Abstract
With the advent of the Internet of Things (IoT), security methods need improvisation to prevent data stealing. Since IoT transfers the various heterogeneous data such as video, text, data signals, and even voices, efficient security systems must overcome the various attacks in the networks. IoT is often connected with low power devices, and these devices are vulnerable to attacks as it contains low security. Therefore, this requires a robust encryption method to protect the user data from the attacker. Traditional methods such as Data Encryption Systems (DES) and Advanced Encryption Systems (AES) are playing an essential role in ensuring the security in IoT devices, and the presence of substitution boxes (S-boxes) makes the system even more complex to counterfeit the attacks mainly side-channel attacks. Researchers claim that these traditional S-boxes need to be improvised when transmitting heterogeneous data, especially the images over the network. In this paper, A Novel dynamic substitution boxes are designed based on hybrid logistic-Henon maps with the deoxyribonucleic acid (DNA) coding systems to improve the security level of images against the side-channel attacks. The proposed structure uses the three-dimensional hybrid chaotic maps to increase the key space and uses the DNA pattern of operations to endure more security. The extensive experimentations are carried out for the proposed scheme and compared with the existing AES S-box structures. Analysis shows that the proposed structure is more resistant against side-channel attacks, as alleged.
Similar content being viewed by others
References
Li C, Zhang Y, Yong E (2019) When an attacker meets a cipher-image in 2018: a year in review. J Inf Sec Appl 48:1–9 [CrossRef]
Özkaynak F (2018) Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn 92:305–313 [CrossRef]
Cho J, Kim T, Kim S, Im M, Kim T, Shin Y (2020) Real-time detection, for cache side channel attack using performance counter monitor. Appl Sci 10:984 [CrossRef]
Kocarev L, Lian S (2011) Chaos-based cryptography: theory, algorithms and applications, vol 354. Springer, New York, NY, USA
Khan M, Shah T, Batool SI (2016) Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comp Appl 27:677–685 [CrossRef]
J. L. Freitas and R. R. Oliveira (2004) “Implementac¸ao, comparac ˜ ¸ao˜ e analise dos algoritmos IDEA e DES,” in ´ I Encontro Regional emModelagem e AnaliseComputacional de Sistemas (ERMACS ´ ’04), Goiania, Brazil
Daemen J, Rijmen V (2002) The design of Rijndael: AES-the advanced encryption standard. Springer, New York, NY, USA
Hussain I, Anees A, Al-Maadeed TA et al (2019) Construction of S-box based on chaotic map and algebraic structure. Symmetry 11(3):351
Özkaynak F, Çelik V, Özer AB (2017) A new S-box construction method based on the fractional order chaotic Chen system. Signal Image Video Proc 11:659–664
Amira S. El Batouty, Hania H. Farag, Mohamed-Amr A. Mokhtar, and El-Sayed A-M. El-Badawy (2019) “New hybrid AES static S-box algorithm using chaotic maps”, Proceedings of the 2019 IEEE International Conference on Information Technologies. St. Constantine and Elena, Bulgaria.
MehmetSahinAcikkapi, FatihOzkaynak and Ahmed BedriOzar (2019) “Side-channel analysis of chaos-based substitution box structures” IEEE Access, June 3
Jan Sher Khan WadiiBoulila et al (2020). ,” DNA and plaintext dependent chaotic visual selective image encryption”, IEEE Access, August 28
Lilian Huang, Shiming Wang, Jianhong Xiang ,and Yi Sun (2020) “Chaotic color image encryption scheme using deoxyribonucleic acid (DNA) coding calculations and arithmetic over the Galois field”, Hindawi, Mathematical Problems in Engineering 3965281, 22.
Yang Cao (2013) “A new hybrid chaotic map and its application on image encryption and hiding” Hindawi, Mathematical Problems in Engineering 728375, 13 pages.
FıratArtuger FO (2020) A novel method for performance improvement of chaos-based substitution boxes. Symmetry 12:571. https://doi.org/10.3390/sym12040571
Ehsan Hasanzadeh, Mahdi Yaghoobi (2019) ”A novel color image encryption algorithm based on substitution box and hyper-chaotic system with fractal keys”, Multimedia Tools and Applications.
Y.Bhavani, Sai SrikarPuppala, B. Jaya Krishna, Srija Madarapu (2019) ” Modified AES using dynamic S-box and DNA cryptography”, SProceedings of the Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC ), IEEE Xplore.
Fouda JSAE, Effa JY, Sabat SL, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19(3):578–588
Ravichandran D, Praveenkumar P, BalaguruRayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184
Pashakolaee PG, Shahhoseini HS, Mollajafari M (2018) Hyper-chaotic Feeded GA (HFGA): a reversible optimization technique for robust and sensitive image encryption. Multimed Tools Appl 77(16):20385–20414
Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497
Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29–42
Chung K, Chang L (1998) Large encrypting binary images with higher security. Pattern Recogn Lett 19(5–6):461–468
Hussain I, Shah T, Gondal MA (2012) Image encryption algorithm based on PGL(2,GF(28)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dyn 70(1):181–187
Hussain I, Shah T, Gondal M (2013) Image encryption algorithm based on total shuffling scheme and chaotic S-box. Transformation 20:2133–2136. https://doi.org/10.1177/1077546313482960
Khan M, Shah T, Batool SI (2015) An efficient chaotic image encryption scheme. Neural ComputApplic 26:1137–1148
Li C, Xie T, Liu Q, Cheng G (2014) Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn 78(2):1545–1551
Wang X, Çavu¸So ˘Glu, Ü, Kacar S, Akgul A, Pham V-T, Jafari S, Alsaadi FE, Nguyen XQ (2019) S-box based image encryption application using a chaotic system without equilibrium. Appl Sci 9:781 [CrossRef]
Al Solami E, Ahmad M, Volos C, Doja MN, Beg MMS (2018) A new hyperchaotic system-based design for efficient bijective substitution-boxes. Entropy 20:525 [CrossRef]
Islam F, Liu G (2017) Designing S-box based on 4D-4 wing hyperchaotic system. 3D Res 8:9 [CrossRef]
Özkaynak F, Yavuz S (2013) Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn 74:551–557 [CrossRef]
Do DT, Le TA, Nguyen TN, Li X, Rabie KM (2020) Joint impacts of imperfect CSI and imperfect SIC in cognitive radio-assisted NOMA-V2X communications. IEEE Access 8:128629–128645
Khan MF, Ahmed A, Saleem K (2019) A novel cryptographic substitution box design using Gaussian distribution. IEEE Access 7:15999–16007
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
S, A., G, U. S-DAC: A Novel Dynamic Substitution boxes using hybrid chaotic system and Deoxyribonuceic Acid(DNA) coding for counterfeiting Side-Channel Attacks. Pers Ubiquit Comput 27, 1321–1334 (2023). https://doi.org/10.1007/s00779-021-01579-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-021-01579-4