2012
DOI: 10.7763/ijcte.2012.v4.442
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach for Designing Key-Dependent S-Box Defined over GF (24) in AES

Abstract: Abstract-In this paper a new approach for designing S-box in Advanced Encryption Standard (AES) is proposed. The proposed S-box is constructed from small S-boxes defined over GF (2 4 ) instead of GF (2 8 ) as in traditional AES. Rijndael Algorithm (RA), as one of AES standards, is modified by applying the new approach. The Modified Rijndael Algorithm (MRA) is constructed by replacing the S-box of RA by small S-boxes, and the key expansion procedure of RA is modified consequently. Each one of the small S-boxes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 7 publications
(8 reference statements)
0
5
0
Order By: Relevance
“…A fast permutation algorithm to generate key-dependent -box and key-dependent -Box has been discussed in [14] to protect its internal structure so as to resist the linear and differential cryptanalysis in a few round encryptions. In [15], the modified Rijndael algorithm that constructs the -boxes defined over GF (2 4 ) has been discussed. Each one of the small -boxes has different equation and each equation is extracted by using one of the three irreducible polynomials existing in GF (2 4 ).…”
Section: Substitution and Permutation Related Workmentioning
confidence: 99%
“…A fast permutation algorithm to generate key-dependent -box and key-dependent -Box has been discussed in [14] to protect its internal structure so as to resist the linear and differential cryptanalysis in a few round encryptions. In [15], the modified Rijndael algorithm that constructs the -boxes defined over GF (2 4 ) has been discussed. Each one of the small -boxes has different equation and each equation is extracted by using one of the three irreducible polynomials existing in GF (2 4 ).…”
Section: Substitution and Permutation Related Workmentioning
confidence: 99%
“…Reference [34] discusses the properties of affine equivalence in AES. Literature to date on lightweight cipher algorithm implementations has concentrated on the gate equivalents in ASIC implementations and RAM-based Field Programmable Gate Array (FPGA) implementations [35][36][37][38][39]. A Boolean S-box using the Karnaugh map and the factorization technique has been designed to achieve a maximum throughput of 51.32 Mbps for the PRESENT cipher architecture for an 8-bit data path [40].…”
Section: Introductionmentioning
confidence: 99%
“…The paper of Juremi et al (2012) presents a new AES-like design for key-dependent AES using the S-box rotation method. An approach for designing a key-dependent S-box defined over GF(2 4 ) in AES is presented in El-Sheikh et al (2012). A key-dependent S-box of AES algorithm using a variable mapping technique is analyzed in Mohammad et al (2009).…”
Section: Introductionmentioning
confidence: 99%