Next Article in Journal
Carbide Formation in Refractory Mo15Nb20Re15Ta30W20 Alloy under a Combined High-Pressure and High-Temperature Condition
Previous Article in Journal
Testing the Steady-State Fluctuation Relation in the Solar Photospheric Convection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme

1
Department of Computer Engineering, Jamia Millia Islamia, New Delhi 110025, India
2
Department of Information Security, University of Jeddah, Jeddah 21493, Saudi Arabia
*
Author to whom correspondence should be addressed.
Entropy 2020, 22(7), 717; https://doi.org/10.3390/e22070717
Submission received: 30 May 2020 / Revised: 16 June 2020 / Accepted: 27 June 2020 / Published: 28 June 2020
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
Static substitution-boxes in fixed structured block ciphers may make the system vulnerable to cryptanalysis. However, key-dependent dynamic substitution-boxes (S-boxes) assume to improve the security and robustness of the whole cryptosystem. This paper proposes to present the construction of key-dependent dynamic S-boxes having high nonlinearity. The proposed scheme involves the evolution of initially generated S-box for improved nonlinearity based on the fractional-order time-delayed Hopfield neural network. The cryptographic performance of the evolved S-box is assessed by using standard security parameters, including nonlinearity, strict avalanche criterion, bits independence criterion, differential uniformity, linear approximation probability, etc. The proposed scheme is able to evolve an S-box having mean nonlinearity of 111.25, strict avalanche criteria value of 0.5007, and differential uniformity of 10. The performance assessments demonstrate that the proposed scheme and S-box have excellent features, and are thus capable of offering high nonlinearity in the cryptosystem. The comparison analysis further confirms the improved security features of anticipated scheme and S-box, as compared to many existing chaos-based and other S-boxes.

1. Introduction

With the recent advancements in the field of wired/wireless network communication and electronic sharing of confidential data, the need for information security within the organization has undergone major changes. There is heavy reliance on electronic transfer of confidential data in daily life. Examples include different wallets, ecommerce websites purchases use our debit card info, internet banking and emails, etc. Network security is required to protect data while in transit. Cryptography provides the secure exchange of information between two communicating parties [1]. In cryptography, the plain message is converted to cipher text prior to its being transferred over the communication network, so that the observers or the attackers cannot interpret the original information. Thus, in order to successfully encrypt the message, we need to form a secure cipher from the plain text. To form a secure cipher confusion and diffusion are two essential properties needed, as identified by Claude Shannon. In confusion, each bit of the cipher text depends upon several parts of the key hiding the relationship between the two, therefore making it hard to find the key even if someone has a long plain text. In diffusion, the output bits depend upon the input bits in a complex way: If we change a single bit in the plain text, then at least half of the bits in the output cipher text should vary, and, similarly, if we change one of the bits in the cipher text, then more than half of the bits in the input plain text should change. Therefore, this makes the relationship between the plain text and the cipher text complex [2,3,4].
Modern cryptographic applications extensively make use of block encryption algorithms. Strong block encryption algorithms can be designed with the help of substitution-boxes (S-boxes). In cryptographic systems, the encryption process relies on the nonlinear mapping of plain data to the secure encrypted data. The nonlinear transformation of data is facilitated by the application of the substitution process embedded in the cipher [5,6]. S-box is the only nonlinear component for many block encryption algorithms like IDEA (International Data Encryption Algorithm), DES (Data Encryption Standard), and AES (Advanced Encryption Standard). S-boxes are responsible for creating confusion in data during the encryption process; due to this property of the S-box, it is the essential component of numerous block ciphers. For this reason, the cryptanalyst generally targets the S-box component of the block encryption algorithm; hence, the S-box construction methods have received significant importance and are an active area of research [7,8,9,10].
Basically, an 8 × 8 sized substitution-box indicates that the S-box is having 8 input bits, and 8 output bits can be viewed as a transformation S: {0, 1}8 → {0, 1}8, i.e., it is a one-to-one mapping wherein each 8-bit input is uniquely mapped to a distinct 8-bit output. Therefore, the S-boxes can also be viewed as multi-input and multi-output Boolean functions. Thus, an 8 × 8 S-box inherently comprises of eight candidate Boolean functions. Each function takes 8-bit input and yields 1-bit as output; thereby, all eight Boolean functions collectively give output bits-streams of size 8-bit. The block ciphers make use of two types of S-boxes, namely the static and dynamic S-boxes [11]. The former remains unchanged during every operation of a block cipher, as it is independent to the cipher’s secret key. However, the dynamic S-boxes may be changed due to change in one or more secret key components. Thus, the dynamic S-boxes are highly key-dependent and make the ciphers stronger and more robust against different cryptanalysis, compared to the ciphers, which are based on static S-boxes. As a result, the secure dynamic S-boxes have a dominant part to decide the forte of block cryptosystems. The security features of S-boxes are of vast significance for the security of cryptosystems [12,13,14]. Henceforth, the progress of dynamic, potent, and robust S-boxes is of supreme impact for researchers aspiring to develop strong modern cryptosystems.
Dynamical systems have various applications in numerous disciplines, including cryptology, meteorology, physics, and engineering. They deal with analyses, design, and performance assessment of continuous or discrete nonlinear systems that are extremely subtle to initial conditions. The deterministic nonlinear systems which possess good sensitivity to initial conditions are said to exhibit chaotic behavior [15,16]. If this initial information is not available, the system appears pseudo-random to the observer. The designing of dynamical chaotic systems-based schemes for network security has been a growing area of research in recent years. In chaos-based cryptography, the objectives of a cryptographic system are to obscure information present in the plain text in order to secure the encrypted data. The integral part of creating the confusion is the inception of pseudo-randomness in data at the output. Many block ciphers have been proposed during the last few decades; S-boxes are one of the essential components of block cryptosystems. There are many other approaches, as well, to bring about uncertainty, but dynamical systems have developed to be one of the lucrative choices for creating confusion, generating mix-up, and bringing about nonlinear changes in the data. In recent times, various S-box construction methods have been proposed based on different forms of dynamical models like discrete, continuous, fractional-order, time-delayed, etc. Discrete systems have been used in most of the studies, to avoid the numerical deterioration that may occur in the case of continuous systems. Previously, quantization-based algorithms were used for the construction of S-boxes, using the integer-order continuous-time dynamical systems. More complex systems were used to increase the performance of the S-box component.
Over the past decade, the dynamical behavior of continuous chaotic systems, multi-scroll attractors, and hyperchaotic systems has been intensively studied for engineering and other applications [17]. It has been found out that integer-order nonlinear systems do not show sensitive dependence to initial conditions if the dimension of system is smaller than three [18]. However, in case of fractional-order nonlinear systems, a complicated dynamical behavior is observed even for the system whose dimension is smaller than three. The set of fractional-order dynamical systems is the superset of integer-order systems. Notably, more complicated dynamics and high sensitivity to initial conditions is observed in fractional-order dynamical systems compared to integer-order systems [19]. Dynamics of fractional-order systems are found to be more complex because of their high nonlinearity and non-local character. As a result, the fractional-order systems have been employed in secure communication due to this soothing property. In addition, the incorporation of a time delay in fractional-order systems can further increase the complexity, unpredictability, pseudo-randomness, etc., and can contribute to make strong security primitives [20,21]. Time-delayed systems are applied in a large variety of cases, in many scientific fields, such as feedback loops, artificial neural network, control systems, and application of communications [22].
There exist many proposals for S-box construction where the dynamics of integer-order continuous systems (having dimension three or more) are applied. In Reference [23], it was shown that a good S-box can be obtained by using continuous chaotic 3D Lorenz system. In Reference [24], Khan et al. made use of two 3D continuous chaotic systems, namely the Lorenz and Rössler systems, to generate the candidate values of an 8 × 8 substitution-box. Meanwhile, Khan et al. gave a procedure wherein a 3D fractional Rössler chaotic system was applied to synthesis 8 × 8 S-boxes [25]. In Reference [26], the authors constructed an S-box, using a method based on the 3D four-wing autonomous chaotic system. In Reference [27], a continuous six-dimensional hyperchaotic system was explored to generate the initial S-boxes for an Artficial Bee Colony (ABC)-based optimization process which resulted in an optimized S-box. A new S-box design was proposed in Reference [28] which is honorable. The authors’ design was aided with rich dynamic features of a new scaled Zhongtang chaotic system. Islam et al. gave an S-box generation method which was based on a 4D hyperchaotic system in which two pseudo-random 8-bit sequences were obtained to yield an S-box on two-position swapping [29]. Solami et al. [30] designed a random heuristic search method to generate efficient bijective S-boxes by using 5D hyperchaotic system. Wang et al. [31] used a new three-dimensional continuous chaotic map with infinite equilibrium points to design an S-box, but its nonlinearity was also not good enough. Liu et al. [32] proposed employing spatiotemporal chaos to generate S-boxes. They used the non-adjacent coupled map lattices and Arnold’s cat map to extract the spatiotemporal chaotic behavior of the system. However, there exists only one proposal by Özkaynak where the time-delayed models of 1D chaotic Ikeda, sine map, and Logistic are investigated to frame a simple scheme of yielding S-boxes [33], showing satisfactory performances. Similarly, there are only two research works which investigate the fractional-order systems for an S-box design. The first one was given by Özkaynak in Reference [34], which investigated a simple approach of constructing S-boxes by using the 3D fractional Chen system. The second one was suggested by Khan et al. [35], who explored the features of a fractional-order 3D chaotic Rössler system to construct an 8 × 8 S-box. To date, no S-box method has been investigated based on the two-state continuous dynamical system which is of fractional-order and time-delayed as well. The two can also be marked as components of secret key to complicate the work of possible cryptanalysis. The orders of fractional derivatives and amount of time delay extend the possible key space of the security system. In this paper, a new S-box evolution scheme is proposed, using the dynamics of the fractional-order time-delayed two-state Hopfield neural network system. It has been shown that time delay plays a vital role in increasing the nonlinearity of the S-box.
The remaining portion of the paper is maintained as follows. The time-delay fractional Hopfield neural network is discussed in Section 2. Section 3 provides the proposed scheme of initial S-box generation and its evolution for high nonlinearity, using the selected Hopfield system. Section 4 is developed to report the security performance of the proposed S-box under some standard properties, followed by its analyses and comparison with contemporary S-box proposals on dynamical systems. Lastly, Section 5 concludes the research findings of this paper.

2. Fractional-Order Hopfield Neural Network

The two-state time-delayed fractional Hopfield neural network is defined as follows [19].
Dpx(t) = A1x(t) + B1f(x(t)) + C1f(y(t)) + D1f(x(tτ)) + E1f(y(tτ)) + I1
Dqy(t) = A2y(t) + B2f(x(t)) + C2f(y(t)) + D2f(x(tτ)) + E2f(y(tτ)) + I2
where x(t) and y(t) represent the states of the two neurons at time instance, t; 0 < p and q < 1 are the derivative orders; τ > 0 denotes the delay introduced in time, t; A, B, C, D, E, and I are the associated coefficients corresponding to each state; and f(x) is the piece-wise linear (PWL) function given as f(x) = 0.5 × (|x + 1| − |x − 1|). We followed the procedure as per Grunwald–Letnikov (GL) definition, mentioned in Sections 2.3 and 2.9 in Reference [36], to solve the fractional-order derivative equations of the Hopfield system. The numerical solution of the above two-state time-delayed fractional Hopfield neural network is as follows:
x ( t k ) = h p ( A 1 x ( t k 1 ) + B 1 f ( x ( t k 1 ) ) + C 1 f ( y ( t k 1 ) ) + D 1 f ( x ( t k τ ) + E 1 f ( y ( t k τ ) ) + I 1 ) j = 0 k c j ( p ) x ( t k j ) y ( t k ) = h q ( A 2 y ( t k 1 ) + B 2 f ( x ( t k 1 ) ) + C 2 f ( y ( t k 1 ) ) + D 2 f ( x ( t k τ ) + E 2 f ( y ( t k τ ) ) + I 2 ) j = 0 k c j ( q ) y ( t k j )
where h is the time step, and
c j ( p ) = ( 1 1 + p j ) c j 1 ( p ) c 0 ( p ) = 1 ;
c j ( q ) = ( 1 1 + q j ) c j 1 ( q ) c 0 ( q ) = 1 ;
Now the transmission delay in time terms are computed though the linear interpolation scheme, expression are as follows (assuming τ > h).
x ( t k τ ) = x ( t k d ) + ( t k τ t k d t k d + 1 t k d ) ( x ( t k d + 1 ) ) x ( t k d )
y ( t k τ ) = y ( t k d ) + ( t k τ t k d t k d + 1 t k d ) ( y ( t k d + 1 ) ) y ( t k d )
where d = ceil(τ/h) when djn + 1, and x(tkτ) = x0 for 0 ≤ j < d. After solving the system for pre-specified number of iterations, we get two sequences.

