Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards

On today's world where data and information is available on almost everywhere, the security of these data and information are being attacked every day. Security enhancements are being done in order to make it more secure. One of the cryptographic techniques that is being used to secure data is the Advanced Encryption Standards (AES) and one of its primary components is the Substitution box (S-box). It is the only nonlinear part of AES thus it is prone to attacks. The paper produced a modified S-box with the combination of the original S-box and the S-box produced using the Logistic Map. Adjustments were made to meet the bijective property of an S-box. It was then evaluated using balance, bijective property, nonlinearity, bit independence criterion and strict avalanche criterion. The results have met the bijective and balance property of AES with the adjustment discussed. Its nonlinearity was tested using S-box Evaluation Tool (SET) and achieved a result of 94. Its Strict Avalanche Criterion (SAC) scored 0.5234375, and Bit Independence Criterion (BIC) has -0.0275 result. As a recommendation, this S-box can undergo cryptanalysis attacks to find its weakness further.

[1]  Tariq Shah,et al.  Literature survey on nonlinear components and chaotic nonlinear components of block ciphers , 2013, Nonlinear Dynamics.

[2]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[3]  Rajesh Kumar Goutam Importance of Cyber Security , 2015 .

[4]  Abdennaceur Kachouri,et al.  Chaos-based designing of a highly nonlinear S-box using Boolean functions , 2015, 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15).

[5]  Marione Ver C. Suana Enhancement of Advanced Encryption Standard (AES) Cryptographic Strength via Generation of Cipher Key-Dependent S-Box , 2018 .

[6]  Joan Daemen,et al.  AES - The Advanced Encryption Standard , 2002 .

[7]  Amandeep Singh,et al.  Analysis of Development of Dynamic S-Box Generation , 2017 .

[8]  Serge Mister,et al.  Practical S-Box Design , 1996 .

[9]  Yong Wang,et al.  A Software for S-box Performance Analysis and Test , 2009, 2009 International Conference on Electronic Commerce and Business Intelligence.

[10]  P. Mroczkowski,et al.  Generating Pseudorandom S-Boxes - a Method of Improving the Security of Cryptosystems Based on Block Ciphers , 2009 .

[11]  Dragan Lambić,et al.  A novel method of S-box design based on chaotic map and composition method , 2014 .

[12]  I. Abd-ElGhafar,et al.  Generation of AES Key Dependent S-Boxes using RC4 Algorithm , 2009 .

[13]  Agus Bejo,et al.  AES S-box construction using different irreducible polynomial and constant 8-bit vector , 2017, 2017 IEEE Conference on Dependable and Secure Computing.

[14]  Bety Hayat Susanti,et al.  Analysis of the Use of Whirlpool’s S-box, S1 and S2 SEED’s S-box in AES Algorithm with SAC Test , 2013 .

[16]  Yong Wang,et al.  A Method for Constructing Bijective S-Box with High Nonlinearity Based on Chaos and Optimization , 2015, Int. J. Bifurc. Chaos.

[17]  Robert K. Logan,et al.  What Is Information?: Why Is It Relativistic and What Is Its Relationship to Materiality, Meaning and Organization , 2012, Inf..

[18]  Talaat A. Elgarf,et al.  Dynamic AES-128 with Key-Dependent S-box , 2013 .

[19]  Lejla Batina,et al.  S-box, SET, Match: A Toolbox for S-box Analysis , 2014, WISTP.