Abstract
In many encryption systems, the original data are transformed into encrypted version by applying nonlinear substitutions and inducing diffusion. The objective of the nonlinear transformation is to attain high levels of randomness in the cipher text. The choice of the source of randomness is critical because the success in cryptanalysis is demarked by the characteristics identified in the encrypted data. The chaotic systems show random behavior that is suitable for encryption applications where nonlinear transformations are required between plaintext and the encrypted data. The application of nonlinear functional chaos-based system with embedded chaotic system and multi-parameters can instigate randomness and diffusion in the data. In addition to high level of randomness, the need for multiple round keys is required in a typical substitution–permutation process. The proposed method eliminates the need for multiple round keys, which is suitable for high-speed communication systems. The statistical experiments performed on the proposed nonlinear transformation algorithms show improvement in encryption strength and resistance against many brute force and statistical attacks. In addition, the proposed system shows high resistance against differential and linear cryptanalysis.

Similar content being viewed by others
References
Baptista, M.S.: Cryptography with chaos. Phys. Lett. A. 240, 50 (1998)
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a chaotic secure communication system. Phys. Lett. A. 306, 200 (2003)
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys. Lett. A. 276, 191 (2000)
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys. Lett. A. 326, 211 (2004)
Adams, C., Tavares, S.: Good S-boxes are easy to find. In: Advances in Cryptology: Proceedings of CRYPTO\_89. Lecture Notes in Computer Science, pp. 612–615 (1989)
Webster, A.F., Tavares, S.: On the design of S-boxes. In: Advances in Cryptology: Proceedings of CRYPTO\_85. Lecture Notes in Computer Science, pp. 523–534 (1986)
Detombe, J., Tavares, S.: On the design of S-boxes. In: Advances in Cryptology: Proceedings of CRYPTO\_92. Lecture Notes in Computer Science (1992)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)
Dawson, M., Tavares, S.: An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In: Advances in Cryptology: Proceedings of EURO-CRYPT\_91. Lecture Notes in Computer Science, pp. 352–367 (1991)
Matsui, M.: Linear cryptanalysis method of DES cipher: advances in cryptology. In: Proceeding of the Eurocrypt’93, Lecture Notes in Computer Science, vol. 765, pp. 386–397 (1994)
Shannon, C.E.: Communication theory of secrecy systems. Bell. Syst. Tech. J. 28, 656–715 (1949)
Shannon, C.E.: A mathematical theory of communication. Bell. Syst. Tech. J. 27, 379–423 (1948)
Fatih, Ö., Sırma, Y.: Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn. (2013). doi:10.1007/s11071-013-0987-4
Jakimoski, G., Kocarev, L.: Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. 48, 163–169 (2001)
Zhang, X., Zhao, Z.: Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn. 75, 319–330 (2014)
Wang, X., Guo, K.: A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 76, 1943–1950 (2014)
Zhang, X., Mao, Y., Zhao, Z.: An efficient chaotic image encryption based on alternate circular S-boxes. Nonlinear Dyn. 78, 359–369 (2014)
Wang, X., Wang, Q.: A novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlinear Dyn. 75, 567–576 (2014)
Fatih, Ö., Sirma, Y.: Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn. 78, 1311–1320 (2014)
Zhao, J., Wang, S., Chang, Y., Li, X.: A novel image encryption scheme based on an improper fractional-order chaotic system. Nonlinear Dyn. 80, 1721–1729 (2015)
Cheng, P., Yang, H., Wei, P., Zhang, W.: A fast image encryption algorithm based on chaotic map and lookup table. 79, 2121–2131 (2015)
Yap, W.S., Phan, R.C.W., Yau, W.C., Heng, S.H.: Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 80, 1483–1491 (2015)
Wang, X., Xu, D.: A novel image encryption scheme using chaos and Langton’s Ant cellular automaton. Nonlinear Dyn. 79, 2449–2456 (2015)
Sahar, M., Amir, M.E.: Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3), 1745–1754 (2009)
Liu, H.J., Wang, X.Y.: Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10), 3320–3327 (2010)
Qais H.A., Aouda A.A.: Image encryption based on the general approach for multiple chaotic systems. J. Signal Inf. Proc. 2:238–244 (2011)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Khan, M. A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear Dyn 82, 527–533 (2015). https://doi.org/10.1007/s11071-015-2173-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-015-2173-3