skip to main content
10.1145/3352411.3352429acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdsitConference Proceedingsconference-collections
research-article

Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards

Authors Info & Claims
Published:19 July 2019Publication History

ABSTRACT

On today's world where data and information is available on almost everywhere, the security of these data and information are being attacked every day. Security enhancements are being done in order to make it more secure. One of the cryptographic techniques that is being used to secure data is the Advanced Encryption Standards (AES) and one of its primary components is the Substitution box (S-box). It is the only nonlinear part of AES thus it is prone to attacks. The paper produced a modified S-box with the combination of the original S-box and the S-box produced using the Logistic Map. Adjustments were made to meet the bijective property of an S-box. It was then evaluated using balance, bijective property, nonlinearity, bit independence criterion and strict avalanche criterion. The results have met the bijective and balance property of AES with the adjustment discussed. Its nonlinearity was tested using S-box Evaluation Tool (SET) and achieved a result of 94. Its Strict Avalanche Criterion (SAC) scored 0.5234375, and Bit Independence Criterion (BIC) has -0.0275 result. As a recommendation, this S-box can undergo cryptanalysis attacks to find its weakness further.

References

  1. R. K. Logan, "What is information?: Why is it relativistic and what is its relationship to materiality, meaning and organization," Inf., vol. 3, no. 1, pp. 68--91, 2012.Google ScholarGoogle Scholar
  2. R. K. Goutam, "Importance of Cyber Security," Int. J. Comput. Appl., vol. 111, no. 7, pp. 975--8887, 2015.Google ScholarGoogle Scholar
  3. E. Chu, P. Kim, P. Kim, F. Liu, J. Sharma, and J. Yu, "The Selection of the Advanced Encryption Standard," MIT web. 2003.Google ScholarGoogle Scholar
  4. P. Partheeban and P. N. Nityanandam, "Generation of Dynamic S-Box Using Irreduceable Polynomial and the Secret Key Used," Am. J. Comput. Sci. Eng. Surv., vol. 1, no. 5, pp. 24--27, 2013.Google ScholarGoogle Scholar
  5. A. Kak, "AES: The Advanced Encryption Standard," Computer and Network Security, 2018. {Online}. Available: https://www.commonlounge.com/discussion/e32fdd267aaa4240a4464723bc74d0a5#disadvantages-of-aes. {Accessed: 05-Aug-2018}.Google ScholarGoogle Scholar
  6. E. M. Mahmoud et al., "Dynamic AES-128 with Key-Dependent S-box," Int. J. Eng. Res. Appl., pp. 1662--1670, 2013.Google ScholarGoogle Scholar
  7. Y. Wang, Q. Xie, Y. Wu, and B. Du, "A software for S-box performance analysis and test," Proc. - 2009 Int. Conf. Electron. Commer. Bus. Intell. ECBI 2009, pp. 125--128, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Singh, P. Agarwal, and M. Chand, "Analysis of Development of Dynamic S-Box Generation," Comput. Sci. Inf. Technol., vol. 5, no. 5, pp. 154--163, 2017.Google ScholarGoogle Scholar
  9. S. Mister and C. Adams, "Practical S-box design," Work. Sel. Areas Cryptogr. SAC, pp. 1--17, 1996.Google ScholarGoogle Scholar
  10. P. Rodwald and P. Mroczkowski, "How to create good s-boxes?," 1st Int. Conf. Young Res. Comput. Sci. Control. Electr. Eng. Telecommun. ICYR, 2006., no. October, 2018.Google ScholarGoogle Scholar
  11. D. Lambić, "A novel method of S-box design based on chaotic map and composition method," Chaos, Solitons and Fractals, vol. 58, pp. 16--21, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  12. Y. Wang, P. Lei, and K.-W. Wong, "A Method for Constructing Bijective S-Box with High Nonlinearity Based on Chaos and Optimization," Int. J. Bifurc. Chaos, vol. 25, no. 10, p. 1550127, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  13. P. Mroczkowski, "Generating Pseudorandom S-Boxes - a Method of Improving the Security of Cryptosystems Based on Block Ciphers," J. Telecommun. Inf. Technol., vol. nr 2, pp. 74--79, 2009.Google ScholarGoogle Scholar
  14. A. Rohiem, A. Diaa, and F. Mohammed, "Generation of AES Key Dependent S-Boxes using RC4 Algorithm," 13th Int. Conf. Aerosp. Sci. Aviat. Technol. ASAT- 13, pp. 1--9, 2012.Google ScholarGoogle Scholar
  15. I. Hussain and T. Shah, "Literature survey on nonlinear components and chaotic nonlinear components of block ciphers," Nonlinear Dyn., vol. 74, no. 4, pp. 869--904, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  16. Alamsyah, A. Bejo, and T. B. Adji, "AES S-box construction using different irreducible polynomial and constant 8-bit vector," 2017 IEEE Conf. Dependable Secur. Comput., pp. 366--369, 2017.Google ScholarGoogle Scholar
  17. M. V. C. Suana, A. M. Sison, C. Aragon, and R. P. Medina, "Enhancement of Advanced Encryption Standard (AES) Cryptographic Strength via Generation of Cipher Key-Dependent S-Box," vol. 6, no. Iv, pp. 1420--1428, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  18. N. Angraini, B. H. Susanti, and Magfirawaty, "Analysis of the Use of Whirlpool ' s S-box, S1 and S2 SEED ' s S- box in AES Algorithm with SAC Test," Inf. Syst. Int. Conf., no. December, pp. 700--705, 2013.Google ScholarGoogle Scholar
  19. A. F. Webster and S. E. Tavares, "On the Design of S-Boxes," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 218 LNCS, pp. 523--534, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Guesmi, M. A. Ben Farah, A. Kachouri, and M. Samet, "Chaos-based designing of a highly nonlinear S-box using Boolean functions," 12th Int. Multi-Conference Syst. Signals Devices, SSD 2015, pp. 1--5, 2015.Google ScholarGoogle Scholar
  21. S. Picek, L. Batina, and D. Jakobovi, "A Toolbox for S-box Analysis," pp. 140--149, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        DSIT 2019: Proceedings of the 2019 2nd International Conference on Data Science and Information Technology
        July 2019
        280 pages
        ISBN:9781450371414
        DOI:10.1145/3352411

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 19 July 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        DSIT 2019 Paper Acceptance Rate43of95submissions,45%Overall Acceptance Rate114of277submissions,41%
      • Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader