Enhance Security of AES Algorithm Based on S-Box
Rawia Alkhamery1 , Yasser Alahmadi2 , Mokhtar Alsorori3 , Saleh Alassali4
Section:Research Paper, Product Type: Journal Paper
Volume-9 ,
Issue-2 , Page no. 39-45, Feb-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i2.3945
Online published on Feb 28, 2021
Copyright © Rawia Alkhamery, Yasser Alahmadi, Mokhtar Alsorori, Saleh Alassali . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Rawia Alkhamery, Yasser Alahmadi, Mokhtar Alsorori, Saleh Alassali, “Enhance Security of AES Algorithm Based on S-Box,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.2, pp.39-45, 2021.
MLA Style Citation: Rawia Alkhamery, Yasser Alahmadi, Mokhtar Alsorori, Saleh Alassali "Enhance Security of AES Algorithm Based on S-Box." International Journal of Computer Sciences and Engineering 9.2 (2021): 39-45.
APA Style Citation: Rawia Alkhamery, Yasser Alahmadi, Mokhtar Alsorori, Saleh Alassali, (2021). Enhance Security of AES Algorithm Based on S-Box. International Journal of Computer Sciences and Engineering, 9(2), 39-45.
BibTex Style Citation:
@article{Alkhamery_2021,
author = {Rawia Alkhamery, Yasser Alahmadi, Mokhtar Alsorori, Saleh Alassali},
title = {Enhance Security of AES Algorithm Based on S-Box},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2021},
volume = {9},
Issue = {2},
month = {2},
year = {2021},
issn = {2347-2693},
pages = {39-45},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5303},
doi = {https://doi.org/10.26438/ijcse/v9i2.3945}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i2.3945}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5303
TI - Enhance Security of AES Algorithm Based on S-Box
T2 - International Journal of Computer Sciences and Engineering
AU - Rawia Alkhamery, Yasser Alahmadi, Mokhtar Alsorori, Saleh Alassali
PY - 2021
DA - 2021/02/28
PB - IJCSE, Indore, INDIA
SP - 39-45
IS - 2
VL - 9
SN - 2347-2693
ER -
VIEWS | XML | |
375 | 472 downloads | 197 downloads |
Abstract
Advanced Encryption Standard (AES) is an approved encryption algorithm that has been used so far in many applications. A strength of AES algorithm depends on substitution box (S-Box) that is the main component to provide nonlinearity operations. Although AES algorithm has been proven to be the most secure algorithm to date, the advances in computer processing speed nowadays and the attempts to break such algorithm through the linear and differential cryptanalysis made it vulnerable to obsolescence. Therefore, the development of the algorithm is still ongoing especially for modification of the static nature of its S-Box. This paper proposes a method to improve the security of AES algorithm by suggesting treatment in the Substitution Box which is used to generate nonlinear relationship. Experimental results showed that the proposed method can enhance security of AES algorithm in the same condition of efficiency.
Key-Words / Index Term
Cryptography, symmetric key, block cipher, AES algorithm and dynamic S-Box.
References
[1] J. Daemen, and V. Rijmen, "AES Proposal:Rijndael", Version 2. Submission to NIST, 1999.
[2] J. Daemen, and V. Rijmen,"The block cipher Rijndael", Proceedings of the Third International Conference on smart card Reseacrh and Applications, CARDIS`98, 1820, pp.277-284, Berlin: Springer, 2000.
[3] Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, 2001.
[4] K. Anurupam, "Dynamic S-box implementation in PRESENT Cipher", International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.426-431, 2018.
[5] K. Kazlauskas and J. Kazlauskas, "Key-Dependent S-Box Generation in AES Block Cipher System", INFORMATICA, Vol.20, No.1, pp.23-34, 2009.
[6] H.M. El-Sheikh, O.A. El-Mohsen, S.T. Elgarf and A. Zekry, "A New Approach for Designing Key-Dependent S-Box Defined over GF (24) in AES", International Journal of Computer Theory and Engineering Vol.4, No.2, pp.158-164, 2012.
[7] G.N. Krishnamurthy and V. Ramaswami, "Making AES Stronger: AES wich Key - Dependent S-Box", International Journal of Computer Science and Network Security, Vol.8, No.9, pp. 388-398, 2008.
[8] J. Juremi, R. Mahmod and S. Sulaiman, "A Proposal for Improving AES S-box with Rotation and Key-Dependent", in the proceedings of the 2012 IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Kuala Lumpur, Malaysia, pp.38-42. 2012.
[9] W. Stallings, "Cryptography and Network Security", principles and practices,7th Edition, Pearson Prentice Hall, pp.172-189, 2017.
[10] A. Karki, "A Review on Advanced Encryption Standard", International Journal of Computer Sciences and Engineering (ICSE), Vol.6, Issue.8, pp.551-556, 2018.
[11] J. Juremi, R. Mahmod, S. Sulaiman and J. Ramli, "Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key", International Journal of Cyber-Security and Digital Forensics, Vol.1, No.3, pp.183-188, 2012.
[12] R. Hosseinkhani and H.H.S Javadi, "Using Cipher Key to Generate Dynamic S-Box in AES Cipher System", International Journal of Computer Science and Security, Vol.6, No.1, pp.19-28, 2012.
[13] H. M. Azzawi, "Enhancing The Encryption Process of Advanced Encryption Standard (AES) By Using Proposed Algorithm to Generate S-Box", Journal of Engineering and Development, Vol.18, No.2, 2014.
[14] K. Kazlauskas, G. Vaicekauskas and R. Smaliukas,"An Algorithm for Key-Dependent S-Box Generation in Block Cipher System", INFORMATICA, Vol.26, No.1, pp.51-56, 2015.
[15] N. Tiwari and A. Kumar, "Security Effect on AES in Terms of Avalanche Effect by Using Alternate S-Box", in Proc. Int. Conf. Intell. Data Commun. Technol. Internet Things, pp.1-14, 2018.
[16] A. Datta, D. Bhowmik and S. Sinha, "A Novel Technique for SAC Analysis of S-Boxes for Boomerang-Style Attacks", International Journal of Computer Sciences and Engineering (ICSE), Vol.7, Issue.5,pp.7-13, 2019.