131 Ibn Al-Haitham Jour. for Pure & Appl. Sci. 32 (2) 2019 Abstract Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block cipher algorithm. Keywords: Serpent block cipher, initial and final permutation, substitutions boxes, key generation, logistic chaos map, standard chaos map. 1. Introduction Chaos theory is an awesome dynamic part in current cryptography. The principle highlights of utilizing chaos theory in numerous cryptosystems can be finished up on its affectability to starting conditions parameter and irregular conduct settings that accomplish the essential Shannon prerequisites of disarray and dissemination. Among them, a great deal of calculations in view of disorganized hypothesis endorsed its quality in many concerned angles with respect to security, execution speed, intricacy, control utilization and computational overhead, and so forth. These days, some turmoil based picture encryption cryptosystems and irregular number age calculations in view of discrete bedlam are proposed, however its security is for the most part not affirmed [1,2]. For some applications, the Data Encryption Standard (DES) algorithm endorsed its shortcoming against a great deal of cryptanalytic assault; therefore require a safe calculation has been issued by the US National Institute of Standards and Technology, to be known as the Advanced Encryption Standard (AES). The primary highlights of the proposed calculation that it must be both quicker and more secure than triple DES, it should likewise bolster a 128 bit block length and a 128, 192, and 256 bit key length [3]. The block cipher Serpent was outlined by Anderson, Biham and Ibn Al Haitham Journal for Pure and Applied Science Journal homepage: http://jih.uobaghdad.edu.iq/index.php/j/index Proposed A Permutation and Substitution Methods of Serpent Block Cipher Intisar Abid Yousif Department of Computer, College of Education, University of Mustansiriyah int_abd@uomustansiriyah.edu.iq Article history: Received 19 February 2019, Accepted 21 April 2019, Publish May 2019 2019 Doi: 10.30526/32.2.2120 int_abd@uomustansiriyah.edu.iq int_abd@uomustansiriyah.edu.iq 131 Ibn Al-Haitham Jour. for Pure & Appl. Sci. 32 (2) 2019 Knudsen to be contender for AES [4]. while, Daemen and Rijmen outlined the block cipher Rijndael. Serpent and Rijndael cipher were in an opposition between the last 5 finalist algorithms. The block cipher Rijndael standardized by NIST as the AES algorithm [5]. The security of AES has been submitted to present [6]. since its acknowledgment as an AES, closed equation for AES has been found by Ferguson, Shroeppel and Whiting which can be considered as a promotion of proceeded divisions [7,8]. Courtois and Pieprzyck see that the byte substitution change which utilized in the AES calculation can be determined by various certain quadratic Boolean conditions. Recently, there are numerous viable extensions in the cryptanalysis of AES. The AES applies a wide-trail configuration arranging [4, 9]. This was at first proposed on account of its quality against ground-breaking cryptanalytic systems. This paper presents a proposed modification of Serpent algorithm by replacing the static permutation and substitution with dynamical properties using logistic chaos map and standard map. The organization of this paper is chaos based cryptography in section 2,serpent block cipher in section 3,overview of logistic map and standard map in section 4,the proposed dynamic permutation and substitution methods in section 5,Security and Statistical analysis in section 6 and the rest sections are conclusion. 2. Chaos and cryptography It is a modern study that many researchers towards it [10-12]. The cryptography techniques are stream cipher and block cipher. Stream cipher algorithms are developed with using chaos maps as (Pseudo Random Bit Generator) PRBG to generate keystream.[13-17]. S-box of block cipher algorithms are developed with using chaos maps [18-22].This paper study and developed permutation box (IP & FP), S-box of serpent block cipher using chaos map, and key round generation. 3. Serpent block cipher Serpent is a symmetric block cipher and has Substitution - Permutation network (SPN) design. It has 32 rounds and each round requires its special 128 bit round key which is generated by a key schedule. The encrypting and decrypting phase have the same level of complexity. The decryption operations are exactly the inverted transformations used to encrypt the message but in opposite order Serpent uses different mathematical substitutions "S-boxes" with a 4 bit entrance and a 4 bit exit. Every encryption phase uses an S-box that work collaterally for the 32 times [23]. Figure 1, shows the encryption and decryption algorithms for Serpent block cipher. 133 Ibn Al-Haitham Jour. for Pure & Appl. Sci. 32 (2) 2019 Encryption process Decryption process Figure 1. Serpent block cipher: Encryption and Decryption process. At first, it accepts a 128 bit of plaintext and permutes these bits by fixed initial permutation (IP) which is shown in Table 1. The resulted bits input to 32 rounds, each round has three processes: - XOR with round key, substitution process by one of eight S- boxes as shown in Table 2, depend on round number (i) mod 8, linear transformation process as shown in Figure 2, with its algorithm. After last round there is XOR process with round key and do permutation of the result 128 bit by fixed final permutation (FP) as shown in Table 3, to get a ciphertext [24]. In decryption algorithm reverses an encryption block diagram processes to recover a plaintext [25]. 131 Ibn Al-Haitham Jour. for Pure & Appl. Sci. 32 (2) 2019 Table 1. Initial permutation (IP). Table 2. S-box.p. Figure 2. Linear transform (LT). 131 Ibn Al-Haitham Jour. for Pure & Appl. Sci. 32 (2) 2019 Table 3. Final permutation (FP). 4. Overview of logistic map and standard map  Logistic map: This paper used logistic chaotic map as the following equation for developed IP and FP permutation: (1) Where r range is (3.57 < r ≤ 4) that become chaotic. For example, using = 0.2, and r = 3.738 as Figure 3. Figure 3. Logistic map signal.  Standard map: This paper used Standard chaotic map as the following equation for developed S-box: + k sin mod 2π 2 + mod 2π 3 Where and ∈ [0,2π], and (k ). 5. The proposed dynamic permutation and substitution methods A. The proposed Dynamic Initial Permutation (DIP): This section shows a distribution of fixed IP serpent as Figure 4. This figure shows that no random in distribution and the attacker can re-permute in easy. So that this paper suggests use random chaotic map to permute IP with a special key for each encryption process. 0 100 200 300 400 500 600 700 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 131 Ibn Al-Haitham Jour. for Pure & Appl. Sci. 32 (2) 2019 Figure 4. The distribution of IP. To permute IP using logistic map by ascending or descending the generated values of map to get IP with a new random distribution as Table 4. and Figure 5. The following algorithm shows the method of proposed Initial permutation (DIP): Algorithm 1 Input: - The table of Initial permutation (IP) - The initial values of logistic map (r, n , x(1)) Output: - A new random distribution of IP (DIP) Begin 1. Save the table of IP in vector with length 128. 2. Generate a sequence of random values from logistic map with length 128 as index of IP vector. 3. Sort in ascending of these values to get a change of IP vector locations. Table 4. Permute IP with logistic map. 0 97 3 36 69 102 8 41 74 107 87 31 13 120 46 26 79 117 59 51 49 50 30 96 116 29 52 93 112 53 23 33 66 99 5 38 71 104 10 43 94 76 56 127 109 89 15 122 114 113 32 92 115 48 86 2 35 68 101 7 40 73 106 12 119 63 45 25 78 58 28 111 22 91 123 54 16 83 60 81 82 90 110 57 77 95 24 44 62 11 105 72 39 6 100 67 34 1 118 21 80 61 20 124 84 64 125 18 17 19 27 85 47 121 14 88 108 126 55 75 42 9 103 70 37 4 98 65 0 20 40 60 80 100 120 140 0 20 40 60 80 100 120 140 131 Ibn Al-Haitham Jour. for Pure & Appl. Sci. 32 (2) 2019 Figure 5. Distribution of proposed dynamic IP. B. The proposed dynamic Final Permutation (DFP): This section shows a distribution of fixed FP serpent as Figure 6. This figure shows that no random in distribution and the attacker can re-permute in easy. So that this paper suggests use random chaotic map to permute FP with a special key for each encryption process. Figure 6. Distribution of FP. To permute FP using logistic map by ascending or descending the generated values of map to get FP with a new random distribution as Table 5, and Figure 7. The following algorithm shows the method of proposed final permutation (DFP): Algorithm 2 Input: - The table of final permutation (FP) - The initial values of logistic map (r, n , x(1)) Output: - A new random distribution of FP (DFP) Begin 1. Save the table of FP in vector with length 128. 