A chaos-based approach to the design of cryptographically secure substitutions
Introduction
Over the past decade, there has been a tremendous interest in studying the behavior of chaotic systems. They are characterized by sensitive dependence on initial conditions, similarity to random behavior, and continuous broad-band power spectrum. Chaos has potential applications in several functional blocks of a digital communication system: compression, encryption and modulation. The possibility for self-synchronization of chaotic oscillations [1] has sparked an avalanche of papers on the application of chaos in cryptography. An attempt only to mention all related papers on chaos and cryptography in this short presentation, would result in a prohibitively long list, thus we refer the reader to some recent work [2].
In this Letter we explore the feasibility of designing cryptographically secure substitutions via approximation of mixing maps by periodic transformations. In order to adapt the continuous dynamics of a mixing map to the block structure of a cryptosystem and, most importantly, to assure that the good statistical properties of the first are transferred to the second, we use periodic approximations of dynamical systems. Clearly, one expects that the better the mixing properties of the approximated dynamical system, the better the cryptographic properties of the discrete maps obtained in the process of approximation. The subject of the present Letter is precisely the relation between the dynamical system used for encryption and the quality of the resulting cryptosystem as quantified by its immunity to linear and differential cryptanalysis, which are currently the benchmarks for measuring the safety of the standard block ciphers.
Let be a permutation of n-bit blocks (or an S-box in cryptographic parlance) and, as usual, denote by and the linear approximation probability and differential approximation probability of F, respectively. and measure the immunity of the block cipher F to attacks mounted on the corresponding cryptanalysis, immunity being higher the smaller their values. We show in this Letter that if F is a cyclic periodic approximation of a mixing automorphism and some assumptions are fulfilled, then and get asymptotically close to their greatest lower bounds and , respectively, thus obtaining an arbitrarily close-to-optimal immunity to both cryptanalyses. In his seminal paper “Communication Theory of Secrecy Systems”, Shannon suggested mixing transformations to be used for practical encryption systems. He wrote [3]:
Hence, we prove, as suggested by Shannon, that mixing (chaotic) transformations may indeed be used in encryption systems, providing an alternative to the traditional algebraic methods.“Good mixing transformations are often formed by repeated products of two simple noncommuting operations. Hopf has shown, for example, that pastry dough can be mixed by such a sequence of operations. The dough is first rolled out into a thin slab, then folded over, then rolled, and then folded again, etc. In a good mixing transformation of a space with natural coordinates , the point is carried by the transformation into a point , with and the functions are complicated, involving all variables in a ‘sensitive’ way. A small variation of any one, , say, changes all the considerably. If passes through its range of possible variation, the point traces a long winding path around the space.”
Section snippets
Theory
Given any pair of binary n-blocks , ≠0, and a permutation (or substitution) F on n-blocks , the linear approximation probability of F ( for short) [4] is defined as where , # denotes cardinality and ⊕ addition modulo 2. Therefore, the linear approximation probability is the square of the maximal imbalance of the following event: the parity of the input bits selected by the
Software implementation
Given an automorphism T in, say, an interval , it is in general not known how to construct periodic approximations of T (see Example 3 below for an exception) but it can be proved [6], [9] that if is a cyclic approximation, then the -orbit ‘shadows’ the T-orbit for typical up to the precision set by the partition ; the finer , the better will mimic the continuous dynamic of T. This fact can be exploited in various ways to define substitutions on n
Conclusion
In this Letter we proposed periodic approximations of mixing dynamical systems as a practicable way one can go to construct cryptographically secure substitutions. Indeed, although the theoretical results are of abstract nature, the leading principle behind can be materialized in a simple form. More importantly, the numerical implementations support this approach in quite satisfactory terms.
Acknowledgements
We are grateful to T. Michalek and A. Ivanovski for stimulating discussions. This research is supported in part by the NSF.
References (10)
- et al.
J. Cryptology
(1991) - et al.
- et al.
An Introduction to the Theory of Numbers
(1979) - et al.
Phys. Rev. Lett.
(1990) Phys. Lett. A
(1998)et al.Phys. Rev. Lett.
(2000)IEEE Circuits Systems Magazine
(2001)et al.Phys. Lett. A
(2001)et al.IEEE Trans. Circuits Systems, Part I
(2001)et al.Phys. Lett. A
(2002)Phys. Rev. E
(2002)Phys. Rev. E
(2002)et al.Phys. Lett. A
(2003)Phys. Rev. Lett.
(2003)Phys. Rev. Lett.
(2003)Phys. Lett. A
(2003)
Cited by (19)
Exploiting randomness on continuous sets
2007, Information SciencesDynamic Analysis and Adaptive Synchronization of a New Chaotic System
2023, Journal of Applied Nonlinear DynamicsA Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System
2020, Jisuanji Yanjiu yu Fazhan/Computer Research and DevelopmentA Circuit Design of Discretized Chaotic Maps with Two Iterations for Speeding up S-box Generation
2019, Proceedings - APCCAS 2019: 2019 IEEE Asia Pacific Conference on Circuits and Systems: Innovative CAS Towards Sustainable Energy and Technology DisruptionA novel method for constructing the S-box based on spatiotemporal chaotic dynamics
2018, Applied Sciences (Switzerland)LabVIEW implementation of chaotic masking with adaptively synchronised forced Van der Pol oscillators and its application in real-time image encryption
2017, International Journal of Simulation and Process Modelling