Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output 

Journal Title: TEM JOURNAL - Year 2016, Vol 5, Issue 1

Abstract

 Data security is a major issue because of rapid evolution of data communication over unsecured internetwork. Here the proposed system is concerned with the problem of randomly generated S-box. The generation of S-box depends on Pseudo-Random-Number-Generators and shared-secret-key. The process of Pseudo-Random-Number-Generator depends on large prime numbers. All Pseudo-Random-Numbers are scrambled according to shared-secret-key. After scrambling, the S-box is generated. In this research, large prime numbers are the inputs to the Pseudo-Random-Number-Generator. The proposed S-box will reduce the complexity of S-box generation. Based on S-box parameters, it experimentally investigates the quality and robustness of the proposed algorithm which was tested. It yields better results with the S-box parameters like Hamming Distance, Balanced Output and Avalanche Effect and can be embedded to popular cryptography algorithms

Authors and Affiliations

Balajee Maram K, J M Gnanasekar

Keywords

Related Articles

MS Excel Workbook for Calculation of the Temperature of Protected Steel Elements in a Fire Exposure according to Nominal Curves 

 This article presents a procedure for evaluation of the temperature of the steel element in a fire situation. The gas temperature in the fire compartment is given by the three nominal curves: ISO834, Hydrocarbon a...

Loss-minimal Algorithmic Trading Based on Levy Processes 

 In this paper we optimize portfolios assuming that the value of the portfolio follows a Lévy process. First we identify the parameters of the underlying Lévy process and then portfolio optimization is performed by...

Comparison of the Helicobacter Pylori Diagnosis Methods with Analytic Network Process 

 Helicobacter pylori is infecting %70-80 of the world’s population and is assumed to cause gastric diseases. Diagnosis of the bacteria is crucial for the treatment of the bacteria related infections. Histology, cult...

The Quality and Motivation of the Workforce

Labour quality and motivation has been a hot topic for businesses. It very much depends on the company's results and economic performance of the country as a whole. Below we analyze the new and old European Union (EU) me...

 The Turnover of Transportation Companies in the European Countries of the Former Eastern Bloc before and after the Economic Crisis

 The purpose of this paper is to analyze the key indicators of transportation companies, with emphasis on turnover of enterprises, in the Central and Eastern Europe (CEE), or of new European Union (EU) states before...

Download PDF file
  • EP ID EP164383
  • DOI 10.18421/TEM51-11
  • Views 187
  • Downloads 0

How To Cite

Balajee Maram K, J M Gnanasekar (2016). Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output . TEM JOURNAL, 5(1), 67-75. https://europub.co.uk/articles/-A-164383