Skip to main content
Log in

S-DAC: A Novel Dynamic Substitution boxes using hybrid chaotic system and Deoxyribonuceic Acid(DNA) coding for counterfeiting Side-Channel Attacks

  • Original Paper
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

With the advent of the Internet of Things (IoT), security methods need improvisation to prevent data stealing. Since IoT transfers the various heterogeneous data such as video, text, data signals, and even voices, efficient security systems must overcome the various attacks in the networks. IoT is often connected with low power devices, and these devices are vulnerable to attacks as it contains low security. Therefore, this requires a robust encryption method to protect the user data from the attacker. Traditional methods such as Data Encryption Systems (DES) and Advanced Encryption Systems (AES) are playing an essential role in ensuring the security in IoT devices, and the presence of substitution boxes (S-boxes) makes the system even more complex to counterfeit the attacks mainly side-channel attacks. Researchers claim that these traditional S-boxes need to be improvised when transmitting heterogeneous data, especially the images over the network. In this paper, A Novel dynamic substitution boxes are designed based on hybrid logistic-Henon maps with the deoxyribonucleic acid (DNA) coding systems to improve the security level of images against the side-channel attacks. The proposed structure uses the three-dimensional hybrid chaotic maps to increase the key space and uses the DNA pattern of operations to endure more security. The extensive experimentations are carried out for the proposed scheme and compared with the existing AES S-box structures. Analysis shows that the proposed structure is more resistant against side-channel attacks, as alleged.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Li C, Zhang Y, Yong E (2019) When an attacker meets a cipher-image in 2018: a year in review. J Inf Sec Appl 48:1–9 [CrossRef]

    Google Scholar 

  2. Özkaynak F (2018) Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn 92:305–313 [CrossRef]

    Article  Google Scholar 

  3. Cho J, Kim T, Kim S, Im M, Kim T, Shin Y (2020) Real-time detection, for cache side channel attack using performance counter monitor. Appl Sci 10:984 [CrossRef]

    Article  Google Scholar 

  4. Kocarev L, Lian S (2011) Chaos-based cryptography: theory, algorithms and applications, vol 354. Springer, New York, NY, USA

    Book  MATH  Google Scholar 

  5. Khan M, Shah T, Batool SI (2016) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comp Appl 27:677–685 [CrossRef]

    Article  Google Scholar 

  6. J. L. Freitas and R. R. Oliveira (2004) “Implementac¸ao, comparac ˜ ¸ao˜ e analise dos algoritmos IDEA e DES,” in ´ I Encontro Regional emModelagem e AnaliseComputacional de Sistemas (ERMACS ´ ’04), Goiania, Brazil

  7. Daemen J, Rijmen V (2002) The design of Rijndael: AES-the advanced encryption standard. Springer, New York, NY, USA

    Book  MATH  Google Scholar 

  8. Hussain I, Anees A, Al-Maadeed TA et al (2019) Construction of S-box based on chaotic map and algebraic structure. Symmetry 11(3):351

    Article  Google Scholar 

  9. Özkaynak F, Çelik V, Özer AB (2017) A new S-box construction method based on the fractional order chaotic Chen system. Signal Image Video Proc 11:659–664

    Article  Google Scholar 

  10. Amira S. El Batouty, Hania H. Farag, Mohamed-Amr A. Mokhtar, and El-Sayed A-M. El-Badawy (2019) “New hybrid AES static S-box algorithm using chaotic maps”, Proceedings of the 2019 IEEE International Conference on Information Technologies. St. Constantine and Elena, Bulgaria.

  11. MehmetSahinAcikkapi, FatihOzkaynak and Ahmed BedriOzar (2019) “Side-channel analysis of chaos-based substitution box structures” IEEE Access, June 3

  12. Jan Sher Khan WadiiBoulila et al (2020). ,” DNA and plaintext dependent chaotic visual selective image encryption”, IEEE Access, August 28

  13. Lilian Huang, Shiming Wang, Jianhong Xiang ,and Yi Sun (2020) “Chaotic color image encryption scheme using deoxyribonucleic acid (DNA) coding calculations and arithmetic over the Galois field”, Hindawi, Mathematical Problems in Engineering 3965281, 22.

