2022
DOI: 10.1016/j.jisa.2022.103135
|View full text |Cite
|
Sign up to set email alerts
|

A new S-box construction method meeting strict avalanche criterion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…After testing the independence of the round key, we also need to test the sensitivity of the key expansion algorithm to the initial key, which manifests as a strict avalanche effect. A strict avalanche effect means that any bit of the initial key is reversed, with a 50% probability for every bit of the round key [28]. We reverse the 1 bit of the initial key in Table 2, apply the key expansion algorithm to obtain 10 round keys, and for each round, calculate the Hamming distance between the corresponding round keys, and the results are shown in Table 3.…”
Section: Strict Avalanche Criterionmentioning
confidence: 99%
“…After testing the independence of the round key, we also need to test the sensitivity of the key expansion algorithm to the initial key, which manifests as a strict avalanche effect. A strict avalanche effect means that any bit of the initial key is reversed, with a 50% probability for every bit of the round key [28]. We reverse the 1 bit of the initial key in Table 2, apply the key expansion algorithm to obtain 10 round keys, and for each round, calculate the Hamming distance between the corresponding round keys, and the results are shown in Table 3.…”
Section: Strict Avalanche Criterionmentioning
confidence: 99%
“…When the Avalanche Eect is considered, an algorithm may have signicant encryption strength but still be vulnerable to attack if intruders identify weak components. The Strict Avalanche Criterion (SAC) is also calculated using the Avalanche Eect [54]. SAC is passed if the encryption strength from the Avalanche Eect is between 45% and 55%; otherwise, the algorithm fails the SAC criterion [54].…”
Section: A Why Des?mentioning
confidence: 99%
“…The Strict Avalanche Criterion (SAC) is also calculated using the Avalanche Eect [54]. SAC is passed if the encryption strength from the Avalanche Eect is between 45% and 55%; otherwise, the algorithm fails the SAC criterion [54].…”
Section: A Why Des?mentioning
confidence: 99%
“…In the literature review, it is seen that the current cryptosystem design studies, in which confusion/diffusion and SAC tests are carried out, perform their tests without certain statistical proofs and hypothesis form. Another notable feature is the term confusion/diffusion that is mostly used for hash functions [6][7][8][9], and the term SAC that is mostly used for s-box designs [10][11][12][13]. There are many test methods in the literature that provide randomness analysis on bit values and sequences, but they are not current studies.…”
Section: Literaturementioning
confidence: 99%
“…It is not possible to include all these studies in this article, but the case studies are given in the range of Ref. [6][7][8][9][10][11][12][13]. These studies did not focus on how close an 𝑛𝑛-bit output is to a change in the ratio of 1/2, its statistical significance and acceptability.…”
Section: Introductionmentioning
confidence: 99%