Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output
Journal Title: TEM JOURNAL - Year 2016, Vol 5, Issue 1
Abstract
Data security is a major issue because of rapid evolution of data communication over unsecured internetwork. Here the proposed system is concerned with the problem of randomly generated S-box. The generation of S-box depends on Pseudo-Random-Number-Generators and shared-secret-key. The process of Pseudo-Random-Number-Generator depends on large prime numbers. All Pseudo-Random-Numbers are scrambled according to shared-secret-key. After scrambling, the S-box is generated. In this research, large prime numbers are the inputs to the Pseudo-Random-Number-Generator. The proposed S-box will reduce the complexity of S-box generation. Based on S-box parameters, it experimentally investigates the quality and robustness of the proposed algorithm which was tested. It yields better results with the S-box parameters like Hamming Distance, Balanced Output and Avalanche Effect and can be embedded to popular cryptography algorithms
Authors and Affiliations
Balajee Maram K, J M Gnanasekar
Choosing Teaching as a Career: Importance of the Type of Motivation in Career Choices
This research looks into what are Extrinsic, Intrinsic and Altruistic motives and their importance when students are choosing their career. The study involved 324 teacher trainees in their first year of bachelor st...
Influence of Intelletual Stimulation and Conflict Resolution on Project Implementation: A case of Constituency Development Fund Construction Projects in Public Secondary Schools in Kisumu County, Kenya
Intellectual stimulation is one of the manifestations of transformational leadership. Intellectual stimulation is the aspect of leadership where the leader encourages teams’ ingenuity, creativity and innovative thi...
Grandma's Games Project: Bridging Tradition and Technology Mediated Education
This article presents a project entitled "Grandma’s games", following a research idea to enrich the educational process of K9 students by introducing the traditional children games of our ancestors in the learning...
Educational Computer Software "Inheritance Mechanisms" in Biology Lectures
The author's interests are connected with the introduction of the new Infocommunication Technologies in biology educatione. Computer application in educational system should include thoroughly designed complex procedure...
Development Perspectives of Investment Funds in Republic of Macedonia
This paper will discuss the importance of investment funds for the expansion of investment alternatives in the capital market in the Republic of Macedonia, as well as their role in collecting funds from small inves...