Skip to main content

2016 | OriginalPaper | Buchkapitel

High-Security Pipelined Elastic Substitution Box with Embedded Permutation Facility

verfasst von : K. B. Jithendra, T. K. Shahana

Erschienen in: Innovations in Computer Science and Engineering

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In today’s world a major percentage of information and resource sharing is carried out through electronic means. A good portion of the above said activities needs security essentially. Since all the resources for any technology is provided by the nature, directly or indirectly, it is the moral responsibility entrusted with researchers to bring out maximum efficiency with minimal resources. In this paper a novel method is proposed in which Substitution Box is operated in a pipelined fashion, which can optimize hardware complexity and speed of the Block Ciphers. Facility for key-based permutation of message bits is integrated with the design, which offers additional security. The complexity and security analysis is also done.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat C. Shannon, Communication theory of secrecy systems, Bell Systems Technical Journal, vol. 28, 1949. C. Shannon, Communication theory of secrecy systems, Bell Systems Technical Journal, vol. 28, 1949.
2.
Zurück zum Zitat C Adams and S Tavares, The structured design of good S Boxes, Journal of Cryptology, 3(1):27–41,1990. C Adams and S Tavares, The structured design of good S Boxes, Journal of Cryptology, 3(1):27–41,1990.
3.
Zurück zum Zitat J.Cobas and J.Brugos. Complexity theoretical approaches to the design and analysis of cryptographical Boolean functions In Computer Aided Systems Theory-EUROCAST 2005, LNCS. Springer-Verlag, Berlin, Germany, 2005. J.Cobas and J.Brugos. Complexity theoretical approaches to the design and analysis of cryptographical Boolean functions In Computer Aided Systems Theory-EUROCAST 2005, LNCS. Springer-Verlag, Berlin, Germany, 2005.
4.
Zurück zum Zitat A. Webster, S. Tavares, On the Design of S Boxes, Advances in Cryptology-CRYPT0 1985, LNCS 218, Springer-Verlag, 1985. A. Webster, S. Tavares, On the Design of S Boxes, Advances in Cryptology-CRYPT0 1985, LNCS 218, Springer-Verlag, 1985.
5.
Zurück zum Zitat M. Dawson, S. Tavares, An Expanded Set of S Box Design Criteria Based on Information Theory and its Relation to Differential-like Attacks, Advances in Cryptology—EUROCRYPT 1991, LNCS 547, Springer-Verlag 1991. M. Dawson, S. Tavares, An Expanded Set of S Box Design Criteria Based on Information Theory and its Relation to Differential-like Attacks, Advances in Cryptology—EUROCRYPT 1991, LNCS 547, Springer-Verlag 1991.
6.
Zurück zum Zitat M Sivabalan, S. Tavares, L. Peppard, On the design of SP networks from an information theoretic point of view, Advances in Cryptology—CRYPTO 1992, LNCS 740, Springer Verlag 1993. M Sivabalan, S. Tavares, L. Peppard, On the design of SP networks from an information theoretic point of view, Advances in Cryptology—CRYPTO 1992, LNCS 740, Springer Verlag 1993.
7.
Zurück zum Zitat Kai Hwang and Faye A. Briggs, Computer Architecture and Parallel processing, Tata McGraw-Hill, New Delhi 2012. Kai Hwang and Faye A. Briggs, Computer Architecture and Parallel processing, Tata McGraw-Hill, New Delhi 2012.
8.
Zurück zum Zitat W. Stallings, Cryptography and Network Security, Principles and Practices, Prentice Hall, 2006. W. Stallings, Cryptography and Network Security, Principles and Practices, Prentice Hall, 2006.
9.
Zurück zum Zitat Jithendra K.B, Shahana T.K, High Security Elastic Serial Substitution Box for Block Ci-phers, Proceedings of Second International Conference on Networking, Information and Communication (ICNIC), Bangalore 2015. Jithendra K.B, Shahana T.K, High Security Elastic Serial Substitution Box for Block Ci-phers, Proceedings of Second International Conference on Networking, Information and Communication (ICNIC), Bangalore 2015.
10.
Zurück zum Zitat C K Shyamala, N Harini, T R Padmanabhan, Cryptography and Security, Wiley India Pvt ltd, New Delhi, 2011. C K Shyamala, N Harini, T R Padmanabhan, Cryptography and Security, Wiley India Pvt ltd, New Delhi, 2011.
Metadaten
Titel
High-Security Pipelined Elastic Substitution Box with Embedded Permutation Facility
verfasst von
K. B. Jithendra
T. K. Shahana
Copyright-Jahr
2016
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-0419-3_10

Neuer Inhalt