Analysis of Development of Dynamic S-Box Generation

Advanced Encryption Standard is a symmetric block cipher which is widely used in encrypting data by different organizations to make secure their data from being hacked. The only nonlinear part of Advanced Encryption Standard (AES) is S-Box (Substitution Box), which provides confusion in the algorithm. But the main limitation of the S-Box in AES is that it is a static one throughout the algorithm, which is the main center of attraction for the cryptanalyst to analysis the weakness for certain attacks. Since 2000 onwards a number of algebraic attacks on AES have been carried out, which challenged the security of AES. But at the same time till date a number of researches have being carried out for making AES more secure by using dynamic S-Boxes to provide more confusion to the cryptanalyst. In present paper we tried to address dynamic S-Box techniques and provide their analysis on the basis of S-Box properties, which are essential for secure S-Box construction like Non-linearity, XOR profile, Strict Avalanche criterion (SAC) and Bit independence criteria (BIC). Also these techniques are compared with the original AES results.

[1]  David A. Wagner,et al.  The Boomerang Attack , 1999, FSE.

[2]  Vincent Rijmen,et al.  The Block Cipher Square , 1997, FSE.

[3]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[4]  C. Sanchez-Avila,et al.  The Rijndael block cipher (AES proposal) : a comparison with DES , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).

[5]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[6]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[7]  Talaat A. Elgarf,et al.  Dynamic AES-128 with Key-Dependent S-box , 2013 .

[8]  Balajee Maram,et al.  Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output , 2016 .

[9]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[10]  I. Abd-ElGhafar,et al.  Generation of AES Key Dependent S-Boxes using RC4 Algorithm , 2009 .

[11]  Dalia H. El-Kamchouchi,et al.  Strongest AES with S-Boxes Bank and Dynamic Key MDS Matrix (SDK-AES) , 2013 .

[12]  Julia Juremi,et al.  ENHANCING ADVANCED ENCRYPTION STANDARD S-BOX GENERATION BASED ON ROUND KEY , 2012 .

[13]  Tianyong Ao,et al.  Construction of High Quality Key-dependent S-boxes , 2017 .

[14]  N KrishnamurthyG,et al.  Making AES Stronger: AES with Key Dependent S-Box , 2008 .

[15]  Kooroush Manochehri,et al.  A Novel Method for Designing S-Boxes Based on Chaotic Logistic Maps Using Cipher Key , 2013 .

[16]  Kazys Kazlauskas,et al.  An Algorithm for Key-Dependent S-Box Generation in Block Cipher System , 2015, Informatica.

[17]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[18]  N. Jeyanthi,et al.  Pure Dynamic S-box Construction , 2016 .

[19]  Abdennaceur Kachouri,et al.  On dynamic chaotic S-BOX , 2009, 2009 Global Information Infrastructure Symposium.

[20]  P. Mroczkowski,et al.  Generating Pseudorandom S-Boxes - a Method of Improving the Security of Cryptosystems Based on Block Ciphers , 2009 .

[21]  Réjane Forré,et al.  The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition , 1988, CRYPTO.

[22]  Lars R. Knudsen,et al.  The Interpolation Attack on Block Ciphers , 1997, FSE.

[23]  Kazys Kazlauskas,et al.  Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.

[24]  Jie Cui,et al.  AN IMPROVED AES S-BOX AND ITS PERFORMANCE ANALYSIS , 2011 .

[25]  John B. Kam,et al.  Structured Design of Substitution-Permutation Encryption Networks , 1979, IEEE Transactions on Computers.

[26]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[27]  Roman Oliynykov,et al.  A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent , 2013, IACR Cryptol. ePrint Arch..

[28]  K AdiNarayanaReddy Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution , 2014 .