S-boxes generated using Affine Transformation giving Maximum Avalanche Effect
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 9
Abstract
The Advanced Encryption Standard (AES) was published by National Institute of Standards and Technology (NIST) in November 2001, to replace DES (Data Encryption Standard) and Triple DES. The S-box (Substitution box) used in AES is designed to be resistant to known cryptanalytic attacks [1][2]. The property of the S-box is that the output cannot be described as a simple mathematical function of the input. The S-box is designed to provide good avalanche effect. The Avalanche Criteria of S-box depends on the generator matrix A used in affine transformation to construct the S-box. This paper investigates the construction of Sboxes by affine transformation which satisfy maximum Avalanche Criteria.
Authors and Affiliations
Chandrasekharappa T. G. S. , Prema K. V. , Kumara Shama
A Content Management System for Building Quality Blogs
the vast amount of information on the World Wide Web is created and published by many different types of providers. Unlike books and journals, most of this information is not subject to editing or peer review by experts....
Performance Evaluation of VoIP in Mobile WiMAX; Simulation and Emulation studies
Worldwide Interoperability for Microwave Access (WiMAX) is an acronym for IEEE 802.16 family which is a leading contemporary broadband wireless Access (BWA) technology. IEEE 802.16e is intended for mobile WiMAX, which su...
Mathematical modeling And Fuzzy logic control of Inspired Isoflurane to obtain minimal flow of Anesthesia
In this paper, a fuzzy logic controller is designed and developed for control of Mean Arterial Pressure (MAP) of a patient during anesthesia using the anesthetic drug Isoflurane. Isoflurane is an anesthetic drug administ...
Concealing the Level-3 features of Fingerprint in a Facial Image
Biometrics is the science of establishing the identity of an individual based on their physical, chemical and behavioral characteristics of the person. Biometrics is increasingly being used for authentication and protect...
EFFICIENT VM LOAD BALANCING ALGORITHM FOR A CLOUD COMPUTING ENVIRONMENT
Cloud computing is a fast growing area in computing research and industry today. With the advancement of the Cloud, there are new possibilities opening up on how applications can be built and how different services can b...