2. Generate a sequence of random values from logistic map with length 128 as index of FP vector. 0 20 40 60 80 100 120 140 0 20 40 60 80 100 120 140 0 20 40 60 80 100 120 140 0 20 40 60 80 100 120 140 133 Ibn Al-Haitham Jour. for Pure & Appl. Sci. 32 (2) 2019 3. Sort in ascending of these values to get a change of FP vector locations. Table 5. Permute FP with logistic map. 0 28 48 68 88 108 1 21 41 61 122 115 81 15 101 35 121 94 55 54 22 38 99 12 78 83 70 91 14 86 114 20 40 60 80 100 120 13 33 53 107 73 7 127 93 27 113 47 46 30 4 75 62 6 106 32 52 72 92 112 5 25 45 65 126 119 85 19 105 39 67 125 98 59 63 102 2 58 71 26 42 43 109 23 89 123 3 69 103 49 29 9 116 96 76 56 36 16 110 82 10 87 6 79 74 8 95 34 18 50 51 90 117 31 97 11 77 111 118 57 37 17 124 104 84 64 44 24 Figure 7. Distribution of proposed dynamic FP.  The Implementation Example A plaintext is “Mary had a little lamb”. A 128 bit of first 16 characters is 010011010110000101110010011110010010000001101000011000010110010000100000011000010010000001 10110001101001011101000111010001101100011001010010000001101100011000010110110101100010 IP of these bits is 000010010111000010011000000010010000111111110001010000010000101000001101111110010000000110 00010000001111111110001011011100001000 With a simple statistical test to know the features of the result bits: Autocorrelation test = -2.75 pass Poker test= 17.4878306878307 pass Serial test= fail Run test=0.0060, h=1 (no random) 0 20 40 60 80 100 120 140 0 20 40 60 80 100 120 140 131 Ibn Al-Haitham Jour. for Pure & Appl. Sci. 32 (2) 2019 Permute the result IP with chaotic logistic map as following binary string: 010000011101000111001100000100001010001000001111110110000001011000010110100000001101000100 10001011000101001111100100001011100110 With a simple statistical test to know the features of the result bits compared with previous IP bits. The test shows the proposed IP has best features: Autocorrelation test = -0.25 pass Poker= 7.87089947089947 pass Serial = 5.51402559055117 pass Run test=0.5974, h=0 (random) Example of result original FP as following binary string: 001011001001110000101000100100101010110000011001010010001101101100000000110 10001010000110011011101110010000110101000110001100000 With a simple statistical test to know the features of the result bits: Autocorrelation test = 0.25 pass Poker= 7.73544973544973 pass Serial =4.75812007874015 pass Run test=0.4463, h=0 (random) Permute the result FP with chaotic logistic map as following binary string: 001001110110111011000100011000010010100010100111100010111100001010000011010000000010000111 01010001100100010100110011001001000010 With a simple statistical test to know the features of the result bits compared with previous FP bits. The test shows the proposed FP has best features: Autocorrelation test = - 0.25 pass Poker= 10.4444444444444 pass Serial = 4.56914370078741 pass Run = 0.6962, h =0 (more random) C. The proposed dynamic substitution box The following algorithm shows the method of proposed dynamic substitution box (S- box) rather than fixed table. Algorithm 3 Input: - Eight S-boxes table ( o ) - The initial values of standard map (n, k, x(1), y(1)) Output: - A new random distribution of eight S-boxes Begin 1. Save the table of each of eight S-boxes into eight vectors each with length 8. 2. Generate a sequence of random values from standard map with length 8 as index of each S-box vector. Where apply with even S-boxes ( , , , ) and with odd S-boxes ( , , , ). 3. Sort in ascending of the even S-box values to get a change of vector locations. 4. Sort in descending of the odd S-box values to get a change of vector locations. D. The proposed round keys The following algorithm shows the method of proposed dynamic two round keys for each round based on chaotic standard map. 111 Ibn Al-Haitham Jour. for Pure & Appl. Sci. 32 (2) 2019 Algorithm 4 Input: - The initial values of standard map (n, k, x(1), y(1)) Output: - A new two round keys for each round Begin 1. Implement While Loop (no. round