3. Proposed S-Box Construction Scheme

The two forms of the time delayed fractional Hopfield neural network with different derivative orders and time delays are identified as System (1) and System (2), given below. The coefficients for the two forms are set at A1 = −0.25, A2 = −0.2, B1 = −0.05, B2 = 0.02, C1 = 0.01, C2 = −0.01, D1 = −0.01, D2 = 0.02, E1 = 0.02, E2 = 0.01, I1 = −0.1, and I2 = 0.4.
System (1):
D p 1 x 1 ( t ) = 0.25 x 1 ( t ) 0.05 f ( x 1 ( t ) ) + 0.01 f ( x 2 ( t ) ) 0.01 f ( x 1 ( t τ 1 ) ) + 0.02 f ( x 2 ( t τ 1 ) ) 0.1 D q 1 x 2 ( t ) = 0.2 x 2 ( t ) + 0.02 f ( x 1 ( t ) ) 0.01 f ( x 2 ( t ) ) + 0.02 f ( x 1 ( t τ 1 ) ) + 0.01 f ( x 2 ( t τ 1 ) ) + 0.4
System (2)
D p 2 y 1 ( t ) = 0.25 y 1 ( t ) 0.05 f ( y 1 ( t ) ) + 0.01 f ( y 2 ( t ) ) 0.01 f ( y 1 ( t τ 2 ) ) + 0.02 f ( y 2 ( t τ 2 ) ) 0.1 D q 2 y 2 ( t ) = 0.2 y 2 ( t ) + 0.02 f ( y 1 ( t ) ) 0.01 f ( y 2 ( t ) ) + 0.02 f ( y 1 ( t τ 2 ) ) + 0.01 f ( y 2 ( t τ 2 ) ) + 0.4
where x1(0) ≠ y1(0), and/or x2(0) ≠ y2(0), and/or p1p2, and/or q1q2, and/or τ1τ2. The two systems are considered as to extend the possible key space of the proposed method. System (1) is utilized to generate the initial configuration of the S-box. However, System (2) is applied to improvise the nonlinearity strength of the initial S-box. The proposed scheme for the highly nonlinear S-box construction is as follows.
Step I. Initialization of S-Box
  • Take initial values of System (1) as x1(0), x2(0), p1, q1, τ1, and empty array S;
  • Iterate System (1) to obtain x1 and x2;
  • Extract w1, w2 from current x1 and x2 as
    wj = [floor(xj × 1015)]mod(256)  for j = 1, 2;
  • Save first occurrence of w1 and then w2 in array S;
  • Repeat from Step 2 until all distinct 256 elements are recorded in array S.
Step II. Evolving S-Box Scheme
  • Take initial values of System (2) as y1(0), y2(0), p2, q2, τ2, N, itr_max, step_x, step_y, prime1, prime2, and Δτ;
  • Iterate System (2) for itr_max times, to get two arrays, Y1 and Y2;
  • Extract U1(i), U2(i) from current Y1(i) and Y2(i) as
    Uj(i) = [floor(Yj(i) × 105)]mod(256)  for j = 1, 2, and i = 1, 2, …, itr_max;
  • Append arrays U1 and U2 to get a single array as
    Q[1 to itr_max] = U1; Q[itr_max + 1 to 2 × itr_max] = U2;
  • Compute rating1 = nonlinearity(S);
  • Fork = 1 to 2 × itr_max
    •   step_x = [step_x + (k × prime1)mod(32)]mod(16)
    •   step_y = [step_y + (k × prime2)mod(32)]mod(16)
    •   spos = 16 × step_x + step_y
    •   val = S(spos) XOR Q(k)
    •   find index m such that S(m) = = val
    •   set S1 = S
    •   Swap(S1(m), S1(spos))
    •   rating2 = nonlinearity(S1)
    •   if (rating2 >= rating1)
    •      S = S1
    •      rating1 = rating2
    •   endif
    • endfor;
  • Increment delay as: τ2 = τ2 + Δτ;
  • Repeat Step 2 to Step 7 for N number of increments in τ2.
The proposed scheme is also illustrated through the flowchart shown in Figure 1.

4. Performance Results and Analyses

This section deals with the performance assessment, analyses, and the proposed S-box’s comparison with some state-of-the-art S-box schemes which are based on dynamical systems. Without loss of generality, the settings for simulation of proposed scheme are provided in Table 1. The S-box obtained with these settings, using the proposed scheme, is listed in Table 2. The secret key K of proposed security scheme includes the components such as K = (x1(0), x2(0), p1, q1, τ1, y1(0), y2(0), p2, q2, τ2, N, itr_max, step_x, step_y, prime1, prime2, and Δτ). All floating-point computations are performed as per the IEEE 754 standard. Thus, the possible key space is more than 2500. This enormously large key space is sufficient enough to withstand the brute-force cryptanalysis. The most popular and standard cryptographic properties of S-boxes are as follows: high nonlinearity, low differential uniformity, the strict avalanche criterion equals to 0.5, the satisfaction of bits independence criterion for high bits independence criterion (BIC) nonlinearity and BIC–strict avalanche criterion (SAC) close to 0.5, and low linear approximation probability. A majority of the existing S-boxes schemes have scrutinized their constructed S-boxes mainly against these security properties [37,38,39,40,41]. The following subsections analyzed the proposed S-boxes under the mentioned properties.

