Modified AES Algorithm Using Multiple S-Boxes (original) (raw)

Efficient Implementation of Aes By Modifying S-Box

2013

Security of data and messagesare an imperative issue because of fast evolution of digital data exchanges over unsecured network. Data security is achieved by methods of cryptography, which deals with encryption of data. Standard symmetric encryption algorithms provide better security for the multimedia data. In the existing AES algorithm we are modifying S-Box based on the some of the reference papers which we have gone through. After implementing modification the output is compared to original output, in terms of timing analysis, Hamming distance, Balanced output and Aavalanche effect and so on. Hence the efficiency of modified AES is verified after the comparison.

3 25430 NUR HAFIZA ZAKARIA Enhancing Advanced Encryption Standard (AES) S-Box Generation using Affine Transformation

The development of technology has resulted in a number of new suggestions done on block ciphers. Although there have been so much evolvement of the block cipher, the industry still needs another block cipher as long as the cipher is secured and met all the security requirements. One of the critical parts is, secured communication which assists to protect the confidentiality and integrity of the data. Secured communication can be attained by encrypting the data. In this research, we proposed to enhance Advanced Encryption Standard (AES) S-Box generation using affine transformation approach which shall meet the security requirements. AES is one of the best cryptographic algorithms that can be used to protect electronic information. Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts. In this research, we are trying to remove the weaknesses of AES by changing the S-Box and adding one new function which are inspired from crossover and mutation process. This improvement will satisfy the security of AES.

Encryption using Dual Key Transformation based on Creation of Multi S- Boxes in AES Algorithm

International Journal of Computer Applications, 2013

The Advanced Encryption Standard (AES) is using in a large scale of applications that need to protect their data and information. A nonlinear substitution operation is the main factor of the AES cipher system strength. The S-Box component that used in AES is fixed, and not changeable. The purpose of the proposed approach is to use dual keys in encryption and decryption processes in SubByte transformation function. The first key generate multi random S-boxes depend on using multi keys that led to generate Sboxes provided that each one has its inverse associated with it, the second key is a random distribution of the S-boxes, the dual keys lead in increasing the complexity degree within the same delay time during the encryption and decryption processes in SubByte function. The results show that the present proposed algorithm has good cryptographic strength, with the added benefit that is resistant to linear and differential cryptanalysis, which require that the S-boxes be known beside the encryption key.

ENHANCING ADVANCED ENCRYPTION STANDARD (AES) S-BOX GENERATION USING AFFINE TRANSFORMATION

The development of technology has resulted in a number of new suggestions done on block ciphers. Although there have been so much evolvement of the block cipher, the industry still needs another block cipher as long as the cipher is secured and met all the security requirements. One of the critical parts is, secured communication which assists to protect the confidentiality and integrity of the data. Secured communication can be attained by encrypting the data. In this research, we proposed to enhance Advanced Encryption Standard (AES) S-Box generation using affine transformation approach which shall meet the security requirements. AES is one of the best cryptographic algorithms that can be used to protect electronic information. Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts. In this research, we are trying to remove the weaknesses of AES by changing the S-Box and adding one new function which are inspired from crossover and mutation process. This improvement will satisfy the security of AES.

Analysis of the Use of Whirlpool’s S-box, S1 and S2 SEED’s S-box in AES Algorithm with SAC Test

2013

Since 2001, Advanced Encryption Standard (AES) block cipher has become a standard algorithm and widely used in cryptographic applications. The heart of AES is a nonlinear substitution box (S-box) that generated using Affine transformation. In this paper, we change the original S-box with Whirlpool’s S-box, S1 and S2 Seed’s S-box. After that, we analyze the effect of their usage in AES and compared them to the original. We decide to use these S-boxes due to the similarity dimension with AES’s S-box. The cryptographic properties such as strict avalanche criterion (SAC), bit independence criterion (BIC), XOR table distribution and nonlinearity of theseS-boxes are analyzed in details. According to our experiments, S1 and S2 Seed’s S-box have an error value close to AES’s S-box error value for all tests but not so with Whirlpool’s S-box. We also test the original and modified AES using SAC. The test results showed that they satisfy SAC.

