Introducing Dynamic P-box and S-box Based on Modular Calculation and Key Encryption for Adding to Current Cryptographic Systems against the Linear and Differential Cryptanalysis
نویسنده
چکیده
In modern cryptography, the P-Boxes and S-boxes are used to make the relation between the plaintext and the cipher text difficult to realize. P-Box is a tool that changes the order of the input bits and they appear in the output. In this case, the key is order transmission of input bits in output bits.An S-box is a basic component which performs substitution. In this paper, a new method for the production of P-Box with the help of modular computing is introduced in a way that the order of the input bit transfer in output is the function of the encryption key.Next, development of this algorithm is used to make S-box structure.And also if the current symmetric encryption methods used, the P-Box and S-Box keysare derived from the key encryption method. In general, there is no need to increase the length of current key to use the P-Box and SBox recommended.
منابع مشابه
Hardware Implementation of Dynamic S-BOX to Use in AES Cryptosystem
One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...
متن کاملNovel Impossible Differential Cryptanalysis of Zorro Block Cipher
Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملKey-Dependent S-Box Generation in AES Block Cipher System
Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. A nonlinear substitution operation is the main factor of the AES cipher system strength. The purpose of the proposed approach is to generate the random S-boxes changing for every change of the secret key. The fact that the S-boxes are randomly key-dependent and unknown is the main strength of th...
متن کاملA Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کامل