{"title":"New Key-Dependent S-Box Generation Algorithm on AES","authors":"Proteeti Das, Najmul Hoque Munshi, Subhasis Maitra","doi":"10.2174/1876402913666210726163822","DOIUrl":null,"url":null,"abstract":"\n\nCryptography means 'hidden secrets'. The primary purpose of cryptography is to protect network and data over a wireless communication channel. The cryptographic approach secures the data of a network from any internal or external attacks. \n\n\n\nThere are several kinds of cryptographic techniques that are Data Encryption Standard (DES), RSA (Rivest- Shamir- Adleman), Advanced Encryption Standard (AES), Blowfish, Twofish etc. Out of these algorithms, AES shows wide acceptance for its superiority in providing confidentiality to secret information. Another cause for extensive acceptance is, AES is simple, convenient to implement, low charge and higher security. Several changes have been proposed to modify in recent times by cryptographers and researchers all around the world. \n\n\n\nThis research paper offers a new key-dependent s-box generation algorithm for AES.\n\n\n\nA list of irreducible polynomials of degree 8 is used to generate the s-box depending on the secret key to provide more invulnerable ciphertext in comparison to standard AES. This design of this proposed model is easy and convenient to implement than different dynamic s-box technology algorithm. \n\n\n\nThe metrics chosen for overall performance evaluation are Frequency Distribution, Chi-square Test, Avalanche Effect, and Strict Avalanche Criterion.\n\n\n\nThe proposed algorithm satisfies the desired property of these metrics and provides better security in contrast to standard AES.\n","PeriodicalId":18543,"journal":{"name":"Micro and Nanosystems","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Micro and Nanosystems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2174/1876402913666210726163822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0
Abstract
Cryptography means 'hidden secrets'. The primary purpose of cryptography is to protect network and data over a wireless communication channel. The cryptographic approach secures the data of a network from any internal or external attacks.
There are several kinds of cryptographic techniques that are Data Encryption Standard (DES), RSA (Rivest- Shamir- Adleman), Advanced Encryption Standard (AES), Blowfish, Twofish etc. Out of these algorithms, AES shows wide acceptance for its superiority in providing confidentiality to secret information. Another cause for extensive acceptance is, AES is simple, convenient to implement, low charge and higher security. Several changes have been proposed to modify in recent times by cryptographers and researchers all around the world.
This research paper offers a new key-dependent s-box generation algorithm for AES.
A list of irreducible polynomials of degree 8 is used to generate the s-box depending on the secret key to provide more invulnerable ciphertext in comparison to standard AES. This design of this proposed model is easy and convenient to implement than different dynamic s-box technology algorithm.
The metrics chosen for overall performance evaluation are Frequency Distribution, Chi-square Test, Avalanche Effect, and Strict Avalanche Criterion.
The proposed algorithm satisfies the desired property of these metrics and provides better security in contrast to standard AES.