Skip to main content

Utilizing Ant Colony Optimization to Construct an S-Box Based on the 2D Logistic-Sine Coupled Map

  • Chapter
  • First Online:
Applications of Ant Colony Optimization and its Variants

Part of the book series: Springer Tracts in Nature-Inspired Computing ((STNIC))

  • 65 Accesses

Abstract

ACO is a combinatorial optimization method that draws inspiration from food searching, pheromone trails, and heuristic information employed by ants. The Substitution Box (S-Box) holds significant importance within symmetric key cryptography algorithms, notably in block ciphers. A secure S-Box requires high non-linearity, resistance to algebraic attacks, and diffusion of input changes to output changes. This study investigates the utilization of ACO for constructing an S-Box, employing the 2D Logistic-Sine Coupled Map (2D-LSCM) as the underlying framework. More precisely, a version of ACO for continuous optimization is used for optimizing the parameters of 2DLSCM. This chaotic map is used for an effective shuffling of an S-Box component and in the permutation of an image encryption. The analyses of results and security provide evidence that S-Box exhibits a high level of security suitable for an image encryption scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abbott TMC et al (2019) Dark energy survey year 1 results: constraints on extended cosmological models from galaxy clustering and weak lensing. Phys Rev D 99(12):123505. https://doi.org/10.1103/PhysRevD.99.123505

  2. Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design. Procedia Comput Sci 57:572–580. https://doi.org/10.1016/j.procs.2015.07.394

    Article  Google Scholar 

  3. Ahmed HA, Zolkipli MF, Ahmad M (2019) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Appl 31(11):7201–7210

    Article  Google Scholar 

  4. Azkaynak F (2020) On the effect of chaotic system in performance characteristics of chaos based s-box designs. Phys A 550:1–13

    Google Scholar 

  5. Babichev SA, Ries J, Lvovsky AI (2002) Quantum scissors: teleportation of single-mode optical states by means of a nonlocal single photon. Preprint at https://arxiv.org/abs/quant-ph/0208066v1

  6. Basha SM, Mathivanan P, Ganesh AB (2022) Bit level color image encryption using Logistic-Sine-Tent-Chebyshev (LSTC) map. Optik 259:168956. https://doi.org/10.1016/j.ijleo.2022.168956

    Article  Google Scholar 

  7. Ben Farah MA, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn 99:3041–3064

    Article  Google Scholar 

  8. Beneke M, Buchalla G, Dunietz I (1997) Mixing induced CP asymmetries in inclusive B decays. Phys Lett B 393:132–142 arXiv:0707.3168

    Article  Google Scholar 

  9. Broy M (1992) Software engineering-from auxiliary to key technologies. In: Broy M, Denert E (eds) Software pioneers. Springer, New York, pp 10–13

    Google Scholar 

  10. Campbell SL, Gear CW (1995) The index of general nonlinear DAES. Numer Math 72(2):173–196

    Article  MathSciNet  Google Scholar 

  11. Cassal-Quiroga BB, Campos-Canton E (2020) Generation of dynamical S-boxes for block ciphers via extended logistic map. Math Probl Eng 2020:1–12

    Article  Google Scholar 

  12. Çavuşoglu Ü, Zengin A, Pehlivan I, Kaçar S (2017) A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn 87(2):1081–1094

    Article  Google Scholar 

  13. Chen G (2008) A novel heuristic method for obtaining S-boxes. Chaos Solitons Fractals 36(4):1028–1036. https://doi.org/10.1016/j.chaos.2006.08.003

    Article  MathSciNet  Google Scholar 

  14. Chung ST, Morris RL (1978) Isolation and characterization of plasmid deoxyribonucleic acid from Streptomyces fradiae. In: Paper presented at the 3rd international symposium on the genetics of industrial microorganisms, University of Wisconsin, Madison, 4–9 June 1978

    Google Scholar 

  15. Demirtas M (2022) A new RGB color image encryption scheme based on cross-channel pixel and bit scrambling using chaos. Optik 265:169430. https://doi.org/10.1016/j.ijleo.2022.169430

    Article  Google Scholar 

  16. Dey N (2018) Advancements in applied metaheuristic computing. IGI Global. https://doi.org/10.4018/978-1-5225-4151-6

  17. Dey N, Ashour A, Bhattacharyya S (2020) Applied nature-inspired computing: algorithms and case studies. Springer

    Google Scholar 

  18. Dorigo M (1992) Optimization, learning and natural algorithms. PhD thesis, Politecnico di Milano, Italy

    Google Scholar 

  19. Dougherty ST, Sahinkaya S, Ustun D (2023) A novel method for image encryption using time signature-dependent s-boxes based on latin squares and the playfair system of cryptography. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-15240-0

    Article  Google Scholar 

  20. Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and teaching-learning based optimization. Nonlinear Dyn 88(2):1059–1074

    Article  Google Scholar 

  21. Geddes KO, Czapor SR, Labahn G (1992) Algorithms for Computer Algebra. Kluwer, Boston

    Book  Google Scholar 

  22. Hamburger C (1995) Quasimonotonicity, regularity and duality for nonlinear systems of partial differential equations. Ann Mat Pura Appl 169(2):321–354

    Article  MathSciNet  Google Scholar 

  23. Hao Z, AghaKouchak A, Nakhjiri N, Farahmand A (2014) Global integrated drought monitoring and prediction system (GIDMaPS) data sets. figshare. https://doi.org/10.6084/m9.figshare.853801

  24. Hoseini R, Behnia S, Sarmady S, Fathizadeh S (2022) Construction of dynamical S-boxes based on image encryption approach. Soft Comput 26:13985–13997

    Article  Google Scholar 

  25. Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44(13):800–801. https://doi.org/10.1049/el:20080522

    Article  Google Scholar 

  26. Lambić D (2017) A novel method of S-box design based on discrete chaotic map. Nonlinear Dyn 87(4):2407–2413

    Article  MathSciNet  Google Scholar 

  27. Li Z et al (2020) A novel chaos-based color image encryption scheme using bit-level permutation. Symmetry 12(9):1497. https://doi.org/10.3390/sym12091497

    Article  Google Scholar 

  28. Manjula G,Mohan H (2016) Constructing key dependent dynamic \(S\)-box for AES block cipher system. In: 2nd international conference on applied and theoretical computing and communication technology, pp 613–617. https://doi.org/10.1109/ICATCCT.2016.7912073

  29. Seymour RS (1981) Conductive polymers. Plenum, New York

    Book  Google Scholar 

  30. Shannon CE (1949) Communication theory of security systems. Bell Syst Tech J (Alcatel-Lucent) 28(4):656–715

    Google Scholar 

  31. Slifka MK, Whitton JL (2000) Clinical implications of dysregulated cytokine production. J Mol Med 78:74–80. https://doi.org/10.1007/s001090000086

    Article  Google Scholar 

  32. Smith SE (1976) Neuromuscular blocking drugs in man. In: Zaimis E (ed) Neuromuscular junction. Handbook of experimental pharmacology, vol 42. Springer, Heidelberg, pp 593–660

    Google Scholar 

  33. Socha K, Dorigo M (2008) Ant colony optimization for continuous domains. Eur J Oper Res 185:1155–1173

    Article  MathSciNet  Google Scholar 

  34. Sosa PM (2016) Calculating non-linearity of Boolean functions with Walsh Hadamard transform. UCSB, Santa Barbara, pp 1–4

    Google Scholar 

  35. Stahl B (2020, Jun) deepSIP: deep learning of Supernova Ia Parameters. https://ui.adsabs.harvard.edu/abs/2020ascl.soft06023S

  36. Tanyildizi E, Ozkaynak F (2019) A new chaotic S-box generation method using parameter optimization of one dimensional chaotic maps. IEEE Access 7:117829–117838

    Article  Google Scholar 

  37. The USC-SIPI image database. https://sipi.usc.edu/database/

  38. Tian Y, Lu Z (2016) S-box: six-dimensional compound hyperchaotic map and artificial bee colony algorithm. J Syst Eng Electron 27(1):232–241

    MathSciNet  Google Scholar 

  39. Tian Y, Lu Z (2017) Chaotic S-box: intertwining logistic map and bacterial foraging optimization. Math Probl Eng :1-12. https://doi.org/10.1155/2017/6969312

  40. Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91(1):359–370

    Article  MathSciNet  Google Scholar 

  41. Wang Z, Bovik AC (2009) Mean squared error: love it or leave it? a new look at signal fidelity measures. IEEE Signal Process Mag 26(1):98–117. https://doi.org/10.1109/MSP.2008.930649

    Article  Google Scholar 

  42. Wang Y, Wong KW, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A 376(6–7):827–833

    Article  Google Scholar 

  43. Webster AF,Tavares SE (1986) On the design of S-boxes. In: Williams HC (ed) Advances in cryptology-CRYPTO-85 proceedings. CRYPTO 1985. Lecture notes in computer science, vol 218. Springer, Berlin, Heidelberg

    Google Scholar 

  44. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for Image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun 1:31–38

    Google Scholar 

  45. Zamli KZ, Kader A, Din F, Alhadawi HS (2021) Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization. Neural Comput Appl 33:16641–16658

    Article  Google Scholar 

  46. Zhang X, Gong Z (2022) Color image encryption algorithm based on 3D Zigzag transformation and view planes. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-13003-x

    Article  Google Scholar 

  47. Zhang Z, Tang J, Ni Hui, Huang T (2023) Image adaptive encryption algorithm using a novel 2D chaotic system. Nonlinear Dyn 11:10629–10652

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deniz Ustun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Şahinkaya, S., Ustun, D. (2024). Utilizing Ant Colony Optimization to Construct an S-Box Based on the 2D Logistic-Sine Coupled Map. In: Dey, N. (eds) Applications of Ant Colony Optimization and its Variants. Springer Tracts in Nature-Inspired Computing. Springer, Singapore. https://doi.org/10.1007/978-981-99-7227-2_6

Download citation

Publish with us

Policies and ethics