Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017 (2017), Article ID 6969312, 11 pages
https://doi.org/10.1155/2017/6969312
Research Article

Chaotic S-Box: Intertwining Logistic Map and Bacterial Foraging Optimization

Ye Tian1,2 and Zhimao Lu1,3

1College of Information and Communication Engineering, Harbin Engineering University, Harbin 150001, China
2Key Laboratory of Photonic and Electronic Bandgap Materials, Ministry of Education, School of Physics and Electronic Engineering, Harbin Normal University, Harbin 150025, China
3Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China

Correspondence should be addressed to Ye Tian; moc.621@eynaitdsh

Received 16 June 2017; Revised 24 October 2017; Accepted 26 October 2017; Published 15 November 2017

Academic Editor: Maria L. Gandarias

Copyright © 2017 Ye Tian and Zhimao Lu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. X. Wang and Q. Wang, “A novel image encryption algorithm based on dynamic S-boxes constructed by chaos,” Nonlinear Dynamics, vol. 75, no. 3, pp. 567–576, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. I. Hussain, T. Shah, and M. A. Gondal, “Application of S-box and chaotic map for image encryption,” Mathematical and Computer Modelling, vol. 57, no. 9-10, pp. 2576–2579, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. X. Zhang, Y. Mao, and Z. Zhao, “An efficient chaotic image encryption based on alternate circular S-boxes,” Nonlinear Dynamics, vol. 78, no. 1, pp. 359–369, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. H. Liu, A. Kadir, and Y. Niu, “Chaos-based color image block encryption scheme using S-box,” AEÜ - International Journal of Electronics and Communications, vol. 68, no. 7, pp. 676–686, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. I. Hussain and M. A. Gondal, “An extended image encryption using chaotic coupled map and S-box transformation,” Nonlinear Dynamics, vol. 76, no. 2, pp. 1355–1363, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. G. Jakimoski and L. c. Kocarev, “Chaos and cryptography: block encryption ciphers based on chaotic maps,” IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 48, no. 2, pp. 163–169, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. G. Tang, X. Liao, and Y. Chen, “A novel method for designing S-boxes based on chaotic maps,” Chaos, Solitons & Fractals, vol. 23, no. 2, pp. 413–419, 2005. View at Publisher · View at Google Scholar · View at Scopus
  8. G. Tang and X. Liao, “A method for designing dynamical S-boxes based on discretized chaotic map,” Chaos, Solitons & Fractals, vol. 23, no. 5, pp. 1901–1909, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  9. G. Chen, Y. Chen, and X. Liao, “An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps,” Chaos, Solitons & Fractals, vol. 31, no. 3, pp. 571–579, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  10. S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons & Fractals, vol. 35, no. 2, pp. 408–419, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. L. Nian-sheng, “Pseudo-randomness and complexity of binary sequences generated by the chaotic system,” Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 2, pp. 761–768, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. X.-Y. Wang and X. Qin, “A new pseudo-random number generator based on CML and chaotic iteration,” Nonlinear Dynamics, vol. 70, no. 2, pp. 1589–1592, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Francois, T. Grosges, D. Barchiesi, and R. Erra, “Pseudo-random number generator based on mixing of three chaotic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 4, pp. 887–895, 2014. View at Publisher · View at Google Scholar · View at MathSciNet
