Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output 

Journal Title: TEM JOURNAL - Year 2016, Vol 5, Issue 1

Abstract

 Data security is a major issue because of rapid evolution of data communication over unsecured internetwork. Here the proposed system is concerned with the problem of randomly generated S-box. The generation of S-box depends on Pseudo-Random-Number-Generators and shared-secret-key. The process of Pseudo-Random-Number-Generator depends on large prime numbers. All Pseudo-Random-Numbers are scrambled according to shared-secret-key. After scrambling, the S-box is generated. In this research, large prime numbers are the inputs to the Pseudo-Random-Number-Generator. The proposed S-box will reduce the complexity of S-box generation. Based on S-box parameters, it experimentally investigates the quality and robustness of the proposed algorithm which was tested. It yields better results with the S-box parameters like Hamming Distance, Balanced Output and Avalanche Effect and can be embedded to popular cryptography algorithms

Authors and Affiliations

Balajee Maram K, J M Gnanasekar

Keywords

Related Articles

The Effects of the Application of Production Information Systems 

 The authors show you in this paper definition and functions of information systems, information systems development methodologies and stages of development. Also, the authors will show the effects of the applicatio...

Designing Information Technology Framework of Enriching E-Learning Pedagogies 

 Academic institutes around the world have adopted the electronic learning (e-learning) model to serve the students’ community, particularly those in a rural area or could not be admitted to local universities for d...

Theoretical Calculation of Wind Response of Tall Structure with TMD and Comparison with Eurocode EN 1991-1-4 Procedure 2 

 This paper explores the possibilities of the Eurocode EN 1991-1-4 to be used to predict the response of structures with installed dynamic vibration absorber or TMD.The analysis is performed in a way that Davenport...

Children’s Perspective on Learning: the Experience of the Bulgarian Students 

 This paper presents the results of an international project “Joy to Learn” with participants from Bulgaria, Germany, Japan, Spain, Poland, Romania and USA. The research focuses on joyful and happy situations for st...

Blended Learning Possibilities in Enhancing Education, Training and Development in Developing Countries: A Case Study in Graphic Design Courses 

 Blended learning is not a new concept; recently, there has been a renewed focus on this learning strategy, both in the education and corporate sectors. Although the definition of blended learning is somewhat inchoa...

Download PDF file
  • EP ID EP164383
  • DOI 10.18421/TEM51-11
  • Views 182
  • Downloads 0

How To Cite

Balajee Maram K, J M Gnanasekar (2016). Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output . TEM JOURNAL, 5(1), 67-75. https://europub.co.uk/articles/-A-164383