Generation of AES like S-boxes by Replacing Affine Matrix

被引:5
|
作者
Waqas, Umer [1 ]
Afzal, Shazia [1 ]
Mir, Mubeen Akhtar [2 ]
Yousaf, Muhammad [1 ]
机构
[1] Riphah Int Univ, RISE, Islamabad, Pakistan
[2] PIEAS Univ, Islamabad, Pakistan
关键词
AES; Affine Transformation; BIC; Non-linearity; SAC;
D O I
10.1109/FIT.2014.38
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
AES type S-boxes are constructed by replacing the affine matrix of AES S-box equation with 8x8 invertible affine matrices. The 8x8 S-boxes of AES produced in GF(2(8)) are a nonlinear transformation that have significant effect on the strength of entire system. In this paper, 46 AES like S-boxes are generated by replacing the affine matrix and only 10 randomly selected S-boxes are included. The cryptographic properties of 10 AES like S-boxes are analyzed. The S-box must satisfy these properties in order to yield a secure and reliable cipher. These include: Avalanche, Strict Avalanche, Bit Independence criteria and Nonlinearity measurement. The experimental results indicate that most of the generated S-boxes mimic the AES original S-box with respect to these properties and some of them are stronger than AES S-box.
引用
收藏
页码:159 / 164
页数:6
相关论文
共 50 条
  • [31] PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes
    Bao, Zhenzhen
    Guo, Jian
    Ling, San
    Sasaki, Yu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (01) : 330 - 394
  • [32] Random S-Boxes Generation Methods for Symmetric Cryptography
    Gorbenko, Ivan
    Kuznetsov, Alexandr
    Gorbenko, Yurii
    Pushkar'ov, Andriy
    Kotukh, Yevgen
    Kuznetsova, Kateryna
    2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019), 2019, : 947 - 950
  • [33] Optimizing Hill Climbing Algorithm for S-Boxes Generation
    Kuznetsov, Alexandr
    Frontoni, Emanuele
    Romeo, Luca
    Poluyanenko, Nikolay
    Kandiy, Sergey
    Kuznetsova, Kateryna
    Benova, Eleonora
    ELECTRONICS, 2023, 12 (10)
  • [34] ON THE DESIGN OF S-BOXES
    WEBSTER, AF
    TAVARES, SE
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 523 - 534
  • [35] DEGENERATE S-BOXES
    Lisickiy, K. E.
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2018, (01) : 129 - 138
  • [36] Nonlinearities of S-boxes
    Carlet, Claude
    Ding, Cunsheng
    FINITE FIELDS AND THEIR APPLICATIONS, 2007, 13 (01) : 121 - 135
  • [37] A Systematic Performance Comparison of Ultra Low-Power AES S-Boxes
    Vandenabeele, Thomas
    Uytterhoeven, Roel
    Dehaene, Wim
    Mentens, Nele
    2018 28TH INTERNATIONAL SYMPOSIUM ON POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION (PATMOS), 2018, : 248 - 253
  • [38] AES immunity Enhancement against algebraic attacks by using dynamic S-Boxes
    Janadi, Aida
    Tarah, D. Anas
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2621 - +
  • [39] Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog
    Perrin, Leo
    Udovenko, Aleksei
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) : 99 - 124
  • [40] Method for constructing key-dependent S-boxes based on affine transformation
    Ao, Tianyong
    He, Zhangqing
    Dai, Kui
    Zou, Xuecheng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2015, 43 (08): : 39 - 42