Key-Dependent S-box Scheme for Enhancing the Security of Block Ciphers

The Advanced Encryption Standard (AES) is the current de facto standard block cipher for extremely confidential information. It is used by many large agencies, and popular for its computational e▭ciency in both software and hardware. However, the standard (Rijndael) S-box used of AES is a static and fixed matrix. Thus, a backdoor can be built into the cipher to exploit this feature. In this paper, we argue for a very simple key dependent S-box scheme which generates a dynamic S-box for each round of encryption. Our scheme uses some bits of the primary key (or expanded key) to directly manipulate the standard S-box in such a way that its content is changed but its cryptographic properties are preserved. We show using experimental tests that our proposed scheme strengthens the cipher against certain attacks, at the expense of a relatively modest one-time computational procedure during the set-up phase.

[1]  Ramlan Mahmod,et al.  A proposal for improving AES S-box with rotation and key-dependent , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[2]  Carlisle M. Adams,et al.  Key-Dependent S-Box Manipulations , 1998, Selected Areas in Cryptography.

[3]  Prabhas Chongstitvatana,et al.  AES implementation for RFID Tags: The hardware and software approaches , 2014, 2014 International Computer Science and Engineering Conference (ICSEC).

[4]  Rasha Subhi Ali,et al.  Enhancement CAST block algorithm to encrypt big data , 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT).

[6]  Yansheng Li,et al.  Performance Evaluation for CAST and RC5 Encryption Algorithms , 2010, 2010 International Conference on Computing, Control and Industrial Engineering.

[7]  K. B. Jithendra,et al.  New Results in Related Key Impossible Differential Cryptanalysis on Reduced Round AES-192 , 2018, 2018 International Conference On Advances in Communication and Computing Technology (ICACCT).

[8]  Baodian Wei,et al.  An AES S-box to increase complexity and cryptographic analysis , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[9]  Krerk Piromsopa,et al.  An implementation of AES-128 and AES-512 on Apple mobile processor , 2017, 2017 14th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).

[10]  Shraphalya B. Nalawade,et al.  Design and implementation of blowfish algorithm using reconfigurable platform , 2017, 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE).

[11]  Hongqi Zhang,et al.  Study of the AES Realization Method on the Reconfigurable Hardware , 2013, 2013 International Conference on Computer Sciences and Applications.