Skip to main content
Erschienen in: Neural Computing and Applications 1/2012

01.08.2012 | Original Article

S8 affine-power-affine S-boxes and their applications

verfasst von: Iqtadar Hussain, Tariq Shah, Muhammad Asif Gondal, Hasan Mahmood

Erschienen in: Neural Computing and Applications | Sonderheft 1/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The encryption process relies on the use of nonlinear mapping subsystems to create confusion in the ciphertext. The design of these nonlinear components is a challenging task and requires complex algebraic expression for their descriptions. In an effort to increase the complexity of nonlinear mappings, several implementations exhibiting interesting properties are proposed in the literature. In particular, affine-power-affine structure is designed for advanced encryption standard, which improves the complexity of its algebraic expression by increasing the number of terms. Based on the characteristics of affine-power-affine structure, we propose a new nonlinear component that uses the symmetric group permutation S8 on the Galois field GF(28) elements and provides the possibility to incorporate 40320 unique instances. A rigorous analysis is presented to evaluate the properties of these new nonlinear components by applying nonlinearity analysis, linear approximation analysis, differential approximation analysis, bit independence criterion and strict avalanche criterion. In order to determine the suitability to various encryption applications, the S-boxes are tested with generalized majority logic criterion.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat National Institute of Standard and Technology (2001) Advanced Encryption Standard FIPS197 [S] November 26 National Institute of Standard and Technology (2001) Advanced Encryption Standard FIPS197 [S] November 26
2.
Zurück zum Zitat Ferguson N, Schroeppel R, Whiting D (2001) A simple algebraic representation of Rijndael. In: Selected Areas in Cryptography SAC01, NCS2259, pp 103–111 Ferguson N, Schroeppel R, Whiting D (2001) A simple algebraic representation of Rijndael. In: Selected Areas in Cryptography SAC01, NCS2259, pp 103–111
3.
Zurück zum Zitat Murphy S, Robshaw MJ (2002) Essential algebraic structure within the AES. In: Crypto’02, LNCS, vol 2442, pp 1–16 Murphy S, Robshaw MJ (2002) Essential algebraic structure within the AES. In: Crypto’02, LNCS, vol 2442, pp 1–16
4.
5.
Zurück zum Zitat Morioka S, Satoh A (2002) An optimized S-box circuit architecture for low power AES design. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES.02), LNCS 2523, pp 172–186 Morioka S, Satoh A (2002) An optimized S-box circuit architecture for low power AES design. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES.02), LNCS 2523, pp 172–186
6.
Zurück zum Zitat Mentens N, Batina L, Preneel B, Verbauwhede I (2005) A systematic evaluation of compact hardware implementations for the Rijndael S-box. In: Menezes A (ed) CT-RSA, LNCS, vol 3376. Springer-Verlag, New York, pp 323–333 Mentens N, Batina L, Preneel B, Verbauwhede I (2005) A systematic evaluation of compact hardware implementations for the Rijndael S-box. In: Menezes A (ed) CT-RSA, LNCS, vol 3376. Springer-Verlag, New York, pp 323–333
7.
Zurück zum Zitat Cui L, Cao Y (2007) A new S-box structure named affine-power-affine. Int J Innov Comput Inform Control 3(3):45–53 Cui L, Cao Y (2007) A new S-box structure named affine-power-affine. Int J Innov Comput Inform Control 3(3):45–53
8.
Zurück zum Zitat Tran MT, Bui DK, Doung AD (2008) Gray S-box for advanced encryption standard. Int Conf Comput Intell Security 1:253–256CrossRef Tran MT, Bui DK, Doung AD (2008) Gray S-box for advanced encryption standard. Int Conf Comput Intell Security 1:253–256CrossRef
9.
Zurück zum Zitat Hussain I, Shah T, Mahmood H (2010) A new algorithm to construct secure keys for AES. Int J Contemp Math Sci 5(26):1263–1270MathSciNetMATH Hussain I, Shah T, Mahmood H (2010) A new algorithm to construct secure keys for AES. Int J Contemp Math Sci 5(26):1263–1270MathSciNetMATH
10.
Zurück zum Zitat Liu J, Wai B, Cheng X, Wang X (2005) An AES S-box to increase complexity and cryptographic analysis. In: Proceedings of the 19th international conference on advanced information networking and applications (AI-NA.05), vol 1, pp 724–728 Liu J, Wai B, Cheng X, Wang X (2005) An AES S-box to increase complexity and cryptographic analysis. In: Proceedings of the 19th international conference on advanced information networking and applications (AI-NA.05), vol 1, pp 724–728
11.
Zurück zum Zitat Shah T, Hussain I, Gondal MA, Mahmood H (2011) Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int J Phys Sci 6(16):4110–4127 Shah T, Hussain I, Gondal MA, Mahmood H (2011) Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int J Phys Sci 6(16):4110–4127
12.
Zurück zum Zitat Hussain I, Shah T, Gondal MA, Mahmood H (2012) Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z Naturforsch 67a(5):282–288CrossRef Hussain I, Shah T, Gondal MA, Mahmood H (2012) Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z Naturforsch 67a(5):282–288CrossRef
13.
Zurück zum Zitat Ahmed W, Mahmood H, Siddique U (2011) The efficient implementation of S8 AES algorithm. Lect Notes Eng Comput Sci 2191(1):1215–1219 Ahmed W, Mahmood H, Siddique U (2011) The efficient implementation of S8 AES algorithm. Lect Notes Eng Comput Sci 2191(1):1215–1219
Metadaten
Titel
S8 affine-power-affine S-boxes and their applications
verfasst von
Iqtadar Hussain
Tariq Shah
Muhammad Asif Gondal
Hasan Mahmood
Publikationsdatum
01.08.2012
Verlag
Springer-Verlag
Erschienen in
Neural Computing and Applications / Ausgabe Sonderheft 1/2012
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-012-1036-9

Weitere Artikel der Sonderheft 1/2012

Neural Computing and Applications 1/2012 Zur Ausgabe

Original Article

Roughness in hemirings

Premium Partner