Generating A New S-Box Inspired by

Many scholars have attempted to use new methods inspired by DNA bio‐techniques in the domains of cryptography and steganography. In this article, a new S‐Box was designed inspired by biology DNA techniques to be used for SPN symmetric block ciphers. The new S‐Box is used in order to make use of biological process as inspiration in creating the S‐Box as simple and secure approach. This article uses the new S‐Box within the AES (Advanced Encryption Standard). The National Institute of Standard and Technology (NIST) tests have been used to test the cipher which uses this new S‐Box. The results of the tests demonstrate that it effectively passed all the randomness tests of NIST. In addition, the S‐Box testing criteria were conducted to test the security of the new S‐Box; the results of these tests indicate that the new S‐Box has good security.

[1]  Kazys Kazlauskas,et al.  Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.

[2]  Onur Koçak,et al.  Cryptographic Randomness Testing of Block Ciphers and Hash Functions , 2010, IACR Cryptol. ePrint Arch..

[3]  Magdy Saeb,et al.  A DNA-based implementation of YAEA encryption algorithm , 2006, Computational Intelligence.

[4]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[5]  Lejla Batina,et al.  A Very Compact "Perfectly Masked" S-Box for AES , 2008, ACNS.

[6]  Mona Sabry,et al.  Three Reversible Data Encoding Algorithms based on DNA and Amino Acids' Structure , 2012 .

[7]  H. Feistel Cryptography and Computer Privacy , 1973 .

[8]  John H. Reif,et al.  DNA-based Cryptography , 1999, Aspects of Molecular Computing.

[9]  Vasilios Katos A randomness test for block ciphers , 2005, Appl. Math. Comput..

[10]  Susan Stepney,et al.  The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[11]  Xiaofeng Liao,et al.  A novel method for designing S-boxes based on chaotic maps , 2005 .

[12]  Minh-Triet Tran,et al.  Gray S-Box for Advanced Encryption Standard , 2008, 2008 International Conference on Computational Intelligence and Security.

[13]  Lawrence E. Bassham,et al.  Randomness Testing of the Advanced Encryption Standard Finalist Candidates , 2000 .

[14]  Péter L. Erdös,et al.  Exordium for DNA Codes , 2003, J. Comb. Optim..

[15]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[16]  Bo Zhu,et al.  Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions , 2016, Cryptography and Communications.

[17]  Guo Chen,et al.  A novel heuristic method for obtaining S-boxes , 2008 .

[18]  Qiang Zhang,et al.  A RGB image encryption algorithm based on DNA encoding and chaos map , 2009, Comput. Electr. Eng..

[19]  S.V. Kartalopoulos,et al.  DNA-inspired cryptographic method in optical communications, authentication and data mimicking , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[20]  David C. Torney,et al.  Repetitive DNA Sequences: Some Considerations for Simple Sequence Repeats , 1993, Comput. Chem..

[21]  Gregor Leander,et al.  On the Classification of 4 Bit S-Boxes , 2007, WAIFI.

[22]  Carlisle M. Adams,et al.  Good S-Boxes Are Easy To Find , 1989, CRYPTO.

[23]  Melek D. Yücel,et al.  Avalanche and Bit Independence Properties for the Ensembles of Randomly Chosen n \times n S-Boxes , 2001 .

[24]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[25]  J.L. Smith,et al.  Some cryptographic techniques for machine-to-machine data communications , 1975, Proceedings of the IEEE.

[26]  A Leier,et al.  Cryptography with DNA binary strands. , 2000, Bio Systems.

[27]  Stafford E. Tavares,et al.  Constructing Large Cryptographically Strong S-boxes , 1992, AUSCRYPT.

[28]  Olga Tornea,et al.  DNA Cryptographic Algorithms , 2009 .

[29]  Yanfeng Wang,et al.  An encryption scheme using DNA technology , 2008, 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications.

[30]  Harsh Dhaka,et al.  DNA based Cryptography: an Approach to Secure Mobile Networks , 2010 .