Randomization Based Block Cipher with Key Mapped S-Box Selection
نویسندگان
چکیده
منابع مشابه
Key-Dependent S-Box Generation in AES Block Cipher System
Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. A nonlinear substitution operation is the main factor of the AES cipher system strength. The purpose of the proposed approach is to generate the random S-boxes changing for every change of the secret key. The fact that the S-boxes are randomly key-dependent and unknown is the main strength of th...
متن کاملAn Algorithm for Key-Dependent S-Box Generation in Block Cipher System
A nonlinear substitution operation of bytes is the main strength factor of the Advanced Encryption Standard (AES) and other modern cipher systems. In this paper we have presented a new simple algorithm to generate key-dependent S-boxes and inverse S-boxes for block cipher systems. The quality of this algorithm was tested by using NIST tests, and changing only one bit of the secret key to genera...
متن کاملThe Littlun S-box and the Fly block cipher
We present the construction and implementation of an 8-bit S-box with a differential and linear branch number of 3. We show an application by designing Fly, a simple block cipher based on bitsliced evaluations of the S-box and bit rotations that targets the same platforms as Pride, and which can be seen as a variant of Present with 8-bit S-boxes. The round function of Fly achieves the same perf...
متن کاملA Compact S-Box Design for SMS4 Block Cipher
This paper proposes a compact design of SMS4 S-box using combinational logic which is suitable for the implementation in area constraint environments like smart cards. The inversion algorithm of the proposed S-box is based on composite field GF(((2))) using normal basis at all levels. In our approach, we examined all possible normal basis combinations having trace equal to one at each subfield ...
متن کاملLifting Based S-Box for Scalable Block Cipher Design Based on Filter Banks
The security of data exchange is considered a significant problem. It requires the use of various cryptographic algorithms, such as stream cipher and block cipher. The implementation of a secure cryptographic block cipher algorithm requires the generation of strong substitution and permutation layers. These layers should satisfy the principles of security (diffusion and confusion). The proposed...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Cryptography and Information Security
سال: 2017
ISSN: 1839-8626
DOI: 10.5121/ijcis.2017.7101