA etc. In the proposed scheme, metaheuristic optimization technique will be used for setting the values of the above-mentioned parameters.

Keywords S-box, Particle Swarm Optimization, Gauss Iterated Map, Cryptography

  1. INTRODUCTION

    The protection of private data and visual information have been a major concern for years, given the transparent and vulnerable nature of Web and networking technologies. Since many years, the cryptographers have proposed different types of information protection methods. Depending on how information is interpreted encryption techniques can be divided into stream and block ciphers [1]. A block cipher is a method of text cryptography where the encryption key and algorithm are applied to the block of data at one time, called blocks, with an invariable transformation. The block cipher use permutation and replacement layers to design efficiency that shows high uncertainty and scattering properties. For such networks, substitution boxes are crucial components intended to convey the necessary nonlinear data transformation, that in turn contributes to better uncertainty and strength to various cryptographic attacks. The substitution process utilizes block bits for input and non- linearly converts them into various block bits for output [2]. It is indeed a linear conversion of the input sequence, as opposed to shuffling, which refers to the permutation

    variable size S-boxes. The scale of the massively bulky search space is one of the essential causes of this difficulty. As a result, a chaotic metaheuristic optimization approach is constructed to develop a competent framework of an S-box with varying size that can produce effective S-boxes.

    The initial conditions and control parameters of chaotic systems are highly sensitive to these systems, which is why they are regarded as good origin of entropy. They have strong responsiveness to preliminary constraints and system specifications, as well as quick auto-correlation and arbitrary nature of produced data [2][4]. Even small adjustments in the preliminary constraints and governing conditions have a significant impact on performance, making chaos-based structures ideal for the development of robust encryption algorithms. Chaos- based mechanisms on the other hand, can never exhibit chaotic behavior to every value of the preliminary constraints and governing conditions [5]. The chaos- based behavior of the selected scheme is the first requirement inside the architecture of chaotic encryption algorithms. Therefore, when choosing initial conditions and control parameters, caution must be taken. The chaos- based structures' preliminary constraints and governing conditions are real-valued in the interval in which they are described. And it has a vacuum of infinite value. Optimization algorithms are needed to pick the optimal chaos-based framework through this unlimited search space.

  2. PRELIMINARIES

    1. S-box parameters

      1. Nonlinearity

        The least separation of a Boolean function f to the collection of each affine function is used to calculate its nonlinearity measure [6]. As a result, standing nonlinearities scores should be reflected in the S-box constituent functions. The nonlinearity NLfn for each Boolean function fn is evaluated with Eq. (1) [13]:

        process.

        = 1 (2

        ()) (1)

        2

        The advancement and improvement of proposals dedicated to the development of substitution boxes has contributed significantly to the success of the AES block cipher as well as its substitution box [3]. They are stable, with structures that emphasize on algebraic strategies, optimization, chaos function as well as structures, and so on. A dynamic and open problem is the design of effective and

        where, Wmax(fn) is known as Walsh-Hadamard transform of Boolean function fn [7]. If a Boolean function has weak nonlinearity, it is called fragile. The increase of nonlinearity of stable Boolean functions is regarded as among the most important steps offering control resisting linear attacks [7]. Table I lists out the nonlinearity of the some the S-boxes

        used in this paper to compare the nonlinearity of the proposed scheme.

        TABLE I. COMPARATIVE ANALYSIS OF NONLINEARITY OF 8 x 8 S-BOXES.

