A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix
نویسندگان
چکیده
منابع مشابه
Area optimized S-BOX Architecture for Advance Encryption Standards
This paper presents an area optimized for composite field arithmetic based SubBytes transformation (Sbox) used in Advanced Encryption Standard (AES) encryption. The proposed architecture is based on precomputation technique. Implementation is proposed on FPGA using Xilinx ISE on XC3S 400-5 and results are shown in the paper. Keywords—AES, S-BOX, Sub-Byte, Encryption.
متن کاملImplementation of Stronger S-Box for Advanced Encryption Standard
---------------------------------------------------ABSTRACT------------------------------------------------------Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. The main core of AES block cipher is the substitution table or SBox. This S-box is used to provide confusion capability for AES. In addition, to strengthen the S-Box against algebraic...
متن کاملDynamic AES-128 with Key-Dependent S-box
Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. The main core of AES block cipher is the substitution table or SBox. This S-box is used to provide confusion capability for AES. The aim of this paper is to design dynamic S-box which depends on the secret key. The parameters of the new created SBOXes have characteristics equal to those in the o...
متن کاملTowards the Generation of a Dynamic Key-Dependent S-Box to Enhance Security
Secure transmission of message was the concern of early men. Several techniques have been developed ever since to assure that the message is understandable only by the sender and the receiver while it would be meaningless to others. In this century, cryptography has gained much significance. This paper proposes a scheme to generate a Dynamic Key-dependent S-Box for the SubBytes Transformation u...
متن کاملA Standard for Encryption and Key Encapsulation
The main purpose of this document is to provide simple and high-level, yet actionably, concrete, and standard descriptions of two practical instantiations of the Boneh-Boyen BB1 identity-based cryptosystem. One instantiation is an full encryption (or IBE) system, the other a key encapsulation mechanism (or IBKEM). A secondary purpose of the document is to discuss the many extensions of practica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2017
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2017.080241