2014 12th International Conference on Frontiers of Information Technology 2014
DOI: 10.1109/fit.2014.38
|View full text |Cite
|
Sign up to set email alerts
|

Generation of AES-Like S-Boxes by Replacing Affine Matrix

Abstract: AES type S-boxes are constructed by replacing the affine matrix of AES S-box equation with 8x8 invertible affine matrices. The 8x8 S-boxes of AES produced in GF(2 8 ) are a nonlinear transformation that have significant effect on the strength of entire system. In this paper, 46 AES like S-boxes are generated by replacing the affine matrix and only 10 randomly selected Sboxes are included. The cryptographic properties of 10 AES like S-boxes are analyzed. The S-box must satisfy these properties in order to yield… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 7 publications
0
5
0
1
Order By: Relevance
“…In the current era of modern block ciphers, breaking the cipher is relatively harder and required lots of resources and time, so attackers are more interested in finding the secret key by other means, for example, brute force attacks, dictionary attacks, and deriving key bits of subkeys. us secure KSA is necessary for any block cipher and it directly affects the security of block cipher [8,24]. A KSA must possess strong confusion and diffusion properties and all generated subkeys must be independent of each other so that any compromised subkey does not reveal any information about other subkeys or secret keys.…”
Section: Key Schedule Evaluation Criterionmentioning
confidence: 99%
“…In the current era of modern block ciphers, breaking the cipher is relatively harder and required lots of resources and time, so attackers are more interested in finding the secret key by other means, for example, brute force attacks, dictionary attacks, and deriving key bits of subkeys. us secure KSA is necessary for any block cipher and it directly affects the security of block cipher [8,24]. A KSA must possess strong confusion and diffusion properties and all generated subkeys must be independent of each other so that any compromised subkey does not reveal any information about other subkeys or secret keys.…”
Section: Key Schedule Evaluation Criterionmentioning
confidence: 99%
“…In Waqas et al (2015), altered the affine matrix for creation of 46 S-boxes. From a list of 255 affine matrices, 190 matrices were invertible.…”
Section: Related Work Existing Substitution Methodsmentioning
confidence: 99%
“…The expression of the affine transformation defined on GF(2) is y = Ax+b, where A is the 8 ´8 invertible matrix and b is a constant of 8 bits. A 1 , A 2 and A 3 are relatively good affine matrices [36,37], and their corresponding affine transformations are equations (9)- (11), respectively. Assuming that A is taken as A 1 and b is taken as 45, the corresponding affine transformations are equation (12).…”
Section: Dynamic High-performance S-boxmentioning
confidence: 99%