  14. J. Khan, J. Ahmad, and S. O. Hwang, “An efficient image encryption scheme based on: Henon map, skew tent map and S-Box,” in Proceedings of the 6th International Conference on Modeling, Simulation, and Applied Optimization, ICMSAO 2015, pp. 1–6, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. M. Ahmad, H. Haleem, and P. M. Khan, “A new chaotic substitution box design for block ciphers,” in Proceedings of the 1st International Conference on Signal Processing and Integrated Networks, SPIN 2014, pp. 255–258, February 2014. View at Scopus
  16. J. Peng, S. Jin, L. Lei, and X. Liao, “Construction and analysis of dynamic S-boxes based on spatiotemporal chaos,” in Proceedings of the IEEE 11th International Conference on Cognitive Informatics & Cognitive Computing (ICCI* CC), pp. 274–278, 2012.
  17. Y. Wang, K.-W. Wong, C. Li, and Y. Li, “A novel method to design S-box based on chaotic map and genetic algorithm,” Physics Letters A, vol. 376, no. 6-7, pp. 827–833, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. S. M. Abd-Elazim and E. S. Ali, “Power system stability enhancement via bacteria foraging optimization algorithm,” Arabian Journal for Science and Engineering, vol. 38, no. 3, pp. 599–611, 2013. View at Publisher · View at Google Scholar · View at Scopus
  19. E. S. Ali and S. M. Abd-Elazim, “Bacteria foraging optimization algorithm based load frequency controller for interconnected power system,” International Journal of Electrical Power & Energy Systems, vol. 33, no. 3, pp. 633–638, 2011. View at Google Scholar
  20. S. M. Abd-Elazim and E. S. Ali, “Synergy of particle swarm optimization and bacterial foraging for TCSC damping controller design,” WSEAS Transactions on Power Systems, vol. 8, no. 2, pp. 74–84, 2013. View at Google Scholar · View at Scopus
  21. C. Sur and A. Shukla, “Discrete bacteria foraging optimization algorithm for vehicle distribution optimization in graph based road network management,” Advances in Intelligent Systems and Computing, vol. 235, pp. 351–358, 2014. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Tripathy and S. Mishra, “Bacteria foraging-based solution to optimize both real power loss and voltage stability limit,” IEEE Transactions on Power Systems, vol. 22, no. 1, pp. 240–248, 2007. View at Publisher · View at Google Scholar · View at Scopus
  23. I. S. Sam, P. Devaraj, and R. S. Bhuvaneswaran, “An intertwining chaotic maps based image encryption scheme,” Nonlinear Dynamics, vol. 69, no. 4, pp. 1995–2007, 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. K. M. Passino, “Biomimicry of bacterial foraging for distributed optimization and control,” IEEE Control Systems Magazine, vol. 22, no. 3, pp. 52–67, 2002. View at Publisher · View at Google Scholar · View at Scopus
  25. G. Chen, “A novel heuristic method for obtaining S-boxes,” Chaos, Solitons & Fractals, vol. 36, no. 4, pp. 1028–1036, 2008. View at Publisher · View at Google Scholar · View at Scopus
  26. M. Asim and V. Jeoti, “Efficient and simple method for designing chaotic S-boxes,” ETRI Journal, vol. 30, no. 1, pp. 170–172, 2008. View at Publisher · View at Google Scholar · View at Scopus
  27. F. Özkaynak and A. B. Özer, “A method for designing strong S-Boxes based on chaotic Lorenz system,” Physics Letters A, vol. 374, no. 36, pp. 3733–3738, 2010. View at Publisher · View at Google Scholar · View at Scopus
  28. M. Khan, T. Shah, H. Mahmood, M. A. Gondal, and I. Hussain, “A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems,” Nonlinear Dynamics, vol. 70, no. 3, pp. 2303–2311, 2012. View at Publisher · View at Google Scholar · View at Scopus
  29. I. Hussain, T. Shah, and M. A. Gondal, “A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm,” Nonlinear Dynamics, vol. 70, no. 3, pp. 1791–1794, 2012. View at Publisher · View at Google Scholar · View at Scopus