4.1. Nonlinearity

The nonlinearity measure of a Boolean function, f, is computed by knowing the least distance of f to the set of all affine functions [42]. Thus, the component Boolean functions of the S-box should have standing nonlinearities scores. The nonlinearity NL(f) of any Boolean function f is computed as follows:
N L ( f ) = 128 ( 1 2 8 max z { 0 , 1 } 8 | S f ( z ) | )
S f ( z ) = x { 0 , 1 } 8 ( 1 ) f ( x ) x . z
where Sf(z) is the Walsh–Hadamard transform of Boolean function, f. A Boolean function is deemed frail if it tends to have poor nonlinearity. The higher nonlinearity of balanced Boolean functions is considered one of the prominent measures responsible for providing better robustness to any type of linear attack [43]. We find that the nonlinearity scores of the proposed S-box are 110, 110, 112, 112, 112, 110, 112, and 112, which include the minimum NL of 110 and an average score of 111.25. Thus, it is very evident that the proposed S-box possesses high nonlinearity performance. The reason being, the proposed scheme made to evolve the S-box based on the nonlinearity rating.

4.2. Strict Avalanche Criterion

The strict avalanche criterion was described by Tavares and Webster, and it gets its base on the completeness effect’s notion and the avalanche [44,45]. This criterion measures that by making a single change in input bits, i.e., how many output bits get altered. The SAC is assumed to be satisfied when all the output bits are changed with a likelihood of 0.5, when only one input bit is flipped. Following the procedure given by Webster and Tavares, we get the SAC matrix shown in Table 3. The average of this matrix, which is 0.5007, indicates the SAC value. We can see that this score is close to ideal value of 0.5 with infinitesimal offset of only 0.0007. Thus, the proposed S-box has good avalanche when any of the single input bit is altered and decently satisfies the SAC criterion.

4.3. Bits Independence Criterion

The input bits which remain unchanged are explored under the bits independence criterion. The revamping of the independent performance of pair-wise variables of avalanche vectors and unaltered input bits is the asset of this measure. Under this criterion, the avalanche component Boolean functions pairs should be independent to each. It is an effective criterion in symmetric cryptosystem, because by augmenting independence between bits, the recognition and prediction of patterns of the system is not possible [30,46]. Accordingly, the Boolean functions f = fifj (ij) should behave well for nonlinearity and SAC properties both. The BIC performance of the proposed S-box for nonlinearity is shown in Table 4 and for SAC is provided in Table 5. The BIC-nonlinearity (NL) score is 102.57, and BIC–SAC is 0.5034, which indicates the acceptable performance of our S-box under BIC property.

4.4. Differential Uniformity

The differential uniformity measures the resistivity of an S-Box against the differential cryptanalysis. The attack procedure of cryptanalysis was given by Biham and Shamir; it is related with developing imbalance on the input/output dissemination to assault block ciphers and S-boxes [47]. Confrontation to this cryptanalysis can be consummate if the Exclusive-OR of each output has identical uniformity with the EX-OR value of each input. If an S-box is uniform in input/output distribution, then it is said to be resistant. It is preferred that the largest value of differential uniformity (DU) in EX-OR table should be as small as possible [48]. The differential uniformity is measured as follows:
δ S = max Δ x 0 , Δ y ( # { x X | S ( x ) S ( x Δ x ) = Δ y } )
where set X holds all probable input values, and the cardinality of its elements is 256 for 8x8 S-box. The largest value of EX-OR (differential distribution) table for an S-box should be as small enough to resist the differential cryptanalysis. The differential distribution matrix for the proposed S-box is obtained and is available as Table 6. The highest value of this matrix, i.e., 10, is the differential uniformity for our S-box, and such maximum values are only 7 out of the 256 values in the matrix, thus indicating the good differential uniformity and robustness of the proposed S-box.

4.5. Linear Approximation Probability

The method of linear approximation probability (LAP) is helpful in calculating the imbalance of an incident. The largest value of imbalance of an event is measured with the help of the analysis introduced by Matsui [49]. There must be no difference between output and input bits uniformity. Each of the input bits with its results in output bits is examined individually. If all the input elements are 256 for the 8 × 8 S-box, the class of all possible inputs is d, and the masks applied on the equality of output and input bits are respectively mx and my, then maximum linear approximation is the maximum number of the same results and calculated as follows:
L A P ( S ) = max m x , m y 0 | # { x X | x . m x = y . m y } 256 0.5 |
A lower value of this measure indicates that S-box is more capable to resist the linear cryptanalysis. The LAP score of proposed S-box is 0.14025.

4.6. Comparison

A performance comparison analysis is significant in finding the actual standing of the proposed S-box. Almost all S-box methods were dynamical systems of the following types: (1) high dimensional continuous integer-order systems, (2) time delay system, (3) fractional-order 3D systems, and some other recent S-boxes are opted for the comparison. The performance scores for different security properties of all selected S-boxes are displayed in Table 7.
The nonlinearity performance of the proposed S-box comes out to be outstanding, as all three statistics, namely the minimum (110), maximum (112), and average (111.25), are significantly higher than the S-boxes in Table 7. The same comparison is also shown graphically in Figure 2a. Thus, highly nonlinear S-boxes can be constructed by using the proposed novel scheme.
The proposed S-box was also found to show good SAC behavior, as our SAC value of 0.5007 is quite better than the scores of S-boxes constructed in References [23,24,25,26,27,28,30,33,34,41,42,50,51,52,53,54,55,56,57,58,59,60], as evident from Table 7 and Figure 2b. The proposed S-box satisfies the SAC criterion quite diligently as compared to other contemporary S-boxes.
The results of bits independence criterion show that the proposed S-box also exhibits acceptable BIC performance, as the BIC–SAC and BIC-nonlinearity scores are satisfactory, as shown in Figure 2c,d.
The differential uniformity of our S-box is only 10, which is less and better than S-boxes investigated in References [24,25,42,54,55,56,57], and it is comparable to other S-boxes in terms of robustness to differential cryptanalysis. The DU comparison is also shown graphically in Figure 2e.
A block cipher can withstand the linear cryptanalysis if the employed S-box is dynamic, highly nonlinear, and linear approximation probability is low. The LAP score of 0.14025 is obtained for the proposed S-box, which shows a satisfactory value. Moreover, this probability score is quite lower and better than the LAP score of the S-boxes available in References [25,27,28,29,33,34,42,52,54,55,56,57]. The LAP comparison is also shown graphically in Figure 2f.

