2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC) 2015
DOI: 10.1109/icdipc.2015.7323004
|View full text |Cite
|
Sign up to set email alerts
|

Enhance security of advance encryption standard algorithm based on key-dependent S-box

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 40 publications
(22 citation statements)
references
References 9 publications
0
22
0
Order By: Relevance
“…A block cipher having a static S-box employs the unchanged S-box in each round. A static S-box allows the invaders to inspect S-box features, discover its flaws, and eventually get a chance of cryptanalysis of the muddled ciphertext produced by the block cipher [5,14,15]. Due to the limitations of static S-boxes, a large number of researchers have explored the ideas for S-box design such as randomness, dynamicity, and key-dependency.…”
Section: Related Workmentioning
confidence: 99%
“…A block cipher having a static S-box employs the unchanged S-box in each round. A static S-box allows the invaders to inspect S-box features, discover its flaws, and eventually get a chance of cryptanalysis of the muddled ciphertext produced by the block cipher [5,14,15]. Due to the limitations of static S-boxes, a large number of researchers have explored the ideas for S-box design such as randomness, dynamicity, and key-dependency.…”
Section: Related Workmentioning
confidence: 99%
“…Ciphers employing static S-Boxes use the same S-Box in each round. This type of S-Box permits the attackers to investigate S-Box properties, find its weaknesses, and ultimately obtain the opportunity for cryptanalysis of the ciphertext [ 7 , 11 , 12 ]. For example, DES uses static S-Boxes.…”
Section: Introductionmentioning
confidence: 99%
“…All purposed security algorithm as described in the previous subsection (authentication process, encryption data uplink, and encryption data downlink) implements symmetric cryptographic. Alabaichi & Ibrahem, 2015) made research to enhance the security of advanced encryption standard algorithm based on key-dependent S-Box. In this research modification to previous AES conducted by adding one initial step each round (S-Box permutation).…”
Section: Purposed Cryptography Algorithmmentioning
confidence: 99%