Skip to main content
Top

2023 | OriginalPaper | Chapter

Enhancing S-Box Nonlinearity in AES for Improved Security Using Key-Dependent Dynamic S-Box

Authors : Prajwal Patil, Akash Karoshi, Abhinandan Marje, Veena Desai

Published in: Proceedings of Fourth International Conference on Communication, Computing and Electronics Systems

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Advanced Encryption Standard (AES) is the most widely used symmetric and secure encryption algorithm for commercial and research purposes. The core of AES is its substitution box (S-box), which primarily provides nonlinearity, confusion, and diffusion. The improvements to nonlinearity in S-box is one of the methods used by researchers to enhance security in AES. In this paper, to increase the nonlinearity of the S-box, AES using a key-dependent dynamic S-box is implemented and compared with the AES using a static S-box. The algorithm proposed in this paper draws observation from results of security parameters like hamming distance, strict avalanche criteria (SAC), and balanced output while comparing key-dependent S-box and static AES S-box. Among 40 experimental results, the key-dependent dynamic S-box performs 22.5% times better for hamming distance observation drawn is that the hamming distance is more in the dynamic AES than static AES. The average bit difference of 10 rounds of dynamic AES is around 65%, which is a good avalanche criterion.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Manjula G, Mohan HS (2016) Constructing key dependent dynamic S-Box for AES block cipher system. In: 2016 2nd International conference on applied and theoretical computing and communication technology (iCATccT). IEEE Manjula G, Mohan HS (2016) Constructing key dependent dynamic S-Box for AES block cipher system. In: 2016 2nd International conference on applied and theoretical computing and communication technology (iCATccT). IEEE
4.
go back to reference Nadaf R, Desai V (2012) Hardware implementation of modified AES with key dependent dynamic S-box. IEEE ICARET 576–580 Nadaf R, Desai V (2012) Hardware implementation of modified AES with key dependent dynamic S-box. IEEE ICARET 576–580
6.
go back to reference Joe CV, Raj JS (2021) Deniable authentication encryption for privacy protection using blockchain. J Artif Intell Capsule Netw 3(3):259–271 Joe CV, Raj JS (2021) Deniable authentication encryption for privacy protection using blockchain. J Artif Intell Capsule Netw 3(3):259–271
7.
go back to reference Nissar G, Garg DK, Khan BUI (2019) Implementation of security enhancement in AES by inducting dynamicity in AES s-box. Int J Innov Technol Explor Eng 8(10):1–9 Nissar G, Garg DK, Khan BUI (2019) Implementation of security enhancement in AES by inducting dynamicity in AES s-box. Int J Innov Technol Explor Eng 8(10):1–9
8.
go back to reference Forouzan BA, Mukhopadhyay D (2015) Cryptography and network security. Mc Graw Hill Education (India) Private Limited Forouzan BA, Mukhopadhyay D (2015) Cryptography and network security. Mc Graw Hill Education (India) Private Limited
9.
go back to reference Hosseinkhani R, Javadi HHS (2012) Using cipher key to generate dynamic S-box in AES cipher system. Int J Comput Sci Secur (IJCSS) 6(1):19–28 Hosseinkhani R, Javadi HHS (2012) Using cipher key to generate dynamic S-box in AES cipher system. Int J Comput Sci Secur (IJCSS) 6(1):19–28
10.
go back to reference Maram B, Gnanasekar JM (2018) A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-box and genetic operations. Int J Pure Appl Math 119(10):399–418 Maram B, Gnanasekar JM (2018) A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-box and genetic operations. Int J Pure Appl Math 119(10):399–418
11.
go back to reference Chatterjee R, Chakraborty R, Mondal JK (2019) Design of lightweight cryptographic model for end-to-end encryption in IoT domain. IRO J Sustain Wirel Syst 1(4):215–224 Chatterjee R, Chakraborty R, Mondal JK (2019) Design of lightweight cryptographic model for end-to-end encryption in IoT domain. IRO J Sustain Wirel Syst 1(4):215–224
12.
go back to reference Hussain S et al (2020) A power associative loop structure for the construction of non-linear components of block cipher. IEEE Access 8:123492–123506 Hussain S et al (2020) A power associative loop structure for the construction of non-linear components of block cipher. IEEE Access 8:123492–123506
13.
go back to reference Lo O, Buchanan WJ, Carson D (2017) Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). J Cyber Secur Technol 1(2):88–107CrossRef Lo O, Buchanan WJ, Carson D (2017) Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). J Cyber Secur Technol 1(2):88–107CrossRef
14.
go back to reference Ejaz A et al (2021) A secure key dependent dynamic substitution method for symmetric cryptosystems. PeerJ Comput Sci 7:e587 Ejaz A et al (2021) A secure key dependent dynamic substitution method for symmetric cryptosystems. PeerJ Comput Sci 7:e587
15.
go back to reference Mizuki T, Hayashi Y (2014) AES cipher keys suitable for efficient side-channel vulnerability evaluation. Cryptology ePrint Archive Mizuki T, Hayashi Y (2014) AES cipher keys suitable for efficient side-channel vulnerability evaluation. Cryptology ePrint Archive
16.
go back to reference Su N, Zhang Y, Li M (2019) Research on data encryption standard based on aes algorithm in internet of things environment. In: 2019 IEEE 3rd information technology, networking, electronic and automation control conference (ITNEC). IEEE Su N, Zhang Y, Li M (2019) Research on data encryption standard based on aes algorithm in internet of things environment. In: 2019 IEEE 3rd information technology, networking, electronic and automation control conference (ITNEC). IEEE
17.
go back to reference Yan J, Chen F (2016) An improved AES key expansion algorithm. In: International conference on electrical, mechanical and industrial engineering Yan J, Chen F (2016) An improved AES key expansion algorithm. In: International conference on electrical, mechanical and industrial engineering
Metadata
Title
Enhancing S-Box Nonlinearity in AES for Improved Security Using Key-Dependent Dynamic S-Box
Authors
Prajwal Patil
Akash Karoshi
Abhinandan Marje
Veena Desai
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-7753-4_8