  14. Yang Cao (2013) “A new hybrid chaotic map and its application on image encryption and hiding” Hindawi, Mathematical Problems in Engineering 728375, 13 pages.

  15. FıratArtuger FO (2020) A novel method for performance improvement of chaos-based substitution boxes. Symmetry 12:571. https://doi.org/10.3390/sym12040571

    Article  Google Scholar 

  16. Ehsan Hasanzadeh, Mahdi Yaghoobi (2019) ”A novel color image encryption algorithm based on substitution box and hyper-chaotic system with fractal keys”, Multimedia Tools and Applications.

  17. Y.Bhavani, Sai SrikarPuppala, B. Jaya Krishna, Srija Madarapu (2019) ” Modified AES using dynamic S-box and DNA cryptography”, SProceedings of the Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC ), IEEE Xplore.

  18. Fouda JSAE, Effa JY, Sabat SL, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19(3):578–588

    Article  MathSciNet  MATH  Google Scholar 

  19. Ravichandran D, Praveenkumar P, BalaguruRayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184

    Article  Google Scholar 

  20. Pashakolaee PG, Shahhoseini HS, Mollajafari M (2018) Hyper-chaotic Feeded GA (HFGA): a reversible optimization technique for robust and sensitive image encryption. Multimed Tools Appl 77(16):20385–20414

    Article  Google Scholar 

  21. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497

    Article  Google Scholar 

  22. Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  23. Chung K, Chang L (1998) Large encrypting binary images with higher security. Pattern Recogn Lett 19(5–6):461–468

    Article  MATH  Google Scholar 

  24. Hussain I, Shah T, Gondal MA (2012) Image encryption algorithm based on PGL(2,GF(28)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dyn 70(1):181–187

    Article  Google Scholar 

  25. Hussain I, Shah T, Gondal M (2013) Image encryption algorithm based on total shuffling scheme and chaotic S-box. Transformation 20:21332136. https://doi.org/10.1177/1077546313482960

    Article  Google Scholar 

  26. Khan M, Shah T, Batool SI (2015) An efficient chaotic image encryption scheme. Neural ComputApplic 26:1137–1148

    Article  Google Scholar 

  27. Li C, Xie T, Liu Q, Cheng G (2014) Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn 78(2):1545–1551

    Article  Google Scholar 

  28. Wang X, Çavu¸So ˘Glu, Ü, Kacar S, Akgul A, Pham V-T, Jafari S, Alsaadi FE, Nguyen XQ (2019) S-box based image encryption application using a chaotic system without equilibrium. Appl Sci 9:781 [CrossRef]

    Article  Google Scholar 

  29. Al Solami E, Ahmad M, Volos C, Doja MN, Beg MMS (2018) A new hyperchaotic system-based design for efficient bijective substitution-boxes. Entropy 20:525 [CrossRef]

    Article  Google Scholar 

  30. Islam F, Liu G (2017) Designing S-box based on 4D-4 wing hyperchaotic system. 3D Res 8:9 [CrossRef]

    Article  Google Scholar 

  31. Özkaynak F, Yavuz S (2013) Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn 74:551–557 [CrossRef]

    Article  MathSciNet  MATH  Google Scholar 

  32. Do DT, Le TA, Nguyen TN, Li X, Rabie KM (2020) Joint impacts of imperfect CSI and imperfect SIC in cognitive radio-assisted NOMA-V2X communications. IEEE Access 8:128629–128645

    Article  Google Scholar 

  33. Khan MF, Ahmed A, Saleem K (2019) A novel cryptographic substitution box design using Gaussian distribution. IEEE Access 7:15999–16007

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aruna S.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

S, A., G, U. S-DAC: A Novel Dynamic Substitution boxes using hybrid chaotic system and Deoxyribonuceic Acid(DNA) coding for counterfeiting Side-Channel Attacks. Pers Ubiquit Comput 27, 1321–1334 (2023). https://doi.org/10.1007/s00779-021-01579-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-021-01579-4

Keywords

Navigation