ABSTRACT
On today's world where data and information is available on almost everywhere, the security of these data and information are being attacked every day. Security enhancements are being done in order to make it more secure. One of the cryptographic techniques that is being used to secure data is the Advanced Encryption Standards (AES) and one of its primary components is the Substitution box (S-box). It is the only nonlinear part of AES thus it is prone to attacks. The paper produced a modified S-box with the combination of the original S-box and the S-box produced using the Logistic Map. Adjustments were made to meet the bijective property of an S-box. It was then evaluated using balance, bijective property, nonlinearity, bit independence criterion and strict avalanche criterion. The results have met the bijective and balance property of AES with the adjustment discussed. Its nonlinearity was tested using S-box Evaluation Tool (SET) and achieved a result of 94. Its Strict Avalanche Criterion (SAC) scored 0.5234375, and Bit Independence Criterion (BIC) has -0.0275 result. As a recommendation, this S-box can undergo cryptanalysis attacks to find its weakness further.
- R. K. Logan, "What is information?: Why is it relativistic and what is its relationship to materiality, meaning and organization," Inf., vol. 3, no. 1, pp. 68--91, 2012.Google Scholar
- R. K. Goutam, "Importance of Cyber Security," Int. J. Comput. Appl., vol. 111, no. 7, pp. 975--8887, 2015.Google Scholar
- E. Chu, P. Kim, P. Kim, F. Liu, J. Sharma, and J. Yu, "The Selection of the Advanced Encryption Standard," MIT web. 2003.Google Scholar
- P. Partheeban and P. N. Nityanandam, "Generation of Dynamic S-Box Using Irreduceable Polynomial and the Secret Key Used," Am. J. Comput. Sci. Eng. Surv., vol. 1, no. 5, pp. 24--27, 2013.Google Scholar
- A. Kak, "AES: The Advanced Encryption Standard," Computer and Network Security, 2018. {Online}. Available: https://www.commonlounge.com/discussion/e32fdd267aaa4240a4464723bc74d0a5#disadvantages-of-aes. {Accessed: 05-Aug-2018}.Google Scholar
- E. M. Mahmoud et al., "Dynamic AES-128 with Key-Dependent S-box," Int. J. Eng. Res. Appl., pp. 1662--1670, 2013.Google Scholar
- Y. Wang, Q. Xie, Y. Wu, and B. Du, "A software for S-box performance analysis and test," Proc. - 2009 Int. Conf. Electron. Commer. Bus. Intell. ECBI 2009, pp. 125--128, 2009. Google ScholarDigital Library
- A. Singh, P. Agarwal, and M. Chand, "Analysis of Development of Dynamic S-Box Generation," Comput. Sci. Inf. Technol., vol. 5, no. 5, pp. 154--163, 2017.Google Scholar
- S. Mister and C. Adams, "Practical S-box design," Work. Sel. Areas Cryptogr. SAC, pp. 1--17, 1996.Google Scholar
- P. Rodwald and P. Mroczkowski, "How to create good s-boxes?," 1st Int. Conf. Young Res. Comput. Sci. Control. Electr. Eng. Telecommun. ICYR, 2006., no. October, 2018.Google Scholar
- D. Lambić, "A novel method of S-box design based on chaotic map and composition method," Chaos, Solitons and Fractals, vol. 58, pp. 16--21, 2014.Google ScholarCross Ref
- Y. Wang, P. Lei, and K.-W. Wong, "A Method for Constructing Bijective S-Box with High Nonlinearity Based on Chaos and Optimization," Int. J. Bifurc. Chaos, vol. 25, no. 10, p. 1550127, 2015.Google ScholarCross Ref
- P. Mroczkowski, "Generating Pseudorandom S-Boxes - a Method of Improving the Security of Cryptosystems Based on Block Ciphers," J. Telecommun. Inf. Technol., vol. nr 2, pp. 74--79, 2009.Google Scholar
- A. Rohiem, A. Diaa, and F. Mohammed, "Generation of AES Key Dependent S-Boxes using RC4 Algorithm," 13th Int. Conf. Aerosp. Sci. Aviat. Technol. ASAT- 13, pp. 1--9, 2012.Google Scholar
- I. Hussain and T. Shah, "Literature survey on nonlinear components and chaotic nonlinear components of block ciphers," Nonlinear Dyn., vol. 74, no. 4, pp. 869--904, 2013.Google ScholarCross Ref
- Alamsyah, A. Bejo, and T. B. Adji, "AES S-box construction using different irreducible polynomial and constant 8-bit vector," 2017 IEEE Conf. Dependable Secur. Comput., pp. 366--369, 2017.Google Scholar
- M. V. C. Suana, A. M. Sison, C. Aragon, and R. P. Medina, "Enhancement of Advanced Encryption Standard (AES) Cryptographic Strength via Generation of Cipher Key-Dependent S-Box," vol. 6, no. Iv, pp. 1420--1428, 2018.Google ScholarCross Ref
- N. Angraini, B. H. Susanti, and Magfirawaty, "Analysis of the Use of Whirlpool ' s S-box, S1 and S2 SEED ' s S- box in AES Algorithm with SAC Test," Inf. Syst. Int. Conf., no. December, pp. 700--705, 2013.Google Scholar
- A. F. Webster and S. E. Tavares, "On the Design of S-Boxes," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 218 LNCS, pp. 523--534, 1986. Google ScholarDigital Library
- R. Guesmi, M. A. Ben Farah, A. Kachouri, and M. Samet, "Chaos-based designing of a highly nonlinear S-box using Boolean functions," 12th Int. Multi-Conference Syst. Signals Devices, SSD 2015, pp. 1--5, 2015.Google Scholar
- S. Picek, L. Batina, and D. Jakobovi, "A Toolbox for S-box Analysis," pp. 140--149, 2014. Google ScholarDigital Library
Index Terms
- Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards
Recommendations
Cryptographic strength evaluation of AES s-box variants
In recent years, researchers have constructed AES s-box variants by customising the values of the parameters in the equation of AES s-box. Strength of these s-box variants is evaluated against the cryptographic properties like avalanche effect, ...
Generation of AES-Like S-Boxes by Replacing Affine Matrix
FIT '14: Proceedings of the 2014 12th International Conference on Frontiers of Information TechnologyAES type S-boxes are constructed by replacing the affine matrix of AES S-box equation with 8x8 invertible affine matrices. The 8x8 S-boxes of AES produced in GF (28) are a nonlinear transformation that have significant effect on the strength of entire ...
Impossible differential cryptanalysis of 7-round advanced encryption standard (AES)
Devoted to the rapid publication of short contributions to information processingIn 2000, Biham and Keller [Cryptanalysis of reduced variants of Rijndael, 3rd AES Conference, in press] presented an impossible differential cryptanalysis of the Advanced Encryption Standard (AES) up to 5 rounds. This was later improved in 2001 by Cheon ...
Comments