        Substitution box

        Nonlinearity (min)

        Ref [17]

        84

        Ref [18]

        98

        Ref [19]

        98

        Ref [20]

        100

        Ref [21]

        102

        Ref [22]

        102

        Ref [23]

        106

      2. Differential Uniformity

        The differential uniformity compares an S-Box's resistivity to differential cryptanalysis. Biham and Shamir defined the cryptanalysis attack technique, which involves creating a disparity in the I/O distribution for pupose of attacking block ciphers and S-boxes [8]. If the XOR value of every output has similar uniformity to the XOR value of every input, then the cryptanalysis can be completed [9]. When the input/output distribution of an S-box is uniform, it is said to be immune. In the XOR table, the greatest value of differential uniformity (DU) shall be kept low. DU of any Boolean function fn(x) can determined by [13]:

        () =

        max (# { |() ( ) = }) (2)

        0,

        where set Y contains every possible input value and its components have a figure of 2n. For an S-box, the largest value of the XOR table should be small enough to prevent cryptanalysis. Table 2 compares the differential uniformity of various chaotic substitution boxes.

        TABLE II. COMPARATIVE ANALYSIS OF DIFFERENTIAL UNIFORMITY OF 8 x 8 S-BOXES.

        Substitution box

        Differential uniformity

        Ref [17]

        16

        Ref [18]

        12

        Ref [19]

        12

        Ref [20]

        14

        Ref [21]

        12

        Ref [22]

        10

        Ref [23]

        10

    2. Gauss Iterated Map

      Gauss Iterated map is one of the most popular 1- dimensional chaotic map. It is a simpl function which displays chaotic behaviour with discrete time domain and real space domain [10]. It is dictated by the Eq. (3):

      +1 = (2) + (3)

      where and are the control parameters which govern the bifurcation and xn is the function variable. The Gauss Iterated map produces best results when the value of is set between 4.5 to 8 and the value of lies between -1 to 1 [11]. Figure 1 shows great chaotic characteristics of Gauss Iterated map for = 6.2.

      Figure 1. Bifurcation of Gaussian map at = 6.2

      Figure 2. Flowchart of Particle Swarm Optimization.

    3. Particle Swarm Optimization

    Particle swarm optimization (PSO) is a metaheuristic optimization algorithm, that was proposed by Eberhart and Kennedy in the year 1995. The model was influenced by studying the behavior of fishes and birds. PSO has been used in a wide range of optimization problems, both alone and in conjunction with different algorithms [12].

    Each particle obeys a specific path, being a positional vector that depends on time. Two major key pieces consist of the swarming particles movement: a stochastic bit and a deterministic bit. By differentiating the paths of these discrete particles PSO explores the domain of an objective function. Every particle is drawn closer to the current global best position (g*) and its personal best-known position () while at the same time showing a tendency to shift impulsively over time. The particle modifies the position as the best new particle present i when it finds a position that is better than any location previously found. At any given moment, at each iteration, there seems to be current best for every particle. The main goal is to discover the best global solution from all of the existing best solutions until they stop improving or after a certain amount of iterations.

    Let the position vector and velocity be represented as xi and vi respectively for the ith particle. The Eq. (4) defines the new velocity vector:

    +1 = ( ) + 11( ) + 22( )

    according to the heuristics mentioned [14]. The initial population, i.e. N, is hence set to 40.

    1. Setting the fitness parameter:

      The fitness value for the problem is determined by a specific parameter. The nonlinearity of the S-box (particle) is observed as fitness value in the population vector in Eq. (4) and Eq. (5).

    2. Initializing the vectors:

      The adjustment vector is defined at the start and modified after each iteration. Each place vector initializes the values of the respective S-box in the sample. As per the Eq. (4), the adjustment vector is modified. For each S-box, the best personal vectors are determined. The recently created S-box in the sample which has a higher fitness value than the preceding S-box is updated as the personal best vector ( ). The S-box with the highest nonlinearity in the population is used to

      describe the global best vector (gb). The AES s-box is set as global best (gb) in Eq. (4). The nonlinearity for AES s-box comes out to be 112. The reason for selecting AES s-box for global best position is due to the fact that it is one of the most widely used s-box having extraordinary resistance to various cryptanalytic attacks.

