CFP last date
20 January 2025
Reseach Article

Encryption using Dual Key Transformation based on Creation of Multi S- Boxes in AES Algorithm

by Nada Hussein M. Ali, Abdul Monem S. Rahma, Abdul Mohsen Jaber
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 10
Year of Publication: 2013
Authors: Nada Hussein M. Ali, Abdul Monem S. Rahma, Abdul Mohsen Jaber
10.5120/14481-2785

Nada Hussein M. Ali, Abdul Monem S. Rahma, Abdul Mohsen Jaber . Encryption using Dual Key Transformation based on Creation of Multi S- Boxes in AES Algorithm. International Journal of Computer Applications. 83, 10 ( December 2013), 1-6. DOI=10.5120/14481-2785

@article{ 10.5120/14481-2785,
author = { Nada Hussein M. Ali, Abdul Monem S. Rahma, Abdul Mohsen Jaber },
title = { Encryption using Dual Key Transformation based on Creation of Multi S- Boxes in AES Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 10 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number10/14481-2785/ },
doi = { 10.5120/14481-2785 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:58:59.400498+05:30
%A Nada Hussein M. Ali
%A Abdul Monem S. Rahma
%A Abdul Mohsen Jaber
%T Encryption using Dual Key Transformation based on Creation of Multi S- Boxes in AES Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 10
%P 1-6
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Advanced Encryption Standard (AES) is using in a large scale of applications that need to protect their data and information. A nonlinear substitution operation is the main factor of the AES cipher system strength. The S-Box component that used in AES is fixed, and not changeable. The purpose of the proposed approach is to use dual keys in encryption and decryption processes in SubByte transformation function. The first key generate multi random S-boxes depend on using multi keys that led to generate S- boxes provided that each one has its inverse associated with it, the second key is a random distribution of the S-boxes, the dual keys lead in increasing the complexity degree within the same delay time during the encryption and decryption processes in SubByte function. The results show that the present proposed algorithm has good cryptographic strength, with the added benefit that is resistant to linear and differential cryptanalysis, which require that the S-boxes be known beside the encryption key.

References
  1. Choo, E. ,Lee, J. ,Lee H. and Nam, G. , 2007. SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission. International Conference on Multimedia and Ubiquitous Engineering, Page(s): 60 – 65.
  2. Kazlauskas, K. and Kazlauskas, J. , 2009. Key-Dependent S-Box Generation in AES Block Cipher System. INFORMATICA. Vol. 20, No. 1, 23–34.
  3. Hosseinkhani, R. and Javadi, H. Haj Seyyed 2012. Using Cipher Key to Generate Dynamic S-Box in AES Cipher System. International Journal of Computer Science and Security (IJCSS). Vol. 6: Issue 1.
  4. William Stallings. 2012. Cryptography and Network Security Principles and Practice. Fifth Edition, Prentice Hall.
  5. Mohammad, F. Y. , Rohiem, A. E. and Elbayoumy, A. D. 2009. A Novel S-box of AES Algorithm Using Variable Mapping Technique. 2009. 13th International Conference on Aerospace Sciences & Aviation Technology. ASAT- 13, May 26 – 28.
  6. Lambi?, D. and Živkovi?, M. , 2013. Comparison of Random S-Box Generation Methods. Publications DE L'Institute Mathematique Nouvelle série, tome 93 (107), 109–115.
  7. Hsiao, S. , F. , Chen M. y. ,Tsai, and Lin C. C. 2005. System on chip implementation of the whole advanced encryption standard processor using reduced XOR-based sum-of-product operations. IEEE Proceedings, Information Security, Vol. 152, No. 1, 21–30.
Index Terms

Computer Science
Information Sciences

Keywords

Advanced Encryption Standard (AES) S-boxes Encryption Decryption Transformation Cipher system strength Block cipher