4.7. Time Analysis

The computation time is one of the essential features for any security application. In order to have an idea of time consumption of our proposed scheme, we calculated the time taken by the scheme to evolve an S-box. It was found that the scheme takes a very nominal amount of time, (on average) only 3.5459 s. This computational time is considerably nominal compared to many optimization-based evolution of S-boxes available in the literature, such as References [5,8,38,53].

4.8. S-Box Validation for Image Encryption Applications

In recent days, the strong S-boxes have been predominantly utilized for image encryption applications. It is prudent to validate the appropriateness of proposed S-box for such security application. Accordingly, we applied the S-box presented in this study, to encrypt the standard 8-bit encoded Baboon plain-image. The encryption involves the forward and reverse substitution using the proposed S-box. The results of encryption along with the distribution of pixels in the respective images are shown in Figure 3. The obtained encrypted image shows high visual distortion and good encryption effect. To quantify the encryption performance exhibited by our S-box, we evaluated the statistical tests, such contrast, correlation, energy, and homogeneity, which are members of the Majority Logic Criteria (MLC) suite. The description and details of these tests are available in author’s previous studies [7,40,48]. The statistical scores of encryption performance under MLC analysis are listed in Table 8 and compared with encryption performances of S-boxes investigated in References [48,61]. The obtained results for MLC analysis validate the appropriateness of proposed S-box for image encryption applications.

5. Conclusions

Highly nonlinear substitution-boxes provide good nonlinear transformation and confusion of input plaintext data to generate ciphertext data in block cryptosystems. Such S-boxes are also potent to offer great resistance to mitigate the linear and other types of attacks which may exploit the existence of linearity in the security system. Moreover, the key-dependent and dynamic S-boxes also tend to provide more strength to the cryptosystem. This paper has proposed a novel scheme of constructing dynamic and highly nonlinear S-boxes. Our scheme is based on the dynamics of two-state time-delayed fractional-order Hopfield neural network system. Firstly, the anticipated scheme generates an initial S-box which is made to evolve for high nonlinearity, using the heuristic. The proposed scheme and constructed S-box possessed high cryptographic strength and large key space. It was found that the proposed scheme is able to evolve an S-box with nonlinearity of 111.25, strict avalanche criteria value of 0.5007, and differential uniformity of 10. The comparison analysis with some available dynamical-systems-based S-box methods and others validated the better performance of our S-box.
As future directions of the presented study, we can also check the effectiveness of proposed scheme in generating large-size nxn S-boxes (n > 8). The large-size S-boxes have better potential to offer resistance to several attacks than small-size S-boxes. The generation of large-size S-boxes is rarely investigated in the literature. Moreover, the evolution is initial S-box is based on only lone criteria of nonlinearity. The evolution process can be executed to satisfy multiple S-box performance parameters.

