Enhance Security of AES Algorithm Based on S-Box

Authors

  • Rawia Alkhamery Computer Science Dept., Sheba Region University, Marib - Yemen
  • Yasser Alahmadi Computer Science Dept., Sheba Region University, Marib - Yemen
  • Mokhtar Alsorori Computer Science Dept., Sheba Region University, Marib - Yemen
  • Saleh Alassali Computer Science Dept., Sheba Region University, Marib - Yemen

DOI:

https://doi.org/10.26438/ijcse/v9i2.3945

Keywords:

Cryptography, symmetric key, block cipher, AES algorithm and dynamic S-Box

Abstract

Advanced Encryption Standard (AES) is an approved encryption algorithm that has been used so far in many applications. A strength of AES algorithm depends on substitution box (S-Box) that is the main component to provide nonlinearity operations. Although AES algorithm has been proven to be the most secure algorithm to date, the advances in computer processing speed nowadays and the attempts to break such algorithm through the linear and differential cryptanalysis made it vulnerable to obsolescence. Therefore, the development of the algorithm is still ongoing especially for modification of the static nature of its S-Box. This paper proposes a method to improve the security of AES algorithm by suggesting treatment in the Substitution Box which is used to generate nonlinear relationship. Experimental results showed that the proposed method can enhance security of AES algorithm in the same condition of efficiency.

References

[1] J. Daemen, and V. Rijmen, "AES Proposal:Rijndael", Version 2. Submission to NIST, 1999.

[2] J. Daemen, and V. Rijmen,"The block cipher Rijndael", Proceedings of the Third International Conference on smart card Reseacrh and Applications, CARDIS`98, 1820, pp.277-284, Berlin: Springer, 2000.

[3] Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, 2001.

[4] K. Anurupam, "Dynamic S-box implementation in PRESENT Cipher", International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.426-431, 2018.

[5] K. Kazlauskas and J. Kazlauskas, "Key-Dependent S-Box Generation in AES Block Cipher System", INFORMATICA, Vol.20, No.1, pp.23-34, 2009.

[6] H.M. El-Sheikh, O.A. El-Mohsen, S.T. Elgarf and A. Zekry, "A New Approach for Designing Key-Dependent S-Box Defined over GF (24) in AES", International Journal of Computer Theory and Engineering Vol.4, No.2, pp.158-164, 2012.

[7] G.N. Krishnamurthy and V. Ramaswami, "Making AES Stronger: AES wich Key - Dependent S-Box", International Journal of Computer Science and Network Security, Vol.8, No.9, pp. 388-398, 2008.

[8] J. Juremi, R. Mahmod and S. Sulaiman, "A Proposal for Improving AES S-box with Rotation and Key-Dependent", in the proceedings of the 2012 IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Kuala Lumpur, Malaysia, pp.38-42. 2012.

[9] W. Stallings, "Cryptography and Network Security", principles and practices,7th Edition, Pearson Prentice Hall, pp.172-189, 2017.

[10] A. Karki, "A Review on Advanced Encryption Standard", International Journal of Computer Sciences and Engineering (ICSE), Vol.6, Issue.8, pp.551-556, 2018.

[11] J. Juremi, R. Mahmod, S. Sulaiman and J. Ramli, "Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key", International Journal of Cyber-Security and Digital Forensics, Vol.1, No.3, pp.183-188, 2012.

[12] R. Hosseinkhani and H.H.S Javadi, "Using Cipher Key to Generate Dynamic S-Box in AES Cipher System", International Journal of Computer Science and Security, Vol.6, No.1, pp.19-28, 2012.

[13] H. M. Azzawi, "Enhancing The Encryption Process of Advanced Encryption Standard (AES) By Using Proposed Algorithm to Generate S-Box", Journal of Engineering and Development, Vol.18, No.2, 2014.

[14] K. Kazlauskas, G. Vaicekauskas and R. Smaliukas,"An Algorithm for Key-Dependent S-Box Generation in Block Cipher System", INFORMATICA, Vol.26, No.1, pp.51-56, 2015.

[15] N. Tiwari and A. Kumar, "Security Effect on AES in Terms of Avalanche Effect by Using Alternate S-Box", in Proc. Int. Conf. Intell. Data Commun. Technol. Internet Things, pp.1-14, 2018.

[16] A. Datta, D. Bhowmik and S. Sinha, "A Novel Technique for SAC Analysis of S-Boxes for Boomerang-Style Attacks", International Journal of Computer Sciences and Engineering (ICSE), Vol.7, Issue.5,pp.7-13, 2019.

Downloads

Published

2021-02-28
CITATION
DOI: 10.26438/ijcse/v9i2.3945
Published: 2021-02-28

How to Cite

[1]
R. Alkhamery, Y. Alahmadi, M. Alsorori, and S. Alassali, “Enhance Security of AES Algorithm Based on S-Box”, Int. J. Comp. Sci. Eng., vol. 9, no. 2, pp. 39–45, Feb. 2021.

Issue

Section

Research Article