Designing S-box Using Tent-Sine Chaotic System While Combining the Traits of Tent and Sine Map
نویسندگان
چکیده
Secure exchange of sensitive information between different entities is a serious challenge in today’s environment. Therefore, various cryptosystems have been created specifically for this purpose. Various operations are used these cryptosystems. The most common substitution and permutation. substitution-box (S-box), look-up table that takes x bits as input replaces them with y bits, responsible the operation. construction an S-box strong cryptographic attributes essential part building robust secure cryptosystem.Numerous researchers dedicated their efforts to devising intricate techniques constructing S-boxes. In study, novel approach proposed design dynamic based on compound-chaotic map. suggested method characterized by its simplicity resilience. Notably, Tent-Sine chaotic system significantly expands range, setting it apart from other systems rendering more suitable applications. This research introduces promising avenue enhancing security effectiveness S-boxes, contributing advancement systems. A number widely accepted metrics, such Non-Linearity (NL), Strict Avalanche Criterion (SAC), Bit Independence (BIC), Linear Probability (LP), Differential (DP), extensively exercised analysis evaluation S-Box’s strength. results compared S-boxes researchers, observed cryptographically sound worthy inclusion modern
منابع مشابه
On the Enlargement of Robust Region of Chaotic Tent Map for the Use in Key Based Substitution-Box (S-Box)
Corresponding Author: Muhammad Asif Khan Department of Electrical and Electronics Engineering, Universiti Teknologi PETRONAS, Darul Ridzuan, 31750 Perak, Malaysia Email: [email protected] Abstract: Robust chaotic maps with wide robust region are favored in cryptography as it extends the key length. Chaotic tent map has robust chaos for control parameter μ = 2. Perturbation of control parameter v...
متن کاملCryptanalysis of Image Encryption Scheme Based on Chaotic Tent Map
With the development of chaos theory, many image encryption algorithmshave been designed using the properties associated withthechaotic map. The chaotic map shows high sensitivity to initial conditions and the sequence generated using chaotic map are unpredictable making it a good choice for performing encryption operation. But, without proper encryption algorithm design, encryption scheme desi...
متن کاملChaotic Hybrid Bacterial Colony Chemotaxis Algorithm Based on Tent Map
Aiming at improving the global convergence speed of bacterial colony chemotaxis (BCC) optimization algorithm, a new chaotic hybrid bacterial colony chemotaxis (CHBCC) algorithm is introduced through the technique of hybrid algorithm. By integrating elitist strategy and chaotic optimization into bacterial colony chemotaxis optimization algorithm, it greatly enhances the local searching efficienc...
متن کاملImage encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملDynamical properties of the tent map
where β = β(β−1)−1, M ∈ N∪{∞}, and l0, l1, . . . is a uniquely determined (finite or infinite) sequence of non-negative integers (cf. [2]). Analogously to other types of expansions we may ask for bases β such that the set of numbers with periodic or even finite representation is as large as possible. In particular, we say that Tβ satisfies the periodicity property (P) if the orbit (T β (x))n≥1 ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3298111