Author Contributions

Conceptualization, M.A. and E.A.-S.; Writing-Original Draft Preparation, M.A. and E.A.-S. Both the authors contributed equally in all aspects. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Forouzan, B.A. Cryptography & Network Security; McGraw-Hill, Inc.: New York, NY, USA, 2007. [Google Scholar]
  2. Faragallah, O.S. Efficient confusion–diffusion chaotic image cryptosystem using enhanced standard map. Signal Image Video Process. 2014, 9, 1917–1926. [Google Scholar] [CrossRef]
  3. Ali, K.M.; Khan, M. A new construction of confusion component of block ciphers. Multimed. Tools Appl. 2019, 78, 32585–32604. [Google Scholar] [CrossRef]
  4. Hayat, U.; Azam, N.A.; Asif, M. A method of generating 8 × 8 substitution boxes based on elliptic curves. Wirel. Pers. Commun. 2018, 101, 439–451. [Google Scholar] [CrossRef]
  5. Alzaidi, A.A.; Ahmad, M.; Ahmed, H.S.; Al Solami, E. Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map. Complexity 2018, 2018, 1–16. [Google Scholar] [CrossRef]
  6. Ahmad, M.; Chugh, H.; Goel, A.; Singla, P. A chaos based method for efficient cryptographic S-box design. In International Symposium on Security in Computing and Communication; Springer: Berlin/Heidelberg, Germany, 2013; pp. 130–137. [Google Scholar]
  7. Jamal, S.S.; Anees, A.; Ahmad, M.; Khan, M.F.; Hussain, I. Construction of Cryptographic S-Boxes Based on Mobius Transformation and Chaotic Tent-Sine System. IEEE Access 2019, 7, 173273–173285. [Google Scholar] [CrossRef]
  8. Ahmad, M.; Mittal, N.; Garg, P.; Khan, M.M.; Mahtab, M. Efficient cryptographic substitution box design using travelling salesman problem and chaos. Perspect. Sci. 2016, 8, 465–468. [Google Scholar] [CrossRef] [Green Version]
  9. Belazi, A.; Khan, M.; El-Latif, A.A.; Belghith, S. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn. 2016, 87, 337–361. [Google Scholar] [CrossRef]
  10. Lambić, D. S-box design method based on improved one-dimensional discrete chaotic map. J. Inf. Telecommun. 2018, 2, 181–191. [Google Scholar] [CrossRef]
  11. Ahmad, M.; Haleem, H.; Khan, P.M. A new chaotic substitution box design for block ciphers. In Proceedings of the 2014 International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 20–21 February 2014. [Google Scholar]
  12. Ozkaynak, F. An Analysis and Generation Toolbox for Chaotic Substitution Boxes: A Case Study Based on Chaotic Labyrinth Rene Thomas System. Iran. J. Sci. Technol. Trans. Electr. Eng. 2019, 44, 89–98. [Google Scholar] [CrossRef]
  13. Ahmad, M.; Malik, M. Design of chaotic neural network based method for cryptographic substitution box. In Proceedings of the International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India, 3–5 March 2016; pp. 864–868. [Google Scholar]
  14. Razaq, A.; Ullah, A.; Waheed, A. A Novel Technique to Improve Nonlinearity of Substitution Box without Disturbing Its Mathematical Properties. Wirel. Pers. Commun. 2019, 111, 1–15. [Google Scholar] [CrossRef]
  15. Kotulski, Z.; Szczepański, J.; Górski, K.; Paszkiewicz, A.; Zugaj, A. Application of discrete chaotic dynamical systems in cryptography—Dcc method. Int. J. Bifurc. Chaos 1999, 9, 1121–1135. [Google Scholar] [CrossRef]
  16. Yu, W.; Cao, J. Cryptography based on delayed chaotic neural networks. Phys. Lett. A 2006, 356, 333–338. [Google Scholar] [CrossRef]
  17. García, M.; Ontañón-García, L.; Campos, E.; Celikovsky, S.; Pimentel, L.J.O.G. Hyperchaotic encryption based on multi-scroll piecewise linear systems. Appl. Math. Comput. 2015, 270, 413–424. [Google Scholar]
  18. Zhu, H.; Zhou, S.; Zhang, W. Chaos and synchronization of time-delayed fractional neuron network system. In Proceedings of the 2008 the 9th International Conference for Young Computer Scientists, Hunan, China, 18–21 November 2008; pp. 2937–2941. [Google Scholar]
  19. Chen, L.; Chai, Y.; Wu, R.; Ma, T.; Zhai, H. Dynamic analysis of a class of fractional-order neural networks with delay. Neurocomputing 2013, 111, 190–194. [Google Scholar] [CrossRef]
  20. Chen, L.; Qu, J.; Chai, Y.; Wu, R.; Qi, G. Synchronization of a Class of Fractional-Order Chaotic Neural Networks. Entropy 2013, 15, 3265–3276. [Google Scholar] [CrossRef]
  21. Zhao, J.; Wang, S.; Chang, Y.; Li, X. A novel image encryption scheme based on an improper fractional-order chaotic system. Nonlinear Dyn. 2015, 80, 1721–1729. [Google Scholar] [CrossRef]
  22. Banerjee, S. Synchronization of time-delayed systems with chaotic modulation and cryptography. Chaos Solitons Fractals 2009, 42, 745–750. [Google Scholar] [CrossRef]
  23. Ozkaynak, F.; Ozer, A.B. A method for designing strong S-Boxes based on chaotic Lorenz system. Phys. Lett. A 2010, 374, 3733–3738. [Google Scholar] [CrossRef]
  24. Khan, M.; Shah, T.; Mahmood, H.; Gondal, M.A. An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn. 2012, 71, 489–492. [Google Scholar] [CrossRef]
  25. Khan, M.; Shah, T. An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process. 2013, 9, 1335–1338. [Google Scholar] [CrossRef]
  26. Liu, G.; Yang, W.; Liu, W.; Dai, Y. Designing S-boxes based on 3-D four-wing autonomous chaotic system. Nonlinear Dyn. 2015, 82, 1867–1877. [Google Scholar] [CrossRef]
  27. Tian, Y.; Lu, Z. S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm. J. Syst. Eng. Electron. 2016, 27, 232–241. [Google Scholar]
  28. Çavuşoğlu, Ü.; Zengin, A.; Pehlivan, I.; Kaçar, S. A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn. 2016, 87, 1081–1094. [Google Scholar] [CrossRef]
  29. Islam, F.U.; Liu, G. Designing S-Box Based on 4D-4Wing Hyperchaotic System. 3D Res. 2017, 8, 9. [Google Scholar] [CrossRef]
  30. Al Solami, E.; Ahmad, M.; Volos, C.; Doja, M.N.; Beg, M.M.S. A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes. Entropy 2018, 20, 525. [Google Scholar] [CrossRef] [Green Version]
  31. Wang, X.; Akgul, A.; Cavusoglu, U.; Pham, V.-T.; Hoang, D.V.; Nguyen, X.Q. A Chaotic System with Infinite Equilibria and Its S-Box Constructing Application. Appl. Sci. 2018, 8, 2132. [Google Scholar] [CrossRef] [Green Version]
  32. Liu, L.; Zhang, Y.; Wang, X. A Novel Method for Constructing the S-Box Based on Spatiotemporal Chaotic Dynamics. Appl. Sci. 2018, 8, 2650. [Google Scholar] [CrossRef] [Green Version]
