Security of present s-box
Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role to secure RFID’s tag. One of the common...
| Main Authors: | , |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/28028/ http://irep.iium.edu.my/28028/4/ieee-imad-sf.pdf |
| _version_ | 1848779907542286336 |
|---|---|
| author | Taha, Imad Salim, Sufyan |
| author_facet | Taha, Imad Salim, Sufyan |
| author_sort | Taha, Imad |
| building | IIUM Repository |
| collection | Online Access |
| description | Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role to secure RFID’s tag. One of the common lightweight block ciphers is PRESENT. In this paper, we attended both conditions of PRESENT substitution box S-box and those conditions of 4-bit S-box. They were studied and analyzed thoroughly in relation with linear and differential cryptanalysis. The results show that there is conflict in one of the conditions of PRESENT S-box. |
| first_indexed | 2025-11-14T15:25:14Z |
| format | Proceeding Paper |
| id | iium-28028 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T15:25:14Z |
| publishDate | 2012 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-280282013-07-02T07:29:37Z http://irep.iium.edu.my/28028/ Security of present s-box Taha, Imad Salim, Sufyan QA75 Electronic computers. Computer science Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role to secure RFID’s tag. One of the common lightweight block ciphers is PRESENT. In this paper, we attended both conditions of PRESENT substitution box S-box and those conditions of 4-bit S-box. They were studied and analyzed thoroughly in relation with linear and differential cryptanalysis. The results show that there is conflict in one of the conditions of PRESENT S-box. 2012-11-28 Proceeding Paper NonPeerReviewed application/pdf en http://irep.iium.edu.my/28028/4/ieee-imad-sf.pdf Taha, Imad and Salim, Sufyan (2012) Security of present s-box. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses- KL. http://www.acsat.co.uk |
| spellingShingle | QA75 Electronic computers. Computer science Taha, Imad Salim, Sufyan Security of present s-box |
| title | Security of present s-box |
| title_full | Security of present s-box |
| title_fullStr | Security of present s-box |
| title_full_unstemmed | Security of present s-box |
| title_short | Security of present s-box |
| title_sort | security of present s-box |
| topic | QA75 Electronic computers. Computer science |
| url | http://irep.iium.edu.my/28028/ http://irep.iium.edu.my/28028/ http://irep.iium.edu.my/28028/4/ieee-imad-sf.pdf |