Post-processing Algorithms for Performance Improvement of Substitution Boxes Based on Chaotic System

作者: Yasar Selim Bahceci , Fatih Ozkaynak

DOI: 10.1109/DSPA48919.2020.9213306

关键词:

摘要: Substitution boxes are an important cryptographic primitive. Design techniques based on mathematical transformations, a design technique of these primitives, have played particularly role in the block encryption algorithm known as Advanced Encryption Standard (AES). Because AES substitution box structure has best properties. However, various weaknesses arise when implementation attacks considered. Although properties structures random selection worse than structure, they more successful to prevent attacks. The aim this study is investigate performance improvement algorithms selection. In study, it been shown that improvements can be achieved with proposed post-processing algorithms. These results thought make significant contributions future, especially countermeasure for prevention

参考文章(15)
Ljupco Kocarev, Shiguo Lian, Chaos-based Cryptography: Theory, Algorithms and Applications Springer Publishing Company, Incorporated. ,(2011)
Dragan Lambić, A novel method of S-box design based on discrete chaotic map Nonlinear Dynamics. ,vol. 87, pp. 2407- 2413 ,(2017) , 10.1007/S11071-016-3199-X
Fatih Ozkaynak, Role of NPCR and UACI tests in security problems of chaos based image encryption algorithms and possible solution proposals 2017 International Conference on Computer Science and Engineering (UBMK). pp. 621- 624 ,(2017) , 10.1109/UBMK.2017.8093481
Fatih Özkaynak, From Biometric Data to Cryptographic Primitives: A New Method for Generation of Substitution Boxes international conference on biomedical engineering. pp. 27- 33 ,(2017) , 10.1145/3143344.3143355
Fatih Özkaynak, Construction of robust substitution boxes based on chaotic systems Neural Computing and Applications. ,vol. 31, pp. 3317- 3326 ,(2019) , 10.1007/S00521-017-3287-Y
Musheer Ahmad, Zishan Ahmad, Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption International Journal of Rough Sets and Data Analysis. ,vol. 5, pp. 131- 147 ,(2018) , 10.4018/IJRSDA.2018040107