  33. Özkaynak, F.; Yavuz, S. Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn. 2013, 74, 551–557. [Google Scholar] [CrossRef]
  34. Ozkaynak, F.; Çelik, V.; Ozer, A.B. A new S-box construction method based on the fractional-order chaotic Chen system. Signal Image Video Process. 2016, 11, 659–664. [Google Scholar] [CrossRef]
  35. Abd EL-Latif, A.A.; Abd-El-Atty, B.; Venegas-Andraca, S.E. A novel image steganography technique based on quantum substitution boxes. Opt. Laser Technol. 2019, 116, 92–102. [Google Scholar] [CrossRef]
  36. Petráš, I. Fractional-Order Nonlinear Systems: Modeling, Analysis and Simulation; Springer Science & Business Media: Berlin, Germany, 2011. [Google Scholar]
  37. Azam, N.A.; Hayat, U.; Ullah, I. An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization. Secur. Commun. Netw. 2018, 2018, 1–9. [Google Scholar] [CrossRef]
  38. Ahmad, M.; Doja, M.N.; Beg, M.M.S. ABC Optimization Based Construction of Strong Substitution-Boxes. Wirel. Pers. Commun. 2018, 101, 1715–1729. [Google Scholar] [CrossRef]
  39. Zahid, A.H.; Arshad, M.J.; Ahmad, M. A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation. Entropy 2019, 21, 245. [Google Scholar] [CrossRef] [Green Version]
  40. Yousaf, M.A.; Alolaiyan, H.; Ahmad, M.; Dilbar, M.; Razaq, A. Comparison of Pre and Post-Action of a Finite Abelian Group over Certain Nonlinear Schemes. IEEE Access 2020, 8, 39781–39792. [Google Scholar] [CrossRef]
  41. Özkaynak, F. On the effect of chaotic system in performance characteristics of chaos based s-box designs. Phys. A Stat. Mech. Appl. 2020, 550, 124072. [Google Scholar] [CrossRef]
  42. Khan, M.; Shah, T.; Batool, S.I. Construction of S-box based on chaotic Boolean functions and its application in image encryption. Neural Comput. Appl. 2015, 27, 677–685. [Google Scholar] [CrossRef]
  43. Zhang, W.; Pasalic, E. Highly Nonlinear Balanced S-Boxes with Good Differential Properties. IEEE Trans. Inf. Theory 2014, 60, 7970–7979. [Google Scholar] [CrossRef]
  44. Cusick, T.W.; Stanica, P. Cryptographic Boolean Functions and Applications; Elsevier: Amsterdam, The Netherlands, 2009. [Google Scholar]
  45. Alzaidi, A.A.; Ahmad, M.; Doja, M.N.; Al Solami, E.; Beg, M.M.S. A New 1D Chaotic Map and $\beta$-Hill Climbing for Generating Substitution-Boxes. IEEE Access 2018, 6, 55405–55418. [Google Scholar] [CrossRef]
  46. Adams, C.; Tavares, S. The structured design of cryptographically good s-boxes. J. Cryptol. 1990, 3, 27–41. [Google Scholar] [CrossRef]
  47. Biham, E.; Shamir, A. Differential Cryptanalysis of DES-like Cryptosystems. Advances in Cryptology-CRYPT0’ 90 Lecture Notes in Computer Science 2–21. J. Cryptol. 1991, 4, 3–72. [Google Scholar] [CrossRef]
  48. Razaq, A.; Alolaiyan, H.; Ahmad, M.; Yousaf, M.A.; Shuaib, U.; Aslam, W.; Alawida, M. A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups. IEEE Access 2020, 8, 75473–75490. [Google Scholar] [CrossRef]
  49. Matsui, M. Linear Cryptanalysis Method for DES Cipher. In Advances in Cryptology—EUROCRYPT ’93 Lecture Notes in Computer Science 386–397; Springer: Berlin/Heidelberg, Germany, 1993. [Google Scholar]
  50. Ye, T.; Zhimao, L. Chaotic S-box: Six-dimensional fractional Lorenz–Duffing chaotic system and O-shaped path scrambling. Nonlinear Dyn. 2018, 94, 2115–2126. [Google Scholar] [CrossRef]
  51. Ozkaynak, F. Construction of robust substitution boxes based on chaotic systems. Neural Comput. Appl. 2017, 31, 3317–3326. [Google Scholar] [CrossRef]
  52. Ahmad, M.; Bhatia, D.; Hassan, Y. A Novel Ant Colony Optimization Based Scheme for Substitution Box Design. Procedia Comput. Sci. 2015, 57, 572–580. [Google Scholar] [CrossRef] [Green Version]
  53. Ahmed, H.A.; Zolkipli, M.F.; Ahmad, M. A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput. Appl. 2018, 31, 7201–7210. [Google Scholar] [CrossRef]
  54. Khan, M.; Asghar, Z. A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput. Appl. 2016, 29, 993–999. [Google Scholar] [CrossRef]
  55. Razaq, A.; Yousaf, A.; Shuaib, U.; Siddiqui, N.; Ullah, A.; Waheed, A. A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map. Secur. Commun. Netw. 2017, 2017, 1–16. [Google Scholar] [CrossRef] [Green Version]
  56. García, V.M.S.; Carapia, R.F.; Renteria-Marquez, C.; Luna-Benoso, B.; Aldape-Pérez, M. Substitution box generation using Chaos: An image encryption application. Appl. Math. Comput. 2018, 332, 123–135. [Google Scholar]
  57. Jamal, S.S.; Khan, M.U.; Shah, T. A Watermarking Technique with Chaotic Fractional S-Box Transformation. Wirel. Pers. Commun. 2016, 90, 2033–2049. [Google Scholar] [CrossRef]
  58. Lambić, D. A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design. Nonlinear Dyn. 2020, 1–13. [Google Scholar] [CrossRef]
  59. Lu, Q.; Zhu, C.; Wang, G. A Novel S-Box Design Algorithm Based on a New Compound Chaotic System. Entropy 2019, 21, 1004. [Google Scholar] [CrossRef] [Green Version]
  60. Azam, N.A.; Hayat, U.; Ullah, I. Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field. Front. Inf. Technol. Electron. Eng. 2019, 20, 1378–1389. [Google Scholar] [CrossRef] [Green Version]
  61. Khan, F.A.; Ahmed, J.; Khan, J.S.; Ahmad, J.; Khan, M.A.; Hwang, S.O. A new technique for designing 8 × 8 substitution box for image encryption applications. In Proceedings of the 2017 9th Computer Science and Electronic Engineering (CEEC), Colchester, UK, 27–29 September 2017. [Google Scholar]
  62. Cassal-Quiroga, B.B.; Campos, E. Generation of Dynamical S-Boxes for Block Ciphers via Extended Logistic Map. Math. Probl. Eng. 2020, 2020, 1–12. [Google Scholar] [CrossRef] [Green Version]
  63. Tran, M.T.; Bui, D.K.; Duong, A.D. Gray S-Box for Advanced Encryption Standard. In Proceedings of the 2008 International Conference on Computational Intelligence and Security, Suzhou, China, 13–17 December 2008. [Google Scholar]
  64. Daemen, J.; Rijmen, V. The Rijndael block cipher: AES proposal. In Proceedings of the First Candidate Conference (AeS1), Ventura, CA, USA, 20–22 August 1998; pp. 343–348. [Google Scholar]
Figure 1. Flowchart of proposed substitution-box (S-box) construction scheme.
