A Novel Method to Design S-Boxes Based on Key-Dependent Permutation Schemes and its Quality Analysis
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 4
Abstract
S-boxes are used in block ciphers as the important nonlinear components. The nonlinearity provides important protection against linear and differential cryptanalysis. The S-boxes used in encryption process could be chosen to be key-dependent. In this paper, we have presented four simple algorithms for generation key-dependent S-boxes. For quality analysis of the key-dependent S-boxes, we have proposed eight distance metrics. We have assumed the Matlab function “randperm” as standard of permutation and compared it with permutation possibilities of the proposed algorithms. In the second section we describe four algorithms, which generate key-dependent S-boxes. In the third section we analyze eight normalized distance metrics which we have used for evaluation of the quality of the key-dependent generation algorithms. Afterwards, we experimentally investigate the quality of the generated key-dependent S-boxes. Comparison results show that the key-dependent S-boxes have good quality and may be applied in cipher systems.
Authors and Affiliations
Kazys Kazlauskas, Robertas Smaliukas, Gytis Vaicekauskas
Mobile Phone Operations using Human Eyes Only and its Applications
Mobile phone operations using human eyes only is proposed together with its applications for cooking with referring to recipes and manufacturing with referring to manuals, production procedure, so on. It is found that mo...
Retrieval of Images Using DCT and DCT Wavelet Over Image Blocks
This paper introduces a new CBIR system based on two different approaches in order to achieve the retrieval efficiency and accuracy. Color and texture information is extracted and used in this work to form the feature ve...
Proposal and Implementation of MPLS Fuzzy Traffic Monitor
Multiprotocol Label Switched Networks need highly intelligent controls to manage high volume traffic due to issues of traffic congestion and best path selection. The work demonstrated in this paper shows results from sim...
Analysis of IPv4 vs IPv6 Traffic in US
It is still an accepted assumption that internet traffic is dominated by IPv4. However, due to introduction of modern technologies and concepts like Internet of Things (IoT) IPv6 has become the essential element. So keep...
Contribution to the Development of A Dynamic Circulation Map using the Multi-Agent Approach
Road traffic is considered one of the most difficult domains to manage and one of the fast- growing networks. This environment is geographically distributed and its actors are in continuous interaction in order to be abl...