Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3352411.3352429acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdsitConference Proceedingsconference-collections
research-article

Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards

Published: 19 July 2019 Publication History

Abstract

On today's world where data and information is available on almost everywhere, the security of these data and information are being attacked every day. Security enhancements are being done in order to make it more secure. One of the cryptographic techniques that is being used to secure data is the Advanced Encryption Standards (AES) and one of its primary components is the Substitution box (S-box). It is the only nonlinear part of AES thus it is prone to attacks. The paper produced a modified S-box with the combination of the original S-box and the S-box produced using the Logistic Map. Adjustments were made to meet the bijective property of an S-box. It was then evaluated using balance, bijective property, nonlinearity, bit independence criterion and strict avalanche criterion. The results have met the bijective and balance property of AES with the adjustment discussed. Its nonlinearity was tested using S-box Evaluation Tool (SET) and achieved a result of 94. Its Strict Avalanche Criterion (SAC) scored 0.5234375, and Bit Independence Criterion (BIC) has -0.0275 result. As a recommendation, this S-box can undergo cryptanalysis attacks to find its weakness further.

References

[1]
R. K. Logan, "What is information?: Why is it relativistic and what is its relationship to materiality, meaning and organization," Inf., vol. 3, no. 1, pp. 68--91, 2012.
[2]
R. K. Goutam, "Importance of Cyber Security," Int. J. Comput. Appl., vol. 111, no. 7, pp. 975--8887, 2015.
[3]
E. Chu, P. Kim, P. Kim, F. Liu, J. Sharma, and J. Yu, "The Selection of the Advanced Encryption Standard," MIT web. 2003.
[4]
P. Partheeban and P. N. Nityanandam, "Generation of Dynamic S-Box Using Irreduceable Polynomial and the Secret Key Used," Am. J. Comput. Sci. Eng. Surv., vol. 1, no. 5, pp. 24--27, 2013.
[5]
A. Kak, "AES: The Advanced Encryption Standard," Computer and Network Security, 2018. {Online}. Available: https://www.commonlounge.com/discussion/e32fdd267aaa4240a4464723bc74d0a5#disadvantages-of-aes. {Accessed: 05-Aug-2018}.
[6]
E. M. Mahmoud et al., "Dynamic AES-128 with Key-Dependent S-box," Int. J. Eng. Res. Appl., pp. 1662--1670, 2013.
[7]
Y. Wang, Q. Xie, Y. Wu, and B. Du, "A software for S-box performance analysis and test," Proc. - 2009 Int. Conf. Electron. Commer. Bus. Intell. ECBI 2009, pp. 125--128, 2009.
[8]
A. Singh, P. Agarwal, and M. Chand, "Analysis of Development of Dynamic S-Box Generation," Comput. Sci. Inf. Technol., vol. 5, no. 5, pp. 154--163, 2017.
[9]
S. Mister and C. Adams, "Practical S-box design," Work. Sel. Areas Cryptogr. SAC, pp. 1--17, 1996.
[10]
P. Rodwald and P. Mroczkowski, "How to create good s-boxes?," 1st Int. Conf. Young Res. Comput. Sci. Control. Electr. Eng. Telecommun. ICYR, 2006., no. October, 2018.
[11]
D. Lambić, "A novel method of S-box design based on chaotic map and composition method," Chaos, Solitons and Fractals, vol. 58, pp. 16--21, 2014.
[12]
Y. Wang, P. Lei, and K.-W. Wong, "A Method for Constructing Bijective S-Box with High Nonlinearity Based on Chaos and Optimization," Int. J. Bifurc. Chaos, vol. 25, no. 10, p. 1550127, 2015.
[13]
P. Mroczkowski, "Generating Pseudorandom S-Boxes - a Method of Improving the Security of Cryptosystems Based on Block Ciphers," J. Telecommun. Inf. Technol., vol. nr 2, pp. 74--79, 2009.
[14]
A. Rohiem, A. Diaa, and F. Mohammed, "Generation of AES Key Dependent S-Boxes using RC4 Algorithm," 13th Int. Conf. Aerosp. Sci. Aviat. Technol. ASAT- 13, pp. 1--9, 2012.
[15]
I. Hussain and T. Shah, "Literature survey on nonlinear components and chaotic nonlinear components of block ciphers," Nonlinear Dyn., vol. 74, no. 4, pp. 869--904, 2013.
[16]
Alamsyah, A. Bejo, and T. B. Adji, "AES S-box construction using different irreducible polynomial and constant 8-bit vector," 2017 IEEE Conf. Dependable Secur. Comput., pp. 366--369, 2017.
[17]
M. V. C. Suana, A. M. Sison, C. Aragon, and R. P. Medina, "Enhancement of Advanced Encryption Standard (AES) Cryptographic Strength via Generation of Cipher Key-Dependent S-Box," vol. 6, no. Iv, pp. 1420--1428, 2018.
[18]
N. Angraini, B. H. Susanti, and Magfirawaty, "Analysis of the Use of Whirlpool ' s S-box, S1 and S2 SEED ' s S- box in AES Algorithm with SAC Test," Inf. Syst. Int. Conf., no. December, pp. 700--705, 2013.
[19]
A. F. Webster and S. E. Tavares, "On the Design of S-Boxes," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 218 LNCS, pp. 523--534, 1986.
[20]
R. Guesmi, M. A. Ben Farah, A. Kachouri, and M. Samet, "Chaos-based designing of a highly nonlinear S-box using Boolean functions," 12th Int. Multi-Conference Syst. Signals Devices, SSD 2015, pp. 1--5, 2015.
[21]
S. Picek, L. Batina, and D. Jakobovi, "A Toolbox for S-box Analysis," pp. 140--149, 2014.

Cited By

View all

Index Terms

  1. Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      DSIT 2019: Proceedings of the 2019 2nd International Conference on Data Science and Information Technology
      July 2019
      280 pages
      ISBN:9781450371414
      DOI:10.1145/3352411
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      • The Hong Kong Polytechnic: The Hong Kong Polytechnic University
      • Natl University of Singapore: National University of Singapore

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 July 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. AES
      2. Advanced Encryption Standard
      3. BIC
      4. SAC
      5. balance
      6. bijective
      7. nonlinearity

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      DSIT 2019

      Acceptance Rates

      DSIT 2019 Paper Acceptance Rate 43 of 95 submissions, 45%;
      Overall Acceptance Rate 114 of 277 submissions, 41%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 74
        Total Downloads
      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 15 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media