    3. Setting parameter values:

    PSO parameters like r1 and r2 are kept contant at 0.9 in

    (4)

    Eq. (4). The control constants, k1 and k2, are randomly

    where and denotes the position and velocity of ith particle initialised with the chaotic value provided by the 1-

    at t times. r1 and r2 are two arbitrary vectors with values ranging from 0 to 1. The parameters c1 and c2 are the constants of acceleration, usually equal to, say, c1 c2 2 for balanced approach in its stochastic and deterministic way. The initial positions of all the particles should be distributed sufficiently uniformly so that they can be sampled across most regions. We can then update the new location using the Eq. (5).

    +1 = + +1 (5) Here, vi can take any value. However, it is generally bounded within a certain range [0, vmax].

  3. PROPOSED WORK

    The Gauss iterated map is used to spawn the first population of the S-boxes. The two parameters, and , are set to 6.2 and -0.38 respectively in Eq. (3). The reason for utilization of these particular values lies in the chaotic nature of the map. The gauss iterated map shows exemplary bifurcation for above specified values. The gauss iterated map is also used to achieve the control parameters, k1 and k2, of the PSO. The research indicates that incorporating chaos through adjustment vector update contributes in a better search area exploration and use and can improve standard of the output influenced the chaos-based initialization and updating of PSO parameters [13]. Steps for the PSO technique are as follows:

    A. Creating the vector of population:

    Every distinct S-box is considered a single entity. Using chaotic maps, the initial population of S-boxes is created. The size of the original generated population is kept small

    dimensional gauss iterated map for the Eq. (4). The selection of control parameters is left upon the chaotic map for increased unpredictability and dynamic range of output. During the optimization process, these parameters are modified after each iteration. The PSO inertial parameter z is initialised to a 0.7 in Eq. (4) for the best optimization results. This parameter helps in concentration of the S-boxes in accordance to the respective nonlinearities.

    1. Preprocessing and Adjustment:

      The Equations (4) and (5) are used to update the adjustment vector and S-boxes for each iteration. This procedure generates certain repeating and negative values. The solution values for the S-box architecture, on the other hand, are limited to a range [0,255]. As a result, we use a preprocessing and adjustment method to eliminate the possibility of repeating and negative values. Negative values are manifested in the desired range during preprocessing using some mathematics. To preserve the bijectivity of the S-boxes, we look for repeating values during the adjustment process and replace them with missing values [15]. The nonlinearity values are updated for the newly created sample. Optimum nonlinearities are maintained and sent to the recently updated sample, which is double the size (i.e. 80) of that of the

      original sample, from the current sample. and gb are revamped, as previously stated. Adjustment vector is denoted by for the ith S-box and tth iteration.

      Initial values for +1 = (2) + :

      • Gaussian map initial value, xn = 0.231

      • Gaussian map parameters, = 6.2, = -0.38

        Ref [20]

        100

        14

        Ref [21]

        102

        12

        Ref [22]

        102

        10

        (6)

        Ref [23]

        106

        10

        Ref [20]

        100

        14

        Ref [21]

        102

        12

        Ref [22]

        102

        10

        (6)

        Ref [23]

        106

        10

        +1 = () + 0.91( ) + 0.92( )

      • Inertial parameter, z = 0.7

    In order to simulate, evaluate, and optimize the output of the proposed method of generating an S-box, we use the input arguments of the method proposed. The suggested approach is evaluated by changing sample range, iterations,and inertial parameter under various scenarios and conditions. The number of iterations for optimization is set as 100.

  4. PERFORMANCE ANALYSIS

    A total of 4000 S-boxes were generated and optimized by particle swarm optimization technique. The S-box in Table IV is the best outcome among the generated S-boxes. For the values of various initial parameters, the minimum value of nonlinearity of S-box comes out to be 104. The same S-box displays the differential uniformity of 8. However another optimized S-box, show in Table V, with nonlinearity 102, displayed better differential uniformity with value 6.

    TABLE III. COMPARATIVE ANALYSIS OF PARAMETERS OF 8 x 8 S-BOXES.

