Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Razi Hosseinkhani, Seyyed Hamid Haj Seyeed Javadi
Pages - 19 - 28 | Revised - 15-01-2012 | Published - 21-02-2012
MORE INFORMATION
KEYWORDS
Advanced Encryption Standard(AES), Dynamic S-Box generation, S-Box
ABSTRACT
The Advanced Encryption Standard (AES) is using in a large scale of applications that need to protect their data and information. The S-Box component that used in AES is fixed, and not changeable. If we can generate this S-Box dynamically, we increase the cryptographic strength of AES cipher system. In this paper we intend to introduce new algorithm that generate S-Box dynamically from cipher key. We describe how S-Box can be generated dynamically from cipher key and finally analyze the results and experiments.
1 | Mohamed, K., Pauzi, M. N. M., Ali, F. H. H. M., & Ariffin, S. (2015, August). Linearity Test Framework for S-Box in Block Cipher. In IT Convergence and Security (ICITCS), 2015 5th International Conference on (pp. 1-5). IEEE. |
2 | Jasim, O. K., Abbas, S., Horbaty, E. S. M., & Salem, A. B. M. (2015). Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. arXiv preprint arXiv:1503.04796. |
3 | Das, S., & Ghosh, R. (2015). Study of randomness in AES ciphertexts produced by various types of dynamic S-boxes. International Journal of Information and Communication Technology, 7(6), 537-561. |
4 | Kazlauskas, K., Vaicekauskas, G., & Smaliukas, R. (2015). An Algorithm for Key-Dependent S-Box Generation in Block Cipher System. INFORMATICA, 26(1), 51-65. |
5 | Kalaiselvi, K., & Mangalam, H. (2015). Power efficient and high performance VLSI architecture for AES algorithm. Journal of Electrical Systems and Information Technology. |
6 | Vaicekauskas, G. BLOKINIŲ ŠIFRŲ ANALIZĖ IR KOKYBĖS PAGERINIMAS. |
7 | Kaur, P. J., Kaul, V., Bharadi, V. A., & Narayankhedkar, S. K. Article: Development of Security Enhancement Techniques for 3G/4G Networks}. In IJAIS Proceedings on International Conference and Workshop on Communication, Computing and Virtualization} (pp. 41-46). |
8 | Alabaichi, A. M. (2015). A Dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm. Indian Journal of Science and Technology, 8(30). |
9 | Alabaichi, A., & Salih, A. I. (2015, October). Enhance security of advance encryption standard algorithm based on key-dependent S-box. In Digital Information Processing and Communications (ICDIPC), 2015 Fifth International Conference on (pp. 44-53). IEEE. |
10 | Wahaballa, A., Wahballa, O., Li, F., Ramadan, M., & Qin, Z. (2014). Multiple-Layered Securities Using Steganography and Cryptography. International Journal of Computers and Applications, 36(3), 93-100. |
11 | Dara, M., & Manochehri, K. (2014). Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES. Information Security Journal: A Global Perspective, 23(1-2), 1-9. |
12 | Kaul, V., Choudhari, P., & Narayankhedkar, S. K. (2014, September). Security enhancement for data transmission in 4G networks. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference- (pp. 373-378). IEEE. |
13 | Choudhari, P., Kaul, V., & Narayankhedkar, S. K. Security Enhancement Algorithms for Data Transmission in 4G Networks. |
14 | Azzawi, A. L. H. M. (2014). Enhancing The Encryption Process Of Advanced Encryption Standard (AES) By Using Proposed Algorithm To Generate S-Box. Journal of Engineering and Development, 18(2). |
15 | Das, S., Zaman, J. S. U., & Ghosh, R. (2014). Study of Randomness in AES Ciphertexts Produced by Randomly Generated S-Boxes and S-Boxes with Various Modulus and Additive Constant Polynomials. Journal of The Institution of Engineers (India): Series B, 1-16. |
16 | Das, S., Zaman, J. U., & Ghosh, R. (2013). Generation of AES S-boxes with Various Modulus and Additive Constant Polynomials and Testing their Randomization. Procedia Technology, 10, 957-962. |
17 | Riman, C., & Hallal, H. H. (2013, January). DES Based Educational Encryption System. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp). |
18 | Nadaf, R., & Desai, V. (2012). Hardware Implementation of Modified AES with Key Dependent Dynamic S-Box. IEEE ICARET. |
1 | Google Scholar |
2 | CiteSeerX |
3 | refSeek |
4 | Bielefeld Academic Search Engine (BASE) |
5 | Scribd |
6 | SlideShare |
7 | PdfSR |
B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C, New York: Wiley. 1996 | |
Federal Information Processing Standards, “Advanced Encryption Standard (AES)” Publication 197, November 26 - 2001 | |
Kazys KAZLAUSKAS, Janunius KAZLAUSKAS,” Key-Dependent S-Box Generation in AES Block Cipher System” , Inoformatica Volume: 20 - 2009 | |
Masuda, N. Jakimovski, G. Jakimovski, K. Aihara and L. Kocarev . “Chaotic block ciphers: from theory to practical algorithms” IEEE Trans. on Circuits and Systems – I: Volume: 53 Issue: 6 – 2006 | |
Merkle, R. Fast software encryption functions. In Advances in Cryptology: Proceedings of CRYPTO’90, Berlin: Springer-Verlag, 1991 | |
Michael J.Quinn, Designing efficient algorithms for parallel computers, University of New Hamoshire, 1987 | |
Mr. Razi Hosseinkhani
NIOC - Iran
rhosseinkhani@gmail.com
Mr. Seyyed Hamid Haj Seyeed Javadi
- Iran
|
|
|
|
View all special issues >> | |
|
|