An algorithm for key-dependent S-box generation in block cipher system

K Kazlauskas, G Vaicekauskas, R Smaliukas - Informatica, 2015 - content.iospress.com
A nonlinear substitution operation of bytes is the main strength factor of the Advanced
Encryption Standard (AES) and other modern cipher systems. In this paper we have …

[PDF][PDF] A novel method to design S-boxes based on key-dependent permutation schemes and its quality analysis

K Kazlauskas, R Smaliukas… - … Journal of Advanced …, 2016 - pdfs.semanticscholar.org
S-boxes are used in block ciphers as the important nonlinear components. The nonlinearity
provides important protection against linear and differential cryptanalysis. The S-boxes used …

An examination of inefficiencies in key dependent variations of the Rijndael S-Box

C Easttom - Electrical engineering (ICEE), Iranian conference …, 2018 - ieeexplore.ieee.org
Substitution boxes, or s-boxes, provide the primary source of non-linearity in symmetric
cryptographic primitives. There are a variety methodologies used to design s-boxes. One …

[PDF][PDF] Design of F8 encryption algorithm based on customized KASUMI block cipher

NH Shaker, HH Issa, KA Shehata… - International Journal of …, 2013 - researchgate.net
Governmental bodies, such as military and national security agencies, keep looking for
proprietary encryption algorithms to secure their confidential communication applications …

On AES S-boxes with variable modulus and translation polynomials

CP Arya, R Ratan, N Verma - Computational Intelligence in …, 2023 - taylorfrancis.com
Translation polynomials used in the construction of advanced encryption standard (AES) S-
box are computed for each modulus polynomial and carry out the analysis based on the …

[PDF][PDF] SECURE HYBRID ENCRYPTION SCHEME BASED ON SPN AND FEISTEL STRUCTURES

CP Arya, R Ratan, N Verma - 2022 - mililink.com
A hybrid encryption scheme based on SPN and Feistel structures is proposed. In this
scheme, the round functions of AES are modified by considering block size 33× instead of …

AES based on Key dependently nonlinear redundant S-Box

A Seghier, J Li - ICC 2019-2019 IEEE International Conference …, 2019 - ieeexplore.ieee.org
The AES S-Box is the only part of the standard responsible for providing the nonlinearity
needed to deal with the linear and differential attacks. This fact emphasizes the necessity for …

Design and Implementation of an Optimized Encryption Algorithm for Performance Enhancement Over WiMAX

I Abd Elgafar, E Abd Elwanees… - The International …, 2014 - journals.ekb.eg
Due to the fact that encryption operations performed by any protocols increase the number
of operations and also slow down the rate of data being sent or received over WiMAX …

[PDF][PDF] Design and Implementation of Multi-Rate Encryption Unit Based on Customized AES

AD Elbayoumy, H Eldemerdash - International Journal of Video & Image …, 2011 - Citeseer
The demand for security in wireless communication channels is rapidly growing. In this
exertion a proposed encryption unit which adopts the AES (Advanced Encryption Standard) …

[PDF][PDF] Design of 128-Bit AES Algorithm with UART Soft Core for Data Secure

V NANDOKAR, H UPADHYAY - 2016 - ijsetr.com
There are many encryption algorithms, but Advanced Encryption Standard (AES) 128-bit to
be used in many applications for protecting sensitive information/data. Typical examples are …