oalogo2  

AUTHOR(S):

Shishir Katiyar, N. Jeyanthi

 

TITLE

Pure Dynamic S-box Construction

pdf PDF

ABSTRACT

The S-box or substitution table used to provide non-linearity to encrypting algorithm. There are two types of S-box design such as Static S-box and Dynamic S-box. This paper reviews and analyses the efficiency of Dynamic S-box over Static S-box. This proposed approach has two fold, first fold is to design a Dynamic S-box based on the one-dimensional chaotic map (logistic and PWLCM) and compare to the classical S-box in terms of on confusion. Second fold is to calculate the one-dimensional map equation to construct Dynamic S-box. Finally analyse the properties of S-box on the constructed key-dependent Dynamic S-box.

KEYWORDS

S-box, Chaos equation, security analysis, static, dynamic

REFERENCES 

[1] Przemysław Rodwald and Piotr Mroczkowski, “How to create good sboxes?,” Mobile Robots, ICYR, September 2006.

[2] Yuanqing Deng Hui Shi Jing Gong Tao Xie, “Research on the Avalanche Property of the Camellia S-box”, IEEE 1996, Workshop Record, 1996.

[3] Yanjun Li,Wenling Wu, Lei Zhang, and Liting Zhang, “ Integral Attacks on Feistel-SP Structure Block Cipher”,The authors - Published by Atlantis Press, 2013.

[4] Bart Preneel, “Design principles for dedicated hash functions”, springer 1994.

[5] J.Kam,G. Davida, “Structured Design of Substitution Permutation Encryption Networks”, IEEE Transactions on Computers, Vol 28, No. 10, 747, 1979.

[6] Fauzan Mirza, “Linear and S-box pairs cryptanalysis of the Data Encryption Standard”, Department of Computer Science Egham, Surrey TW20 0EX, England.

[7] S. Mister, C. Adams, “Practical S-box design”, Workshop on Selected Areas in Cryptography, SAC 1996, Workshop Record, 1996.

[8] Behnam Rahnama, Yunus Kıran, Raz Dara, “Countering AES Static SBox Attack” ACM 2013.

[9] Razi Hosseinkhani, H. Haj Seyyed Javadi, “Using Cipher Key to Generate Dynamic S-Box in AES Cipher System”, IJCSS, Volume (6): Issue (1):2012

[10]Evilcry, “Blowfish Study n’ Reverse”, RET ,22 July 2006.

[11] Sean Murphy1, M.J.B. Robshaw, “Differential Cryptanalysis, Keydependent S-boxes, and Twofish”, NIST, 15 May 2000.

[12]Ghada Zaibi, Abdennaceur Kachouri, “On Dynamic chaotic S-BOX”, IEEE , 2009.

[13] ZHAO Xin-jie, WANG Tao, ZHENG Yuan-yuan, “Cache Timing Attacks on Camellia Block Cipher”, IARC, 2009.

[14] Kazumaro, Tetsuya, Masayuki, Mitsuru, Shiho, Junjo, Toshio, “Specification of Camellia – a 128-bit Block”, NTTC, MEC, July 12 2000.

[15] ZHAO Xin-jie, WANG Tao, “An Improved Differential Fault Attack on Camellia”, IARC, 2009.

[16] Burkhard, Walt, "AVL Dictionary Data Type Implementation", Advanced Data Structures. La Jolla: A.S. Soft Reserves, UC San Diego. p. 103, Spring 2012.

Cite this paper

Shishir Katiyar, N. Jeyanthi. (2016) Pure Dynamic S-box Construction. International Journal of Computers, 1, 42-46