Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output 

Journal Title: TEM JOURNAL - Year 2016, Vol 5, Issue 1

Abstract

 Data security is a major issue because of rapid evolution of data communication over unsecured internetwork. Here the proposed system is concerned with the problem of randomly generated S-box. The generation of S-box depends on Pseudo-Random-Number-Generators and shared-secret-key. The process of Pseudo-Random-Number-Generator depends on large prime numbers. All Pseudo-Random-Numbers are scrambled according to shared-secret-key. After scrambling, the S-box is generated. In this research, large prime numbers are the inputs to the Pseudo-Random-Number-Generator. The proposed S-box will reduce the complexity of S-box generation. Based on S-box parameters, it experimentally investigates the quality and robustness of the proposed algorithm which was tested. It yields better results with the S-box parameters like Hamming Distance, Balanced Output and Avalanche Effect and can be embedded to popular cryptography algorithms

Authors and Affiliations

Balajee Maram K, J M Gnanasekar

Keywords

Related Articles

 DEPONTO: A Reusable Dependability Domain Ontology

This paper proposes a dependability reusable ontology for knowledge representation. The fundamental knowledge related to dependability follows its taxonomy. Thus, this paper gives an analysis of what is the dependability...

Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output 

 Data security is a major issue because of rapid evolution of data communication over unsecured internetwork. Here the proposed system is concerned with the problem of randomly generated S-box. The generation of S-b...

Diagnosis of the Potential for Successful Implementation of a Knowledge Management System in a University Unit member

This paper presents an overview of the recorded state in terms of the capacity for introducing of an informatics system for knowledge management of an academic institution – the Faculty of Administration and Information...

 Search Method Based on Figurative Indexation of Folksonomic Features of Graphic Files

 In this paper the search method based on usage of figurative indexation of folksonomic characteristics of graphical files is described. The method takes into account extralinguistic information, is based on using a...

Blended Learning Possibilities in Enhancing Education, Training and Development in Developing Countries: A Case Study in Graphic Design Courses 

 Blended learning is not a new concept; recently, there has been a renewed focus on this learning strategy, both in the education and corporate sectors. Although the definition of blended learning is somewhat inchoa...

Download PDF file
  • EP ID EP164383
  • DOI 10.18421/TEM51-11
  • Views 181
  • Downloads 0

How To Cite

Balajee Maram K, J M Gnanasekar (2016). Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output . TEM JOURNAL, 5(1), 67-75. https://europub.co.uk/articles/-A-164383