Enhance security of advance encryption standard algorithm based on key-dependent S-box

Cryptographic algorithms uniquely define the mathematical steps required to encrypt and decrypt messages in a cryptographic system. Shortly, they protect data from unauthorized access. The process of encryption is a crucial technique to ensure the protection of important electronic information and allows two parties to communicate and prevent unauthorized parties from accessing the information simultaneously. The process of encrypting information is required to be dynamic in nature to ensure protection from novel and advanced techniques used by cryptanalysts. The substitution box (S-box) is a key fundamental of contemporary symmetric cryptosystems as it provides nonlinearity to cryptosystems and enhances the security of their cryptography. This paper discusses the enhancement of the AES algorithm and describes the process, which involves the generation of dynamic S-boxes for Advance Encryption Standard (AES). The generated S-boxes are more dynamic and key-dependent which make the differential and linear cryptanalysis more difficult. NIST randomness tests and correlation coefficient were conducted on the proposed dynamic AES algorithm, their results showing that it is superior to the original AES with security verified.

[1]  Zaiton Muda,et al.  Key Transformation Approach for Rijndael Security , 2010 .

[2]  Faudziah Ahmad,et al.  Randomness Analysis of 128 bits Blowfish Block Cipher on ECB and CBC Modes , 2013 .

[3]  Faudziah Ahmad,et al.  Analysis of Some Security Criteria for S-boxes in Blowfish Algorithm , 2013 .

[4]  Ramlan Mahmod,et al.  Security analysis of blowfish algorithm , 2013, 2013 Second International Conference on Informatics & Applications (ICIA).

[5]  Juan Soto,et al.  Randomness Testing of the AES Candidate Algorithms , 1999 .

[6]  Mohd Ali,et al.  A New 128-Bit Block Cipher , 2009 .

[7]  Lawrence E. Bassham,et al.  Randomness Testing of the Advanced Encryption Standard Finalist Candidates , 2000 .

[8]  Ramlan Mahmod,et al.  A proposal for improving AES S-box with rotation and key-dependent , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[9]  N KrishnamurthyG,et al.  Making AES Stronger: AES with Key Dependent S-Box , 2008 .

[10]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[11]  Cheng Li,et al.  Research on Intelligent Algorithm of Female Script Standardization , 2013 .

[12]  Cheng-Wen Wu,et al.  A high-throughput low-cost AES processor , 2003, IEEE Communications Magazine.

[13]  S.H. El-Ramly,et al.  Dynamic generation of s-boxes in block cipher systems , 2001, Proceedings of the Eighteenth National Radio Science Conference. NRSC'2001 (IEEE Cat. No.01EX462).

[14]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[15]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[16]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[17]  Kazys Kazlauskas,et al.  Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.

[18]  Ashwak Alabaichi,et al.  An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box , 2014 .

[19]  Terry Ritter,et al.  Substitution Cipher with Pseudo-Random Shuffling: the Dynamic Substitution Combiner , 1990, Cryptologia.

[20]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[21]  Faiz Yousif Mohammad,et al.  A Novel S-box of AES Algorithm Using Variable Mapping Technique , 2009 .

[22]  Talaat A. Elgarf,et al.  Dynamic AES-128 with Key-Dependent S-box , 2013 .

[23]  Nikolai Stoianov One Approach of Using Key-Dependent S-BOXes in AES , 2011, MCSS.