    Various S-boxes from the literature are compared on the basis of nonlineaity and differential uniformity shown in the Table III. Figure 3 shows the competence of the S-box security scheme proposed in this paper. The fact that an S- box is bijective means that it is a one-to-one mapping. That is to say, all feasible resultant vectors shall emerge only once. Since each 256 possible resultant value is unique and show up one time, both S-boxes in Table IV and V preserve bijectivity. For S-boxes that are used in block ciphers.

    One of the key problems in the world of cryptography over the last two decades has been the construction of extremely nonlinear S-boxes. By using the suggested PSO dependent approach, we can chieve S-boxes that are very similar to the 8×8 S-box with nonlinearity as high as 112 [16].

    Differential cryptanalysis can be restricted for an S-box demostrating minimal DU [8]. Our S-boxes are measured with differential uniformities of 8 and 6 for S1 and S2,

    respectively. Table III. shows that the proposed S-boxes

    Substitution box

    Nonlinearity (min)

    Differential Uniformity

    Proposed S1

    104

    8

    Proposed S2

    102

    6

    Ref [17]

    84

    16

    Ref [18]

    98

    12

    Ref [19]

    98

    12

    Substitution box

    Nonlinearity (min)

    Differential Uniformity

    Proposed S1

    104

    8

    Proposed S2

    102

    6

    Ref [17]

    84

    16

    Ref [18]

    98

    12

    Ref [19]

    98

    12

    have greater capacity than other S-boxes to reduce differential cryptanalysis. The proposed S-boxes therefore have DU efficiency and demonstrate considerable resistance to differential cryptanalysis.

    Figure 3. Comparison of nonlinearity

    Figure 4. Comparison of differential uniformity

    TABLE IV. PROPOSED S-BOX S1

    99

    124

    119

    123

    242

    107

    111

    197

    48

    1

    103

    43

    254

    215

    171

    118

    202

    130

    201

    125

    250

    89

    71

    240

    173

    212

    162

    175

    156

    164

    114

    192

    183

    253

    147

    38

    54

    63

    247

    204

    52

    165

    229

    241

    113

    216

    49

    21

    4

    199

    35

    195

    24

    150

    5

    154

    7

    18

    128

    226

    235

    39

    178

    117

    9

    131

    44

    26

    27

    110

    90

    160

    82

    59

    15

    179

    41

    227

    47

    132

    83

    209

    0

    237

    32

    17

    30

    91

    106

    203

    190

    57

    74

    76

    88

    207

    208

    239

    170

    251

    67

    77

    51

    133

    69

    40

    2

    127

    80

    60

    159

    168

    81

    163

    64

    143

    53

    157

    56

    245

    188

    182

    218

    33

    16

    66

    84

    210

    205

    12

    19

    236

    95

    151

    68

    23

    146

    167

    126

    61

    100

    93

    25

    115

    96

    129

    79

    220

    34

    42

    144

    136

    70

    177

    184

    20

    222

    94

    11

    196

    224

    50

    58

    10

    73

    6

    36

    92

    194

    211

    172

    98

    145

    149

    214

    121

    231

    200

    55

    109

    141

    213

    78

    169

    108

    86

    219

    234

    101

    122

    174

    8

    186

    120

    37

    46

    28

    166

    180

    198

    232

    221

    116

    31

    75

    189

    139

    138

    112

    62

    181

    102

    72

    3

    246

    14

    97

    228

    87

    185

    134

    193

    29

    158

    225

    248

    152

    238

    105

    217

    142

    148

    155

    243

    135

    233

    206

    85

    244

    223

    140

    161

    137

    13

    191

    230

    65

    104

    249

    153

    45

    252

    176

    255

    187

    22

    TABLE V. PROPOSED S-BOX S2

    99

    124

    119

    123

    242

    107

    111

    197

    48

    1

    103

    43

    254

    215

    171

    118

    202

    130

    201

    125

    250

    89

    71

    240

    173

    212

    162

    175

    156

    164

    114

    192

    183

    253

    147

    38

    54

    63

    247

    204

    52

    165

    229

    241

    113

    216

    49

    21

    4

    199

    35

    195

    24

    150

    5

    154

    7

    18

    128

    226

    235

    39

    178

    13

    9

    131

    45

    26

    27

    110

    90

    160

    82

    59

    214

    179

    41

    227

    47

    132

    83

    209

    0

    237

    32

    252

    177

    91

    106

    203

    190

    57

    74

    76

    88

    207

    208

    239

    170

    15

    67

    77

    51

    133

    69

    249

    2

    127

    80

    60

    159

    168

    17

    22

    64

    143

    146

    157

    56

    245

    188

    182

    218

    33

    16

    30

    40

    210

    205

    12

    19

    236

    95

    151

    68

    23

    196

    81

    117

    61

    100

    93

    25

    115

    96

    129

    79

    220

    34

    42

    144

    136

    70

    126

    184

    20

    222

    94

    11

    219

    224

    50

    58

    10

    73

    6

    36

    92

    194

    211

    172

    98

    145

    149

    163

    121

    231

    167

    55

    109

    141

    213

    78

    169

    108

    86

    244

    198

    101

    122

    174

    8

    186

    120

    37

    46

    28

    166

    180

    200

    232

    221

    116

    31

    75

    189

    139

    138

    112

    62

    181

    102

    72

    3

    246

    14

    97

    53

    87

    185

    134

    193

    29

    158

    225

    228

    152

    234

    105

    217

    142

    148

    155

    238

    135

    233

    206

    85

    243

    223

    140

    161

    137

    248

    191

    230

    66

    104

    65

    153

    44

    251

    176

    84

    187

    255

  5. CONCLUSION

    This paper implies that an effective optimisation-based S-box approach is an alternative to spontaneous and algebraic approaches. The S-boxes for high non-linearity as fitness value are developed with Particle swarm optimization. This approach uses the chaotic Gauss iterated map for original sample generation and other necessary arbitrary values. The procedure was investigated by changing the parameters of the PSO for various scenarios. The proposed method was shown to be capable of producing solid, well-encrypted S-boxes. Compared with many recent S-Boxes, the proposed S-Boxes have been found to be upstanding enough than many of their contemporaries. Thus it is possible to create strong non-linear S-boxes using the proposed technique.

  6. REFERENCES

  1. [1] Ya-Ping Zhang, Jizhou Sun and Xu Zhang, "A stream cipher algorithm based on conventional encryption techniques," Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513), Niagara Falls, ON, Canada, 2004, pp. 649-652 Vol.2, doi: 10.1109/CCECE.2004.1345196.

  2. [2] M. Ahmad, E. Al-Solami, A. M. Alghamdi and M. A. Yousaf, "Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures," in IEEE Access, vol. 8, pp. 110397-110411, 2020, doi: 10.1109/ACCESS.2020.3001868.

  3. [3] Mohamed, Kamsiah & Pauzi, M N M Pauzi & Ali, Fakariah

    & Ariffin, Suriyani. (2014), Study of S-box Properties in Block Cipher, I4CT 2014 – 1st International Conference on Computer, Communications, and Control Technology, Proceedings. 10.1109/I4CT.2014.6914206.

  4. [4] Z. Hua, B. Zhou and Y. Zhou, "Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation," in IEEE Transactions on Industrial Electronics, vol. 66, no. 2, pp. 1273-1284, Feb. 2019, doi: 10.1109/TIE.2018.2833049.

  5. [5] J. Sprott, Elegant Chaos Algebraically Simple Chaotic Flows. Singapore: World Scientific, 2010.

