Open Access   Article Go Back

Enhance Security of AES Algorithm Based on S-Box

Rawia Alkhamery1 , Yasser Alahmadi2 , Mokhtar Alsorori3 , Saleh Alassali4

Section:Research Paper, Product Type: Journal Paper
Volume-9 , Issue-2 , Page no. 39-45, Feb-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i2.3945

Online published on Feb 28, 2021

Copyright © Rawia Alkhamery, Yasser Alahmadi, Mokhtar Alsorori, Saleh Alassali . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rawia Alkhamery, Yasser Alahmadi, Mokhtar Alsorori, Saleh Alassali, “Enhance Security of AES Algorithm Based on S-Box,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.2, pp.39-45, 2021.

MLA Style Citation: Rawia Alkhamery, Yasser Alahmadi, Mokhtar Alsorori, Saleh Alassali "Enhance Security of AES Algorithm Based on S-Box." International Journal of Computer Sciences and Engineering 9.2 (2021): 39-45.

APA Style Citation: Rawia Alkhamery, Yasser Alahmadi, Mokhtar Alsorori, Saleh Alassali, (2021). Enhance Security of AES Algorithm Based on S-Box. International Journal of Computer Sciences and Engineering, 9(2), 39-45.

BibTex Style Citation:
@article{Alkhamery_2021,
author = {Rawia Alkhamery, Yasser Alahmadi, Mokhtar Alsorori, Saleh Alassali},
title = {Enhance Security of AES Algorithm Based on S-Box},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2021},
volume = {9},
Issue = {2},
month = {2},
year = {2021},
issn = {2347-2693},
pages = {39-45},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5303},
doi = {https://doi.org/10.26438/ijcse/v9i2.3945}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i2.3945}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5303
TI - Enhance Security of AES Algorithm Based on S-Box
T2 - International Journal of Computer Sciences and Engineering
AU - Rawia Alkhamery, Yasser Alahmadi, Mokhtar Alsorori, Saleh Alassali
PY - 2021
DA - 2021/02/28
PB - IJCSE, Indore, INDIA
SP - 39-45
IS - 2
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
375 472 downloads 197 downloads
  
  
           

Abstract

Advanced Encryption Standard (AES) is an approved encryption algorithm that has been used so far in many applications. A strength of AES algorithm depends on substitution box (S-Box) that is the main component to provide nonlinearity operations. Although AES algorithm has been proven to be the most secure algorithm to date, the advances in computer processing speed nowadays and the attempts to break such algorithm through the linear and differential cryptanalysis made it vulnerable to obsolescence. Therefore, the development of the algorithm is still ongoing especially for modification of the static nature of its S-Box. This paper proposes a method to improve the security of AES algorithm by suggesting treatment in the Substitution Box which is used to generate nonlinear relationship. Experimental results showed that the proposed method can enhance security of AES algorithm in the same condition of efficiency.

Key-Words / Index Term

Cryptography, symmetric key, block cipher, AES algorithm and dynamic S-Box.

References

[1] J. Daemen, and V. Rijmen, "AES Proposal:Rijndael", Version 2. Submission to NIST, 1999.
[2] J. Daemen, and V. Rijmen,"The block cipher Rijndael", Proceedings of the Third International Conference on smart card Reseacrh and Applications, CARDIS`98, 1820, pp.277-284, Berlin: Springer, 2000.
[3] Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, 2001.
[4] K. Anurupam, "Dynamic S-box implementation in PRESENT Cipher", International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.426-431, 2018.
[5] K. Kazlauskas and J. Kazlauskas, "Key-Dependent S-Box Generation in AES Block Cipher System", INFORMATICA, Vol.20, No.1, pp.23-34, 2009.
[6] H.M. El-Sheikh, O.A. El-Mohsen, S.T. Elgarf and A. Zekry, "A New Approach for Designing Key-Dependent S-Box Defined over GF (24) in AES", International Journal of Computer Theory and Engineering Vol.4, No.2, pp.158-164, 2012.
[7] G.N. Krishnamurthy and V. Ramaswami, "Making AES Stronger: AES wich Key - Dependent S-Box", International Journal of Computer Science and Network Security, Vol.8, No.9, pp. 388-398, 2008.
[8] J. Juremi, R. Mahmod and S. Sulaiman, "A Proposal for Improving AES S-box with Rotation and Key-Dependent", in the proceedings of the 2012 IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Kuala Lumpur, Malaysia, pp.38-42. 2012.
[9] W. Stallings, "Cryptography and Network Security", principles and practices,7th Edition, Pearson Prentice Hall, pp.172-189, 2017.
[10] A. Karki, "A Review on Advanced Encryption Standard", International Journal of Computer Sciences and Engineering (ICSE), Vol.6, Issue.8, pp.551-556, 2018.
[11] J. Juremi, R. Mahmod, S. Sulaiman and J. Ramli, "Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key", International Journal of Cyber-Security and Digital Forensics, Vol.1, No.3, pp.183-188, 2012.
[12] R. Hosseinkhani and H.H.S Javadi, "Using Cipher Key to Generate Dynamic S-Box in AES Cipher System", International Journal of Computer Science and Security, Vol.6, No.1, pp.19-28, 2012.
[13] H. M. Azzawi, "Enhancing The Encryption Process of Advanced Encryption Standard (AES) By Using Proposed Algorithm to Generate S-Box", Journal of Engineering and Development, Vol.18, No.2, 2014.
[14] K. Kazlauskas, G. Vaicekauskas and R. Smaliukas,"An Algorithm for Key-Dependent S-Box Generation in Block Cipher System", INFORMATICA, Vol.26, No.1, pp.51-56, 2015.
[15] N. Tiwari and A. Kumar, "Security Effect on AES in Terms of Avalanche Effect by Using Alternate S-Box", in Proc. Int. Conf. Intell. Data Commun. Technol. Internet Things, pp.1-14, 2018.
[16] A. Datta, D. Bhowmik and S. Sinha, "A Novel Technique for SAC Analysis of S-Boxes for Boomerang-Style Attacks", International Journal of Computer Sciences and Engineering (ICSE), Vol.7, Issue.5,pp.7-13, 2019.