• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Han Yanyan, He Yanru, Liu Peihe, Zhang Duo, Wang Zhiqiang, He Wencai. A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System[J]. Journal of Computer Research and Development, 2020, 57(10): 2147-2157. DOI: 10.7544/issn1000-1239.2020.20200466
Citation: Han Yanyan, He Yanru, Liu Peihe, Zhang Duo, Wang Zhiqiang, He Wencai. A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System[J]. Journal of Computer Research and Development, 2020, 57(10): 2147-2157. DOI: 10.7544/issn1000-1239.2020.20200466

A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System

Funds: This work was supported by the National Key Research and Development Program of China (2017YFB0801803).
More Information
  • Published Date: September 30, 2020
  • S-box is the only nonlinear component in ZUC algorithm, and it plays an important role in the security of the whole algorithm. Chaotic system is widely used in the design of S-box because of its good randomness and high initial value sensitivity. At present, most of the schemes based on chaos to construct S-box use a single chaotic map and cannot generate S-box dynamically. To solve this problem, this paper proposes a scheme of ZUC dynamic S-box construction based on chaotic system. First of all, by iterating the composite mapping in two classical chaotic systems, and introducing the idea of scrambling into the design of S-box, Arnold mapping is carried out on the resulting sequence, which not only increases the nonlinear property of S-box, but also can realize the dynamic generation of S-box. Secondly, the constructed S-box is used to replace the fixed S-box in ZUC algorithm and is applied to resource-constrained IoT devices to encrypt the data of perception layer. Finally, we carry out a large number of experiments, which verify the S-box generated by the chaotic system in this paper is more secure and has a good application prospect in ZUC and other lightweight cryptographic algorithms.
  • Related Articles

    [1]Zhang Long, Wang Jinsong. DDoS Attack Detection Model Based on Information Entropy and DNN in SDN[J]. Journal of Computer Research and Development, 2019, 56(5): 909-918. DOI: 10.7544/issn1000-1239.2019.20190017
    [2]Zhou Yanhong, Zhang Xianyong, Mo Zhiwen. Conditional Neighborhood Entropy with Granulation Monotonicity and Its Relevant Attribute Reduction[J]. Journal of Computer Research and Development, 2018, 55(11): 2395-2405. DOI: 10.7544/issn1000-1239.2018.20170607
    [3]Li Feng, Miao Duoqian, Zhang Zhifei, Zhang Wei. Mutual Information Based Granular Feature Weighted k-Nearest Neighbors Algorithm for Multi-Label Learning[J]. Journal of Computer Research and Development, 2017, 54(5): 1024-1035. DOI: 10.7544/issn1000-1239.2017.20160351
    [4]Dong Hongbin, Teng Xuyang, Yang Xue. Feature Selection Based on the Measurement of Correlation Information Entropy[J]. Journal of Computer Research and Development, 2016, 53(8): 1684-1695. DOI: 10.7544/issn1000-1239.2016.20160172
    [5]Tang Liangrui, Chen Yuanyuan, and Feng Sen. A Chain Routing Algorithm Based on Evidence Theory in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(7): 1362-1369.
    [6]Xu Junling, Zhou Yuming, Chen Lin, Xu Baowen. An Unsupervised Feature Selection Approach Based on Mutual Information[J]. Journal of Computer Research and Development, 2012, 49(2): 372-382.
    [7]Yang Chunfang, Liu Fenlin, and Luo Xiangyang. Histograms Difference and Quantitative Steganalysis of JPEG Steganography Based on Relative Entropy[J]. Journal of Computer Research and Development, 2011, 48(8): 1563-1569.
    [8]Wang Wenhui, Feng Qianjin, Chen Wufan. Segmentation of Brain MR Images Based on the Measurement of Difference of Mutual Information and Gauss-Markov Random Field Model[J]. Journal of Computer Research and Development, 2009, 46(3): 521-527.
    [9]Xiong Zhongmin, Hao Zhongxiao. An Approach to Termination Decision for a Rule Set Based on Activation Path and Conditional Formula[J]. Journal of Computer Research and Development, 2006, 43(5): 901-907.
    [10]Wang Xizhao and An Sufang. Research on Learning Weights of Fuzzy Production Rules Based on Maximum Fuzzy Entropy[J]. Journal of Computer Research and Development, 2006, 43(4): 673-678.
  • Cited by

    Periodical cited type(0)

    Other cited types(1)

Catalog

    Article views (857) PDF downloads (257) Cited by(1)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return