Research Paper
Research Paper
Abstract—The widespread use of the Internet for transmission This sensitivity to the initial conditions contributes to produce
of data demands the well-defined data protection algorithms. the secure S-box. Moreover, real-time applications demand
Symmetric block cipher protects the digital information from fast encryption algorithms. Encryption algorithms based on
the un-authorized recipient. The cryptographic strength of sym-
metric cipher mainly depends on substitution box (S-box). So chaotic systems perform fast encryption and require less
the main challenge is to create an S-box with higher value computational complexity [3]. S-box is the only component
of nonlinearity. Meta-heuristic optimization algorithm has been that resists against differential attacks [4]. Differential
applied to create a secure S-box. In this paper, a design scheme approximation probability of an S-box defines the level of
based on chaotic maps and Cuckoo Search Algorithm (CSA) is security shield against differential cryptanalysis. Chaotic
proposed to enhance the non-linearity of S-box. Chaotic maps are
widely used to create secure S-box due to their aperiodic nature. map generates S-box with low differential probability which
The proposed idea produced an S-box with non-linearity 109.25, promises strength against differential attacks. The S-box
which strengthens the cipher security against linear attacks. based on chaotic map achieves speed and security in the
The results are compared with the recently created S-boxes and encryption algorithm [5]. Chaotic maps attracted the attention
the S-boxes obtained using meta-heuristic algorithms such as of many researchers in the creation of S-box. With the
Ant Colony Optimization (ACO), Genetic Algorithm (GA) and
Firefly algorithm (FA). The obtained S-box is evaluated against encouraging results from one-dimensional chaotic maps [6],
cryptographic criteria such as bijectivity, nonlinearity, strict 2D chaotic map [7] and 3D chaotic map produced desirable
avalanche criteria, bit independence criteria, linear probability results in the image encryption algorithms [8]. Usually a
and differential probability. single S-box is used in the image encryption technique. In
Index Terms—S-box, Cuckoo Search Algorithm, Chaotic [9], the authors applied three different S-boxes for red, green
Maps,Cryptosystem, Nonlinearity
and blue components of an image. Unlike chaos-based S-box,
the author [10] used algebraic technique to produce nonlinear
I. I NTRODUCTION
component in the encryption algorithm.
Cryptography is one of the techniques that play fundamental
role in the security of digital information. It can be broadly The confusion factor in the design of secure encryption
categorized into asymmetric cipher and symmetric cipher [1]. algorithm only depends on S-box. However, this dependency
Asymmetric block cipher applies different keys on a block of on S-box is susceptible to cipher attacks [11]. Therefore, the
data for encryption and decryption. Public key encrypts the author synthesized the combined effect of S-box and Arnold
plain text into cipher text and private key reverts this process. transformation to strengthen the cryptographic properties
Symmetric block cipher uses same key for encryption and against cipher attacks [12]. Chaotic maps create continuous
decryption. The substitution box (S-box) plays very signifi- output. However, the computers operate on discrete inputs.
cant role in symmetric cryptographic systems such as Data So the output value of chaotic maps needs to be converted
Encryption Standard (DES), International Data Encryption into discrete format. The author presented a scheme based
Algorithm (IDEA) and Advanced Encryption Standard (AES). on discrete chaotic maps to obtain secure S-box without the
Shannon [2] showed that a strong crypto system must have two need of any approximation [13]. Chaos-based S-boxes are
fundamental properties of confusion and diffusion. In block favorite to the researchers due to their ease of implementation
cipher, S-box provides the property of confusion that hides in software and hardware [14].
the relationship between secret key and cipher text. This is
the only non-linear component that determines the strength of Advance Encryption Standard (AES) uses fixed S-box
entire block encryption algorithm. Therefore, the main concern in that the S-box remains same despite changing the key.
in the construction of strong crypto-system is the design of a Thus static S-box opens ways for cipher text pair attacks;
secure s-box. and the key-dependent S-box escalates the complexity of the
Chaotic systems are favorable for use in cryptography as algorithm [15]. Although key-dependent S-boxes enhance
they behave differently on the basis of their initial parameters. the strength of the algorithm, the main problem is the
TABLE II
C OMPARISON OF NONLINEARITY WITH OPTIMIZATION SCHEMES
TABLE III
P ERFORMANCE COMPARISON OF PROPOSED S- BOX WITH RECENT SCHEMES
TABLE IV
D EPENDENCY MATRIX FOR STRICT AVALANCHE CRITERIA