{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T05:53:05Z","timestamp":1771048385236,"version":"3.50.1"},"reference-count":37,"publisher":"World Scientific Pub Co Pte Lt","issue":"05","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Bifurcation Chaos"],"published-print":{"date-parts":[[2019,5]]},"abstract":"<jats:p> Data confidentiality is mandatory during transmission or when storing sensitive information, especially in financial, medical and military applications. In this context, several cipher solutions and techniques have been presented in the literature. However, existing solutions are mainly based on static structures, where the confusion and diffusion primitives are fixed and independent of the secret key. In this article, we propose a new block cipher scheme that is based on the Substitution Permutation Networks (SPN). The proposed cipher consists of three operations: round-key addition, substitution, and bits\u2019 permutation. Moreover, the substitution operation is applied at the byte level and it is based on a dynamically generated S-box, while the diffusion primitives are applied at the bit level using a dynamically generated P-box. Such key-dependent design ensures better cryptographic strength and system performance when compared, for instance, to DES, 3DES, RC5, and PRESENT schemes, among others, due to its key expansion algorithm. Thorough analysis show that the proposed scheme exhibits a high degree of randomness, key and plain-text sensitivity, and it satisfies the avalanche effect. From a theoretical perspective, we have formulated the Output Feedback mode of operation as a discrete dynamical system on a topological space. We prove that the dynamics of this system (in terms of sensitivity to the initial vector, etc.) are directly related to the strong connectivity of a graph. By doing so, we are able to characterize the conditions under which this mode evolves chaotically, as defined in Devaney\u2019s theory. In particular, such theoretical investigations allow us to link the avalanche effect and key sensitivity of the cipher with the sensitivity of the whole process, that is, with the mode of operation. <\/jats:p>","DOI":"10.1142\/s0218127419500597","type":"journal-article","created":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T03:42:25Z","timestamp":1559619745000},"page":"1950059","source":"Crossref","is-referenced-by-count":14,"title":["Efficient Chaotic Encryption Scheme with OFB Mode"],"prefix":"10.1142","volume":"29","author":[{"given":"Hassan","family":"Noura","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Maroun Semaan Faculty of Engineering and Architecture of the American University of Beirut, Beirut, Lebanon"}]},{"given":"Christophe","family":"Guyeux","sequence":"additional","affiliation":[{"name":"Univ. Bourgogne Franche-Comt\u00e9 (UBFC), CNRS, FEMTO-ST Institute, France"}]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Maroun Semaan Faculty of Engineering and Architecture of the American University of Beirut, Beirut, Lebanon"}]},{"given":"Mohammad","family":"Mansour","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Maroun Semaan Faculty of Engineering and Architecture of the American University of Beirut, Beirut, Lebanon"}]},{"given":"Rapha\u00ebl","family":"Couturier","sequence":"additional","affiliation":[{"name":"Univ. Bourgogne Franche-Comt\u00e9 (UBFC), CNRS, FEMTO-ST Institute, France"}]}],"member":"219","published-online":{"date-parts":[[2019,6,3]]},"reference":[{"key":"S0218127419500597BIB001","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127416501133"},{"key":"S0218127419500597BIB002","doi-asserted-by":"publisher","DOI":"10.1109\/ATSIP.2016.7523053"},{"key":"S0218127419500597BIB003","first-page":"185","volume-title":"CHAOS 2017, 10th CHAOS Int. Conf.","author":"Abidi A.","year":"2017"},{"key":"S0218127419500597BIB004","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2010.04.056"},{"key":"S0218127419500597BIB005","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.02.021"},{"key":"S0218127419500597BIB006","doi-asserted-by":"publisher","DOI":"10.1260\/1748-3018.4.2.167"},{"key":"S0218127419500597BIB007","first-page":"118","volume":"4","author":"Bahi J.","year":"2011","journal-title":"Int. J. Adv. Security"},{"key":"S0218127419500597BIB009","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"S0218127419500597BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"S0218127419500597BIB011","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58108-1_2"},{"key":"S0218127419500597BIB012","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4"},{"key":"S0218127419500597BIB013","first-page":"263","volume-title":"Workshop on Cryptography","author":"Davies D. W.","year":"1982"},{"key":"S0218127419500597BIB014","volume-title":"An Introduction to Chaotic Dynamical Systems","author":"Devaney R. L.","year":"1989","edition":"2"},{"key":"S0218127419500597BIB016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25237-2_5"},{"key":"S0218127419500597BIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.03.010"},{"key":"S0218127419500597BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2017.2736515"},{"key":"S0218127419500597BIB019","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2010.04.010"},{"key":"S0218127419500597BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2017.3051512"},{"key":"S0218127419500597BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2018.2873472"},{"key":"S0218127419500597BIB022","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58108-1_1"},{"key":"S0218127419500597BIB023","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2006.874182"},{"key":"S0218127419500597BIB024","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_33"},{"key":"S0218127419500597BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0314-4"},{"key":"S0218127419500597BIB026","doi-asserted-by":"publisher","DOI":"10.3182\/20090622-3-UK-3004.00025"},{"key":"S0218127419500597BIB027","first-page":"226","volume-title":"2011 Int. Conf. Internet Technology and Secured Transactions (ICITST)","author":"Noura H.","year":"2011"},{"key":"S0218127419500597BIB028","author":"Noura H.","year":"2017","journal-title":"Multimed. Tools Appl"},{"key":"S0218127419500597BIB029","volume-title":"Understanding Cryptography: A Textbook for Students and Practitioners","author":"Paar C.","year":"2009"},{"key":"S0218127419500597BIB030","first-page":"16","volume-title":"First Advanced Encryption Standard (AES) Conf.","author":"Rivest R. L.","year":"1998"},{"key":"S0218127419500597BIB031","doi-asserted-by":"publisher","DOI":"10.2307\/2685263"},{"key":"S0218127419500597BIB033","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1949.232969"},{"key":"S0218127419500597BIB034","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.39"},{"key":"S0218127419500597BIB035","volume-title":"Cryptography and Network Security, 4\/E","author":"Stallings W.","year":"2006"},{"key":"S0218127419500597BIB036","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2009.03.075"},{"key":"S0218127419500597BIB037","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_41"},{"key":"S0218127419500597BIB038","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.10.002"},{"key":"S0218127419500597BIB039","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.146"},{"key":"S0218127419500597BIB040","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.02.039"}],"container-title":["International Journal of Bifurcation and Chaos"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218127419500597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T17:35:25Z","timestamp":1565199325000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218127419500597"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":37,"journal-issue":{"issue":"05","published-online":{"date-parts":[[2019,6,3]]},"published-print":{"date-parts":[[2019,5]]}},"alternative-id":["10.1142\/S0218127419500597"],"URL":"https:\/\/doi.org\/10.1142\/s0218127419500597","relation":{},"ISSN":["0218-1274","1793-6551"],"issn-type":[{"value":"0218-1274","type":"print"},{"value":"1793-6551","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5]]}}}