  6. [6] M. Ahmad, N. Mittal, P. Garg, and M. Maftab Khan, Efficient cryptographic substitution box design using travelling salesman problem and chaos, Perspect. Sci., vol. 8, pp. 465 468, Sep. 2016.

  7. [7] W. Cusick and P. Stanica, Cryptographic Boolean Functions and Applications. Amsterdam, The Netherlands: Elsevier, 2009.

  8. [8] E. Biham and A. Shamir, Differential cryptanalysis of Des. Like cryptosystems, J. Cryptol., vol. 4, no. 1, pp. 372, Jan. 1991.

  9. [9] M. Ahmad, C. Volos, M. Doja, and M. Beg, A new hyperchaotic system-based design for efficient bijective substitution-boxes, Entropy, vol. 20, no. 7, p. 525, Jul. 2018.

  10. [10] K.Sakthidasan Sankaran, G.Ammu and V.Nagarajan, Non Local Image Restoration Using Iterative Method, IEEE International Conference on Communication and Signal Processing-(ICCSP14), April 2014, pp. 1740 – 1744.

  11. [11] A. Sahay and C. Pradhan, "Gauss iterated map based RGB image encryption approach," 2017 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 2017, pp. 0015-0018, doi: 10.1109/ICCSP.2017.8286437.

  12. [12] Yudong Zhang, Shuihua Wang, Genlin Ji,"A Comprehensive Survey on Particle Swarm Optimization Algorithm and Its Applications", Mathematical Problems in

    Engineering, vol. 2015, Article ID 931256, 38 pages, 2015. https://doi.org/10.1155/2015/931256.

  13. [13] M. Ahmad, I. A. Khaja, A. Baz, H. Alhakami and W. Alhakami, "Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications," in IEEE Access, vol. 8, pp. 116132-116147, 2020, doi: 10.1109/ACCESS.2020.3004449.

  14. [14] Q. Bai, Analysis of particle swarm optimization algorithm, Comput. Inf. Sci., vol. 3, no. 1, p. 180, Jan. 2010.

  15. [15] Wang, Yong & Lei, Peng & Wong, Kwok-Wo, (2015), "A Method for Constructing Bijective S-Box with High Nonlinearity Based on Chaos and Optimization", International Journal of Bifurcation and Chaos, 25, 1550127,doi: 10.1142/S0218127415501278.

  16. [16] J. Daemen and V. Rijmen, The Design of RIJNDAEL: AES-The Advanced Encryption Standard. Berlin, Germany: Springer-Verlag, 2002.

  17. [17] D. Lambi and M. Nikoli, Pseudo-random number generator based on discrete-space chaotic map, Nonlinear Dyn., vol. 90, no. 1, pp. 223232, 2017. doi: 10.1007/s11071- 017-3656-1.

  18. [18] M. Khan, T. Shah, H. Mahmood, and M. Gondal, An efficient method for the construction of block cipher with multi- chaotic systems, Nonlinear Dyn., vol. 71, no. 3, pp. 489492, 2013.

  19. [19] G. Jakimoski and L. Kocarev, Chaos and cryptography: Block encryption ciphers based on chaotic maps, IEEE Trans. Circuits Syst. I. Fundam. Theory Appl., vol. 48, no. 2, pp. 163 169, Feb. 2011.

  20. [20] G. Chen, Y. Chen, and X. Liao, An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps, Chaos Solitons Fractals, vol. 31, no. 3, pp. 571579, 2007.

  21. [21] I. Hussain, T. Shah, and M. Gondal, A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm, Nonlinear Dyn., vol. 70, no. 3, pp. 17911794, 2012.

  22. [22] G. Chen, A novel heuristic method for obtaining S- boxes, Chaos, Solitons Fractals, vol. 36, no. 4, pp. 10281036, 2008.

  23. [23] D. Lambi, A novel method of S-box design based on discrete chaotic map, Nonlinear Dyn., vol. 87, no. 4, pp. 2407 2413, 2017.

Leave a Reply