New Dynamical Key Dependent S-Box based on chaotic maps
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 4
Abstract
Abstract: The strength and security of cryptographic algorithms is determined by substitution non-linear Sboxes, so the construction of cryptographically strong S-boxes is important in the design of secure cryptosystems. In In this paper, an efficient method for designing dynamical key dependent S-boxes based on 2D logistic map and 2D cross map. S-box is a nonlinear transformation where each byte of the State is replaced by another byte using the substitution table. Each individual byte of State is mapped into a new byte by using 2D cat map. One S-box is used for each message. The aim of the proposed approach is to generate more secure Sboxes. The generated S-boxes will increase the complexity and has better results in security analysis. The new Sbox is analyzed and tested for the following criteria: avalanche effect, strict avalanche effect, key sensitivity, differential and linear cryptanalysis. All the results have shown that the proposed method is a good candidate for designing dynamical S-boxes that can be widely used in block cipher.
Authors and Affiliations
F. J. Luma1, H. S. Hilal , A. Ekhlas
AUTOPARK: A Sensor Based, Automated, Secure and Efficient Parking Guidance System
Nowadays, due to modern and lavish lifestyles people prefer their own vehicles while going anywhere, resulting in increased traffic congestion and parking problems. In this paper, we propose and present a complet...
“Software Theft Detection for JavaScript programs based ondynamic birthmark extracted from runtime heap graph”
Abstract: Software’s, programs are valuable assets to developer companies. However, the source code ofprograms can be theft and JavaScript programs whose code is easily available which is a serious threat to theind...
Modified Rabin Cryptosystem through Advanced Key Distribution System
Abstract: In this paper, an asymmetric cryptosystem Rabin Cryptosystem has been modified by adding an advanced message authentication system with it. The proposed modified Rabin Cryptosystem is a combination of sym...
Displaying All Bangla Compound Letters & Alphabets By 32-Segment
Abstract: Different approaches have been proposed for representing Bangla and English alphabets and numerals by segment display. But there is no complete and accurate scheme has been done yet for Bangla compound...
Secure Development - Web Application Security.
In Current scenario, many Web applications go through rapid development phases like adopting agile methodology of development with very short turnaround time, making it difficult to identify and eliminate vulne...