Figure 1. Flowchart of proposed substitution-box (S-box) construction scheme.
Entropy 22 00717 g001
Figure 2. Graphical comparison analyses of 8 × 8 S-boxes under (a) nonlinearity, (b) SAC, (c) BIC–SAC, (d) BIC-nonlinearity, (e) DU and (f) linear approximation probability (LAP).
Figure 2. Graphical comparison analyses of 8 × 8 S-boxes under (a) nonlinearity, (b) SAC, (c) BIC–SAC, (d) BIC-nonlinearity, (e) DU and (f) linear approximation probability (LAP).
Entropy 22 00717 g002aEntropy 22 00717 g002b
Figure 3. Results of image encryption using proposed S-box for Baboon image (a) plain-image, (b) histogram of plain-image, (c) encrypted image, and (d) histogram of encrypted image.
Figure 3. Results of image encryption using proposed S-box for Baboon image (a) plain-image, (b) histogram of plain-image, (c) encrypted image, and (d) histogram of encrypted image.
Entropy 22 00717 g003
Table 1. Experimental settings for simulation.
Table 1. Experimental settings for simulation.
System (1) System (2)
parameter value parameter value
x1(0) 2.1 y1(0) 2.3
x2(0) 3.7 y2(0) 8.9
p1 0.12 p2 0.12
q1 0.3 q2 0.67
τ1 0.1 τ2 0.33
h 0.005 Δτ 0.05
N 200 itr_max 2000
step_x 57 step_y 31
prime1 23 prime2 37
Table 2. Proposed 8 × 8 substitution-box.
Table 2. Proposed 8 × 8 substitution-box.
12718021923297108195391041361694918914381240
1911631342120066232028922524150611593201
9816114205421210268230130144149107818380
42670137411991711421545510111118208317
16813330103190253250922182121982854927118
1058376187692382352465215815529641561120
13525217317917622099244231138128165254620377
194177878284371702042392271502471785117107
5721521079751869113125162152147175151139193
224251964016420721362119109122214114132248223
206191596788632226011071112161671164645
38221721001292092281571461152433140814586
0106192166906515312551841602455811344196
178121141185226197564318132941318212051249
2291884721625559234124482175312635732295
242372423623612117414817217412334332332
Table 3. Dependency matrix for strict avalanche criterion (SAC).
Table 3. Dependency matrix for strict avalanche criterion (SAC).
0.53120.45310.50.56250.56250.50.53120.4843
0.59370.43750.51560.53120.45310.50.48430.5468
0.46870.46870.54680.51560.53120.48430.50.4687
0.45310.48430.50.53120.45310.50.48430.5312
0.53120.53120.48430.53120.43750.50.54680.4843
0.54680.46870.50.53120.43750.46870.51560.4531
0.51560.40620.57810.54680.48430.50.50.5
0.48430.48430.50.40620.53120.48430.57810.4687
Table 4. Bits independence criterion (BIC) results for nonlinearity.
Table 4. Bits independence criterion (BIC) results for nonlinearity.
01041001041009810298
1040100104106108104104
100100010410410810498
1041041040104100104104
1001061041040106102106
98108108100106096102
10210410410410296098
9810498104106102980
Table 5. BIC results for SAC.
Table 5. BIC results for SAC.
00.51750.51360.50780.50390.50390.50.5136
0.517500.52340.52140.48430.51560.48820.5097
0.51360.523400.50970.50390.49020.50.4726
0.50780.52140.509700.48820.49210.48630.5039
0.50390.48430.50390.488200.51950.51170.5214
0.50390.51560.49020.49210.519500.50780.5117
0.50.48820.50.48630.51170.507800.4726
0.51360.50970.47260.50390.52140.51170.47260
Table 6. Differential matrix for differential uniformity (DU).
Table 6. Differential matrix for differential uniformity (DU).
106848861066866866
6866866686886688
8668864666848666
66886666686861066
66668610666668866
66646666666666610
8666666868666848
66886666868666610
6688686666666668
8666888686888868
6686686886888866
6686666468666686
6666486688668864
8466668668666686
6466866666886666
66688666106666860
Table 7. Performance comparison of 8 × 8 S-boxes.
Table 7. Performance comparison of 8 × 8 S-boxes.
S-boxNonlinearitySACBIC–SACBIC-NLDULAP
minmaxmean
Proposed110112111.250.50070.5034102.57100.1403
Reference [23]100106103.20.50480.5009103.7100.1328
Reference [24]981081030.50120.4988104.07120.1328
Reference [25]100108104.50.49780.5009103.6120.1406
Reference [26]104108105.800.49760.5032104.5100.1250
Reference [27]1061101080.50730.502104100.1523
Reference [28]1041101060.50390.5058103.38100.1406
Reference [29]1021081060.50020.5013104.4100.1484
Reference [30]106110108.50.50170.5026104100.1328
Reference [33]103109105.10.50610.4982103.6100.1563
Reference [34]100108104.70.49820.4942103.1100.1406
Reference [41]102108105.250.50370.4994102.6100.1328
Reference [42]841061000.48120.4967101.93160.1796
Reference [50]104108106.750.40760.5022103.57100.1328
Reference [51]106108106.70.49410.4957103.5100.125
Reference [52]1061101070.50140.5016104.2100.1484
Reference [53]106108107.50.49430.4982104.36100.125
Reference [54]96106103.250.51510.4864103.07540.1562
Reference [55]104108106.750.50310.5074103.64120.1484
Reference [56]1051071060.50660.5065103120.1445
Reference [57]98108102.30.48360.4944101.57140.1679
Reference [58]106108106.50.50090.5005104.07100.1328
Reference [59]104110106.250.49900.5050103.8100.125
Reference [60]106108106.50.50460.5023104.14100.1328
Reference [61]94108103.50.50240.5009103100.1328
Reference [62]96108102.250.50590.5050103.5120.125
Reference [63]1121121120.50580.50211240.0625
Reference [64]1121121120.50580.504611240.0625
* Where, NL stands for nonlinearity.
Table 8. Majority Logic Criteria (MLC) analysis results for image encryption using proposed S-box.
Table 8. Majority Logic Criteria (MLC) analysis results for image encryption using proposed S-box.
Baboon ImageContrastCorrelationEnergyHomogeneity
Plain-image0.632650.79830.094380.78209
Encrypted image10.42270.00640.015660.39483
Reference [48]10.4291−0.01280.01570.3889
Reference [61]10.39860.00720.01580.4214

Share and Cite

MDPI and ACS Style

Ahmad, M.; Al-Solami, E. Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme. Entropy 2020, 22, 717. https://doi.org/10.3390/e22070717

AMA Style

Ahmad M, Al-Solami E. Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme. Entropy. 2020; 22(7):717. https://doi.org/10.3390/e22070717

Chicago/Turabian Style

Ahmad, Musheer, and Eesa Al-Solami. 2020. "Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme" Entropy 22, no. 7: 717. https://doi.org/10.3390/e22070717

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop