1. Introduction
Multilayer perceptron (MLP) is a multilayer feedforward network model with one-way propagation [
1,
2,
3]. Because of its high nonlinear mapping ability, MLP is one of the most basic network models in neural network research. From the perspective of information processing, MLP is an abstract simulation of biological neural networks to establish a simple biological neuron model. Therefore, the basic structure of MLP is based on the logic of biological neuron model. The most typical MLP includes three layers: input layer, hidden layer, and output layer (as shown in
Figure 1). In the hidden layer, each node is equivalent to a perceptron, and each node represents a specific output function, which is called activation function [
4]. The connection between each two nodes represents a weighted value for the signal passing through the connection, which is called the weight. The output of MLP will be different due to the difference of weight value and excitation function, and its powerful fitting ability can be used to solve more complex problems. MLP itself is usually the approximation of some algorithm or function in nature, and it may also be the expression of a logical strategy. With the gradual deepening of the research on MLP, it has great research potential in both theoretical research and application. At present, MLP has been applied in many commercial and industrial fields and has brought varying degrees of productivity improvement (e.g., pattern recognition, function approximation, and optimal prediction) [
5,
6,
7].
The interior of multilayer perceptron is a highly nonlinear information processing system composed of multilayer single perceptron interconnection [
8]. When neurons are in two different states of activation or inhibition, it can be called a nonlinear relationship. The network composed of neurons with a threshold has better performance, which can improve fault tolerance and storage capacity. Each neuron of the multilayer perceptron receives the input of a large number of other neurons, and generates the output through the parallel network, affecting other neurons. This mutual restriction and interaction between the networks realizes the nonlinear mapping from the input state to the output state space [
9,
10]. However, the overall performance of multilayer perceptron is not the superposition of the performance of local neurons, and its nonlinear mapping ability is limited. Therefore, when processing information with higher complexity, we can introduce stronger nonlinear components (e.g., S-box) to make up for this defect. As a nonlinear component of multilayer perceptron, S-box is also an important part of symmetric cipher (e.g., block cipher) [
11,
12,
13].
The higher dimension multilayer perceptron has very complex nonlinear dynamic behaviors, which contain various functions (e.g., activation function and step function). As Piotr et al. remarked [
14], securely enhance multilayer perceptron must satisfy certain conditions, the higher the dimension of S-box, the more statistical analysis it can be applied to multilayer perceptron, which is complex for algorithm designers and malicious password analysts. Yet, the carefully designed S-box is just a strong nonlinear Boolean (vector) map with avalanche characteristics. This means, in fact, that the S-box can be considered as a black box that transforms any input vector into a balanced vector in a non-predictable way (i.e., nonlinear).
Figure 1 shows the architecture of different component combinations to achieve balance.
At present the methods of S-boxes applied on multilayer perception for improving security complexity are based on two parallel methodologies [
15,
16]. The first one mainly uses mathematical theories and statistical investigations, while the other is additionally supported by the practitioner’s experience. To second a link between the both methodologies we propose design a structure of S-box based on multilayer perceptron to process the data from the overall point of view, this method can enhance its information processing ability and improve the overall security.
Accordingly, for the complex nonlinear architecture of multilayer perceptron, if the computational cost of data itself (e.g., compressed data) is reduced, its nonlinear mapping ability can also be improved. Modern lossless data compression program is realized through the combination of general compression technology and entropy coding. The role of lossless data compression algorithm is to increase the randomness of data (i.e., increase entropy). On the other hand, the entropy coding method compresses an original data unit into the minimum code as the compressed data. Although each of these technologies can achieve the compression effect, the combination will produce a better compression ratio. Then, they maximize the entropy of the compressed data (such as arithmetic coding and Hoffman coding). Therefore, in the hidden layer, compression technology and entropy coding can be combined to increase the throughput of the multilayer perceptron, reduce redundant information, and reduce computational overhead.
Based on the above factors, we combine the methods of cryptography and information theory to introduce S-box into multilayer perceptron with Levenshtein entropy coding-based in the hidden layer to make the multilayer perceptron process information more efficiently and safely.
In previous studies, there is a scheme to apply S-box to multilayer perceptron. Arrañaga et al. proposed a scheme that S-box can apply it to multilayer perceptron [
17]. But it does not test the cryptographic characteristics of the implemented S-box, nor is it applied to the replacement of image processing.
Zhu et al. [
18] proposed an improved chaotic map for image encryption system. The framework preliminarily analyzes the conventional technologies of one-dimensional chaotic system, replacement box production structure and image encryption algorithm. The double chaotic S-box algorithm includes forward backward confusion diffusion operation to enhance the performance of image encryption system. The shortcomings of the proposed model do not discuss the side channel attack in the encryption framework, nor is it applied to multilayer perceptron.
A.S. et al. [
19] involved an S-box with hybrid prediction and adaptive chaos, and calculated and analyzed various performance parameters. However, it is based on embedded system rather than multilayer perceptron, which makes image processing less obvious.
Yang et al. [
20] designed a new chaotic S-box diffusion method based on 2d-mccm, which improved the security and efficiency, and proposed a new image encryption algorithm, but it was not constructed based on multilayer perceptron.
Zhang et al. [
21] introduced the learning algorithm based on multilayer perceptron and S-box to improve the security integrity of the system. The proposal uses the new way of approach to decompose the huge input into two equal parts and each part is trained by two perceptrons combined with a special 172P perceptron. It also convenient to quickly train the weight-threshold values of the Boolean function in the network through DNA-like learning algorithm.
Kotlarz and Kotulski [
22] discussed the use of S-boxes to implement cryptographic schemes in multilayer perceptron. To realize the elementary permutation, 2-bit and 3-bit block of bits were transformed into a block of bits as a combination of small blocks (i.e., multilayer perceptron). The permutation of 16-bit blocks is realized in this model. The advantage of this method is that it makes use of the fragmentary training sets for each block, at the server side, and the complete training set for the whole multilayer perception in order to realize the cryptographic algorithm. This fragmentary training system gives some security for the algorithm update process provided the internal structure of the complete topology remains secret.
For the above research, their research scheme not only failed to study the S-box through Boolean function, resulting in the inability to analyze the cryptographic properties, but also failed to combine the S-box and multilayer perceptron into image processing.
For the above research, their research scheme not only failed to study the S-box through Boolean function, resulting in the inability to analyze the cryptographic properties, but also failed to combine the S-box and multilayer perceptron into image processing. We give a low-power chaotic S-box based on multilayer perceptron to optimize, and apply it to image processing to improve its information processing ability in the multilayer perceptron. The application of LPC S-box in multilayer perceptron is shown in
Figure 2. The contributions of this article are as follows:
- (1)
We combine the methods of cryptography and information theory to design a low-power chaotic S-box, and carry out noise reduction and entropy coding compression in the hidden layer, so that the multilayer perceptron can process images more efficiently and safely.
- (2)
Our S-box has the function of replacement, which aims to confuse the binary string after encoding and compression, prevent the computer from being invaded illegally and maliciously decode the image, so as to encode the image that is difficult to be processed by the computer and has low processing efficiency efficiently and safely.
- (3)
We selected a group of S-boxes with good cryptographic performance for performance testing. The results show that our scheme can effectively resist algebraic attacks, DPA attacks, etc., which can not only make up for the limited nonlinear mapping ability of multilayer perceptron, but also improve the security of multilayer perceptron model.
5. Benchmark Test
In this section, we estimate the index performance of our S-box and other schemes. Experimental environment for performance analysis is as follows: the processor is Intel® CoreTM i5-8300H CPU @2.30 GHz; the system type is a 64-bit operating system. Based on this system, this paper uses C programming language to calculate nonlinearity, differential uniformity, and transparency order operations.
In the multilayer perceptron, a series of operations of S-box can be used in the hidden layer. Because the S-box has a high degree of nonlinearity, it is related to the nonlinear mapping of the hidden layer. The nonlinearity, difference uniformity, and transparency order involved in this paper can be applied to the adaptive function of multilayer perceptron, which plays an important role in the optimization of S-box. The relation of attributes of S-box based on multilayer perceptron is shown in
Table 1 below.
We classify all the optimal 4-bit S-boxes and generate 16 optimal S-boxes under different nonlinearity and uniformity conditions according to the affine equivalence principle (i.e., optimum in differential, linear, and algebraic attacks). In this paper, a new scheme of S-box with multilayer perceptron based on Levenshtein entropy coding algorithm is proposed, and the performance of various scheme 4-bit S-box is tested.
Ta Thi Kim Hue et al. [
23] defined the 4-bit optimal S-box for the first time, that is, the bijective S-box whose nonlinearity and differential uniformity reach the critical value 4 at the same time. We have found the representative elements of eight types of optimal 4-bit S-boxes and used intuitive symbols
to represent different schemes. The optimal 4-bit S-box of our S-box is named
. The 4-bit S-box proposed by Canteaut et al. [
24] named
The data of ours 8 optimal 4-bit S-box and Canteaut et al. S-boxes [
24] are shown in
Table 2.
5.1. Nonlinearity
In order to resist linear cryptographic attacks, Boolean functions used in cryptosystems should be as far away from the Hamming distance of all affine functions as possible [
25,
26]. The nonlinearity
NL(
F) of Boolean function
F is defined as the minimum Hamming distance between
F and all affine functions. The nonlinearity of each scheme is obtained from the data input into the S-box, as in
Figure 4.
The upper bound of the nonlinearity of a n × n S-box is
, and the upper bound of the nonlinearity of a 4-bit S-box is 6. It can be seen from
Figure 4 that the nonlinearity of LPC S-box is up to 4, which is high for 4-bit, because it is difficult to construct an S-box close to the upper bound. The higher the nonlinearity, the closer the nonlinear ability between input and output is to the upper bound, the stronger the corresponding anti-linear attack ability. Hence, LPC S-box has excellent ability to resist linear cryptographic attacks.
5.2. Differential Uniformity
The value of differential evenness of Boolean function is inversely related to the ability to resist differential cryptographic attacks. The differential uniformity of each scheme is obtained from the data input into the S-box, as in
Figure 5.
The range of differential uniformity for n × n S-boxes is
, and the range of differential uniformity for 4-bit S-boxes is
. By comparison, the difference uniformity of the LPC S-box is up to 8, and the difference uniformity of the Canteaut et al. [
24] scheme is all 4. In terms of security performance, the smaller the maximum value of the differential propagation probability, the stronger the S-box resists differential attacks.
Hence, LPC S-box has excellent ability to resist differential attacks.
5.3. Transparency Order
Transparency order is an indicator to measure the ability of Boolean functions to resist differential power analysis (DPA) attacks. The lower the transparency order of Boolean function, the stronger the ability to resist DPA attack. The DPA attack has nothing to do with the security of the algorithm, which is an attack based on the characteristics of the algorithm on the device [
27]. The transparency order of each scheme is obtained from the data input into the S-box, as in
Figure 6.
According to the above definition analysis, the transparency order, and nonlinearity of the 4-bit S-box are negatively correlated. When the S-box has high nonlinearity, its transparency order is low. It can be seen from
Figure 6 that the average level of transparency order of LPC S-box is slightly smaller than that of the Canteaut et al. [
24] scheme. Correspondingly, LPC S-box has excellent ability to resist DPA attacks.
5.4. Algebraic Degree
For resisting the Berlekamp Massey-attack and the Ronjom-Helleseth attack, the Boolean function in the S-box must have a high algebraic degree. The algebraic degree of function
F, expressed by
, is the number of variables contained in the highest order term in its algebraic normal form. We obtain their algebraic degree by inputting the data of S-box, and obtain the data shown in
Figure 7 according to the simulation calculation.
The upper bound for the number of algebras of the 4-bit S-box is 4, and it can be seen from the figure that the number of algebras of the LPC S-box is up to 3. This has a higher algebraic degree for a 4-bit S-box, because it is difficult to construct an S-box close to the upper bound, and the closer the algebraic number is to the upper bound, the stronger the anti-algebraic attack capability of the corresponding S-box. Therefore, both the LPC S-box and the Canteaut et al. [
24] scheme have outstanding resistance to Berlekamp Massey-attack and the Ronjom-Helleseth attack.
5.5. Algebraic Immunity
Algebraic attacks are often used in stream cipher systems, threatening the security of the entire cryptosystem. In order to resist algebraic attacks, people have proposed a new security index of Boolean functions (e.g., algebraic immunity). The algebraic immunity of n-ary Boolean function
F is expressed by
. We obtain their algebraic immunity by inputting the data of S-box, and obtain the data shown in
Figure 8 according to the simulation calculation.
The upper bound of the algebraic immunity of an n × n S-box is
, and the upper bound of the algebraic immunity of a 4-bit S-box is 2. As can be seen from
Figure 7, the algebraic immunity of LPC S-boxes all reach the upper bound of 2, which has the highest algebraic immunity for 4-bit S-boxes, so the constructed S-boxes are optimal. Hence, LPC S-box has excellent ability to resist algebraic attacks.
5.6. Overall Performance Analysis
In the benchmark test, the cryptographic performance index of the S-box of the existing scheme is compared, which is based on the verification of the security of the S-box in the multilayer perceptron. The nonlinearity, transparency order, algebraic degree, and algebraic immunity selected in the experiment are supplementary explanations for the security of the S-box. The data itself reflects the security of the 4-bit S-box. The calculation results of the transparency order verify that the correlation between the original data and the output data is reduced through the S-box of the hidden layer, and a better anti-DPA performance is obtained. Related research has proved that power consumption is the main function of Hamming weight of data privacy in displacement operation [
28]. If Hamming weight of data privacy is disclosed, attackers can determine the number of bits of data privacy by solving a series of linear equations. In DPA, the attacker associates the power consumption with the data value manipulated in the replacement process, and uses the corresponding function solution to obtain data privacy information. Therefore, a high-performance transparency order will reduce power consumption. High nonlinearity is also difficult for attackers to solve linear equations [
29], so the calculation of nonlinearity can also show the correlation between S-box and low power consumption. Therefore, we tested based on the cryptographic performance indicators of the S-box in the multilayer perceptron, and proved that LPC S-box reduced the overhead for the overall system operation in terms of computing, thus achieving the goal of low power consumption.