Generating of A Dynamic and Secure S-Box for AES Block Cipher System Based on Modified Hexadecimal Playfair Cipher
DOI:
https://doi.org/10.21271/ZJPAS.36.5.8Keywords:
Cryptography, Encryption, Decryption, Symmetric Key, AES cryptosystem, Playfair, S-BoxAbstract
In today's digital world, the extensive use of devices, including smartphones, tablets, IoT devices, and the internet, emphasizes the necessity for strong security measures. These measures are essential to safeguard both user data and sensitive government information. As technology advances, the enhancement of cryptographic methods becomes imperative, ensuring alignment with this rapid progression. This paper introduces a novel approach to encrypting classified data using the modified AES cipher system. It employs a dynamic and secure substitution byte operation with a 4×4 matrix, replacing the static and public 16×16 S-box found in the original version of AES. To construct the presented S-box, the system makes a secret key of 56 bytes (4×14 Rounds), where each round of the AES-256 utilizes 4 bytes to generate a 4×4 Hexadecimal Playfair matrix. By altering the S-boxes in each round and block (where each block utilizes AES key expansion to generate a 56-byte secret key for the Playfair matrix), it becomes feasible to produce distinct encrypted blocks even when the original blocks remain identical. In terms of security, the effectiveness of the provided method has been verified by experimental and analytical studies including the Avalanche effect, Balanced output, Hamming distance, and Time complexity. The result shows that the Avalanche effect of the proposed method exceeds 50% and increase the time of brute force attack. Moreover, the proposed algorithm exhibits impressive execution speed, handling approximately 200 KB in just one second.
References
Adil Waheed, F. S. M. M. S. M. M. A., 2024. Molding Robust S-Box Design Based On Linear Fractional Transformation And Multilayer Perceptron: Applications To Multimedia Security. Egyptian Informatics Journal, Volume 26.
https://doi.org/10.1016/j.eij.2024.100480
Aisha Ejaz, I. A. S. U. I. A. R. A. K., 2021. A Secure Key Dependent Dynamic Substitution Method For Symmetric Cryptosystems. Peerj Comput. Sci, Volume 7. https://doi.org/10.7717/peerj-cs.587
Al-Dweik, A. Y., Hussain, I., Saleh, M. & Mustafa, M., 2022. A Novel Method To Generate Key-Dependent S-Boxes With Identical Algebraic Properties. Journal Of Information Security And Applications, Volume 64. http://doi.org/10.1016/j.jisa.2021.103065
Ali, R. Et Al., 2023. A Robust S Box Design Using Cyclic Groups And Image Encryption. Ieee Access, Volume 11, P. 135880135890.
http://doi.org/10.1109/ACCESS.2023.3337443
Assafli, H. T. & Hashim, I. A., 2020. Generation And Evaluation Of A New Time-Dependent Dynamic S-Box Algorithm For Aes Block Cipher Cryptosystems. S.L., S.N.
http://doi.org/10.1088/1757-899X/978/1/012042
Balajee, M. & Gnanasekar, J., 2016. Evaluation Of Key Dependent S-Box Based Data Security Algorithm Using Hamming Distance And Balanced Output. Tem Journal, 5(1), Pp. 67-75.
DOI: 10.18421/TEM51-11
Ibrahim, D., Ahmed, K., Abdallah, M. & Ali, A., 2022. A New Chaotic-Based Rgb Image Encryption Technique Using. https://doi.org/10.3390/cryptography6020028
James, D. & Priya, T., 2023. An Innovative Approach For Dynamic Key Dependent S-Box To Enhance Security Of Iot Systems.. Measurement: Sensors, Volume 30. https://doi.org/10.1016/j.measen.2023.100923
Mahmood Malik, M. S. A. A. M. A. A. K. M. A. A. E.-U.-H. M. A. S. S. N. M. A. R. M. A. A. W., 2020. Generation Of Highly Nonlinear And Dynamic Aes Substitution-Boxes (S-Boxes) Using Chaos-Based Rotational Matrices. Ieee Access, Volume 8, Pp. 35682-35695. http://doi.org/10.1109/ACCESS.2020.2973679
Marzan, R. M. & Sison, A. M., 2019. An Enhanced Key Security Of Playfair Cipher Algorithm. Malaysia, Proceedings Of The 2019 8th International Conference On Software And Computer Applications, Pp.457-461. http://doi.org/10.1145/3316615.3316689
Razaq, A. Et Al., 2024. Fuzzy Logic-Based Substitution-Box For Robust Medical Image Encryption In Telemedicine. Ieee Access, Volume 12, Pp. 7584-7608. http://doi.org/10.1109/ACCESS.2024.3351794
Stamp, M., 2021. Information Security: Principles And Practice. 3rd Ed. S.L.:Wiley. ISBN: 978-1-119-50588-4
Taher, H. M., Al-Rahman, S. Q. A. & Shawkat, S. A., 2022. Best S-Box Amongst Differently Sized S-Boxes Based On The Avalanche Effect In. International Journal Of Electrical And Computer Engineering (Ijece), December.Pp. 6535-6544. http://doi.org/10.11591/ijece.v12i6.pp6535-6544
Tao, B. & Wu, H., 2015. Improving The Biclique Cryptanalysis Of Aes. S.L., Springer, Pp. 39-56. https://doi.org/10.1007/978-3-319-19962-7_3
Zahid, Et Al., 2021. Dynamic S-Box Design Using A Novel Square Polynomial Transformation And Permutation. Ieee Access, Volume 9, Pp. 82390--82401. http://doi.org/10.1109/ACCESS.2021.3086717
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Newroz Nooralddin Abdulrazaq
This work is licensed under a Creative Commons Attribution 4.0 International License.