  30. M. Khan, T. Shah, H. Mahmood, and M. A. Gondal, “An efficient method for the construction of block cipher with multi-chaotic systems,” Nonlinear Dynamics, vol. 71, no. 3, pp. 489–492, 2013. View at Publisher · View at Google Scholar · View at Scopus
  31. M. Khan, T. Shah, and M. A. Gondal, “An efficient technique for the construction of substitution box with chaotic partial differential equation,” Nonlinear Dynamics, vol. 73, no. 3, pp. 1795–1801, 2013. View at Publisher · View at Google Scholar · View at Scopus
  32. F. Özkaynak and S. Yavuz, “Designing chaotic S-boxes based on time-delay chaotic system,” Nonlinear Dynamics, vol. 74, no. 3, pp. 551–557, 2013. View at Publisher · View at Google Scholar · View at Scopus
  33. I. Hussain, T. Shah, M. A. Gondal, and H. Mahmood, “A novel method for designing nonlinear component for block cipher based on TD-ERCS chaotic sequence,” Nonlinear Dynamics, vol. 73, no. 1-2, pp. 633–637, 2013. View at Publisher · View at Google Scholar · View at Scopus
  34. M. Khan and T. Shah, “An efficient construction of substitution box with fractional chaotic system,” Signal, Image and Video Processing, vol. 9, no. 6, pp. 1335–1338, 2015. View at Publisher · View at Google Scholar · View at Scopus
  35. M. Khan and T. Shah, “A construction of novel chaos base nonlinear component of block cipher,” Nonlinear Dynamics, vol. 76, no. 1, pp. 377–382, 2014. View at Publisher · View at Google Scholar · View at Scopus
  36. M. Khan and T. Shah, “A novel construction of substitution box with Zaslavskii chaotic map and symmetric group,” Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, vol. 28, no. 4, pp. 1509–1517, 2015. View at Publisher · View at Google Scholar · View at Scopus
  37. Ü. Çavuşoğlu, A. Zengin, I. Pehlivan, and S. Kaçar, “A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system,” Nonlinear Dynamics, vol. 87, no. 2, pp. 1081–1094, 2017. View at Publisher · View at Google Scholar · View at Scopus
  38. F. Özkaynak, V. Çelik, and A. B. Özer, “A new S-box construction method based on the fractional-order chaotic Chen system,” Signal, Image and Video Processing, vol. 11, no. 4, pp. 659–664, 2017. View at Publisher · View at Google Scholar · View at Scopus
  39. A. Belazi and A. A. A. El-Latif, “A simple yet efficient S-box method based on chaotic sine map,” Optik - International Journal for Light and Electron Optics, vol. 130, pp. 1438–1444, 2017. View at Publisher · View at Google Scholar · View at Scopus
  40. T. Farah, R. Rhouma, and S. Belghith, “A novel method for designing S-box based on chaotic map and Teaching–Learning-Based Optimization,” Nonlinear Dynamics, vol. 88, no. 2, pp. 1059–1074, 2017. View at Publisher · View at Google Scholar · View at Scopus
  41. Y. Tian and Z. Lu, “S-box: L-L cascade chaotic map and line map,” in Proceedings of the International Conference on Image and Graphics, pp. 297–309, Springer, Cham, Switzerland, 2015.
  42. X. J. Bi, L. Sheng, and J. Chen, “S-box optimization design based on improved particle swarm optimization algorithm,” Computer Engineering, vol. 37, no. 23, pp. 149–151, 2011 (Chinese). View at Google Scholar
  43. B. X. Lu, Research on Optimization and Improvement of S-box in Block Cipher, Southwest Jiaotong University, Sichuan, China, 2013 (Chinese).
  44. C. Adams and S. Tavares, “Good S-boxes are easy to find,” in Advances in Cryptology—CRYPTO’89 Proceedings, pp. 612–615, Springer, New York, NY, USA, 1990. View at Google Scholar
  45. A. F. Webster and S. E. Tavares, “On the design of S-boxes,” in Advances in Cryptology—CRYPTO’85 Proceedings, pp. 523–534, Springer, Berlin, Germany, 1986. View at Google Scholar
  46. M. Matsui, “Linear cryptanalysis method of DES cipher,” in Advances in Cryptology, Proc. Eurocrypt’93, Proceedings, pp. 386–397, Springer, Berlin, Germany, 1994. View at Google Scholar