The S-box or substitution table used to provide non-linearity to encrypting algorithm. There are two types of S-box design such as Static S-box and Dynamic S-box. This paper reviews and analyses the efficiency of Dynamic S-box over Static S-box. This proposed approach has two fold, first fold is to design a Dynamic S-box based on the one-dimensional chaotic map (logistic and PWLCM) and compare to the classical S-box in terms of on confusion. Second fold is to calculate the one-dimensional map equation to construct Dynamic S-box. Finally analyse the properties of S-box on the constructed key-dependent Dynamic S-box.
S-box, Chaos equation, security analysis, static, dynamic
 Przemysław Rodwald and Piotr Mroczkowski, “How to create good sboxes?,” Mobile Robots, ICYR, September 2006.
 Yuanqing Deng Hui Shi Jing Gong Tao Xie, “Research on the Avalanche Property of the Camellia S-box”, IEEE 1996, Workshop Record, 1996.
 Yanjun Li,Wenling Wu, Lei Zhang, and Liting Zhang, “ Integral Attacks on Feistel-SP Structure Block Cipher”,The authors - Published by Atlantis Press, 2013.
 Bart Preneel, “Design principles for dedicated hash functions”, springer 1994.
 J.Kam,G. Davida, “Structured Design of Substitution Permutation Encryption Networks”, IEEE Transactions on Computers, Vol 28, No. 10, 747, 1979.
 Fauzan Mirza, “Linear and S-box pairs cryptanalysis of the Data Encryption Standard”, Department of Computer Science Egham, Surrey TW20 0EX, England.
 S. Mister, C. Adams, “Practical S-box design”, Workshop on Selected Areas in Cryptography, SAC 1996, Workshop Record, 1996.
 Behnam Rahnama, Yunus Kıran, Raz Dara, “Countering AES Static SBox Attack” ACM 2013.
 Razi Hosseinkhani, H. Haj Seyyed Javadi, “Using Cipher Key to Generate Dynamic S-Box in AES Cipher System”, IJCSS, Volume (6): Issue (1):2012
Evilcry, “Blowfish Study n’ Reverse”, RET ,22 July 2006.
 Sean Murphy1, M.J.B. Robshaw, “Differential Cryptanalysis, Keydependent S-boxes, and Twofish”, NIST, 15 May 2000.
Ghada Zaibi, Abdennaceur Kachouri, “On Dynamic chaotic S-BOX”, IEEE , 2009.
 ZHAO Xin-jie, WANG Tao, ZHENG Yuan-yuan, “Cache Timing Attacks on Camellia Block Cipher”, IARC, 2009.
 Kazumaro, Tetsuya, Masayuki, Mitsuru, Shiho, Junjo, Toshio, “Specification of Camellia – a 128-bit Block”, NTTC, MEC, July 12 2000.
 ZHAO Xin-jie, WANG Tao, “An Improved Differential Fault Attack on Camellia”, IARC, 2009.
 Burkhard, Walt, "AVL Dictionary Data Type Implementation", Advanced Data Structures. La Jolla: A.S. Soft Reserves, UC San Diego. p. 103, Spring 2012.
Cite this paper
Shishir Katiyar, N. Jeyanthi. (2016) Pure Dynamic S-box Construction. International Journal of Computers, 1, 42-46