Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output 

Journal Title: TEM JOURNAL - Year 2016, Vol 5, Issue 1

Abstract

 Data security is a major issue because of rapid evolution of data communication over unsecured internetwork. Here the proposed system is concerned with the problem of randomly generated S-box. The generation of S-box depends on Pseudo-Random-Number-Generators and shared-secret-key. The process of Pseudo-Random-Number-Generator depends on large prime numbers. All Pseudo-Random-Numbers are scrambled according to shared-secret-key. After scrambling, the S-box is generated. In this research, large prime numbers are the inputs to the Pseudo-Random-Number-Generator. The proposed S-box will reduce the complexity of S-box generation. Based on S-box parameters, it experimentally investigates the quality and robustness of the proposed algorithm which was tested. It yields better results with the S-box parameters like Hamming Distance, Balanced Output and Avalanche Effect and can be embedded to popular cryptography algorithms

Authors and Affiliations

Balajee Maram K, J M Gnanasekar

Keywords

Related Articles

Diagnosis of the Potential for Successful Implementation of a Knowledge Management System in a University Unit member

This paper presents an overview of the recorded state in terms of the capacity for introducing of an informatics system for knowledge management of an academic institution – the Faculty of Administration and Information...

 On Instantaneous Power Dissipation in Class B Amplifier

 The present paper describes the analysis of the instantaneous power dissipation by the two active components in a class B power amplifier. Attention is paid to restrictions of the instantaneous power dissipation re...

Mathematical Model of Thermo Hydraulic Processes in Venturi Apparatus with Rectangular Cross Section 

 The cleaning processes of polluted gases in high velocity gas streams based on water flushing, as well as the heat and mass transfer mechanisms in Venturi apparatus, are well known in engineering investigations. Fl...

The Measurement of Hardness and Elastic Modulus of non-Metallic Inclusions in Steely Welding Joints 

 Trunk pipelines work under a cyclic dynamical mechanical load because when oil or gas is pumped, the pressure constantly changes - pulsates. Therefore, the fatigue phenomenon is a common reason of accidents. The fa...

Mode of getting Thermal Energy Depending of the Average Outside Temperature on the City of Bitola 

 This research was based on the latest achievements in the development of energy technologies, such as: efficiency, energy saving, ecology and flexibility. The study used data from the measurements of external tempe...

Download PDF file
  • EP ID EP164383
  • DOI 10.18421/TEM51-11
  • Views 184
  • Downloads 0

How To Cite

Balajee Maram K, J M Gnanasekar (2016). Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output . TEM JOURNAL, 5(1), 67-75. https://europub.co.uk/articles/-A-164383