Modified AES S-Box Based on Determinant Matrix Algorithm

International Journal of Advanced Research in Computer Science and Software Engineering, 2017

There are many researches in designing and enhancing Rijndael, since it has been chosen as AES. The Sbox is the only nonlinear part in the symmetric encryption algorithms and it defines the performance of AES. In this paper, we propose a new stage named as DeterminantRotation (DR) in modifying and generates different S-box for each round by implementing determinant matrix calculation in rotating the position of AES S-box to be used in the SubBytes transformation. The randomness test and the avalanche test were performed on the output produced in order to prove the security of the new proposed algorithm. The result of the tests shows that the proposed algorithm in the new extra stage has good randomness as well as proven to be secured.

Implementation of Stronger S-Box for Advanced Encryption Standard

vlsi&es),mallineni lakshmaiah engineering college,andhra pradesh,india 2 assistant professor,Mtech(vlsi&es),mallineni lakshmaiah engineering college,andhra pradesh,india ---------------------------------------------------ABSTRACT-------------------------------------------------------Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. The main core of AES block cipher is the substitution table or SBox. This S-box is used to provide confusion capability for AES. In addition, to strengthen the S-Box against algebraic attacks, the affine transformation is used. The requirements of information security within an organization have undergone several changes in the last few decades. With the fast evolution of digital data exchange, security of information becomes much important in data storage and transmission. The proposed paper

Considerations About the Possibilities to Improve Aes S-Box Cryptographic Properties by Multiplication

2015

The algorithm Rijndael was tested and chosen as the Advanced Encryption Standard (AES) in 2001, at the end of a security evaluation that lasted for years. Testing and evaluation process proved the algorithm’s strength and efficiency. The algorithm AES is a block cipher with a SPN (Substitution Permutation Network) structure. The cornerstone of the algorithm’s security is the substitution box (S-box) and its strength relies on its special algebraic construction which uses mixed operation in different order Galois Fields (base field and extended field). This paper is a study on the possibilities to improve some cryptographic properties of Rijndael Substitution box and the effect of these changes.

Design of Low Power and Secure Implementation of SBOX for AES

Nowadays most of the communication is done by using digital communication systems. Therefore a Data protection plays an important role in the communication engineering. So, there arises a need to secure data from hackers. Hence the concept of Cryptography came in light. Earlier Data Encryption Standard (DES) was in trend but in that there were several shortcomings like the size of digital key was small and in this way it was sensible to external attacks moreover it was not able to present features that would held good for high level security system. New algorithm Advanced Encryption Standard (AES) removes loopholes.In AES Encryption algorithm Sub Bytes transformation utilizes S-Box. The subordinate Bytes replacement could be a nonlinear Byte replacement that utilizes substitution table (i.e. S-Box) takes the multiplicative inverse (GF (2 8)) and implies an affine transform to do the Sub Bytes transformation. In this research work I explored substitution table, multiplicative inverse and affine transform mathematics in Galois field; besides I recommended an encryption table to further encode the yield information.

SECURITY ANALYSIS OF AES AND ENHANCING ITS SECURITY BY MODIFYING S-BOX WITH AN ADDITIONAL BYTE

Secured and opportune transmission of data alwaysis a significant feature for any organization. Robust encryption techniques and algorithms always facilitate in augmenting secrecy, authentication and reliability of data. At present, Advanced Encryption Standard (AES) patronized by NIST is the most secure algorithm for escalating the confidentiality of data. This paper mainly focuses on an inclusive analysis related to the security of existing AES algorithm and aim to enhance the level security of this algorithm. Through some modification of existing AES algorithm by XORing an additional byte with s-box value, we have successfully increased the Time Security and Strict Avalanche Criterion. We have used random additional key for increasing security. Since this key is random, result of security measurement sometimes fluctuates.