A proposal for improving AES S-box with rotation and key-dependent
In this paper, a new AES-like design for key-dependent AES using S-box rotation is proposed. We also show how this property can be used to make the S-box key-dependent hence make the AES stronger. The cipher structure resembles the original AES, only the S-box is made key-dependent without changing...
| Main Authors: | Juremi, Julia, Mahmod, Ramlan, Sulaiman, Salasiah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/47704/ http://psasir.upm.edu.my/id/eprint/47704/1/A%20proposal%20for%20improving%20AES%20S-box%20with%20rotation%20and%20key-dependent.pdf |
Similar Items
The new approach of Rijndael key schedule
by: Sulaiman, Salasiah, et al.
Published: (2012)
by: Sulaiman, Salasiah, et al.
Published: (2012)
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014)
by: AlDabbagh, S.S.M., et al.
Published: (2014)
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
by: Agarwal, Praveen, et al.
Published: (2018)
by: Agarwal, Praveen, et al.
Published: (2018)
Key dependent dynamic S-Boxes on 3D cellular automata for block cipher
by: Md Yasin, Sharifah, et al.
Published: (2020)
by: Md Yasin, Sharifah, et al.
Published: (2020)
Randomness improvement of AES using MKP
by: Al-Alak, Saif, et al.
Published: (2013)
by: Al-Alak, Saif, et al.
Published: (2013)
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
by: Nejad, Farshid Hossein, et al.
Published: (2014)
by: Nejad, Farshid Hossein, et al.
Published: (2014)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
The lowdown on the AES
by: Habib, Shahanaaz
Published: (2012)
by: Habib, Shahanaaz
Published: (2012)
AES bukan terbaik
by: Yusoff Bakri, Mohamad Hafiz
Published: (2019)
by: Yusoff Bakri, Mohamad Hafiz
Published: (2019)
A modified approach to improve the performance of AES using feistel structure
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
Malay speaker dependent digits recognition
with improved backpropagation
by: Ummu Salamah Mohamad,, et al.
Published: (2004)
by: Ummu Salamah Mohamad,, et al.
Published: (2004)
Malay speaker dependent digits recognition with improved backpropagation
by: Mohamad, Ummu Salamah, et al.
Published: (2004)
by: Mohamad, Ummu Salamah, et al.
Published: (2004)
Advanced Encryption Standard (AES)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Secure mobile AES encryptor (SMAE)
by: Satia, Anbalagan
Published: (2016)
by: Satia, Anbalagan
Published: (2016)
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009)
by: RezaeiPour, Davood, et al.
Published: (2009)
Effective implementation of AES-XTS on FPGA
by: Ahmed, Shakil, et al.
Published: (2011)
by: Ahmed, Shakil, et al.
Published: (2011)
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Pursue dual-award MBA at AeU
Published: (2010)
Published: (2010)
AeU teams up with Indian counterparts
Published: (2010)
Published: (2010)
Finding the lost Submarine: The mystery of AE1
by: Seal, Graham
Published: (2008)
by: Seal, Graham
Published: (2008)
Key transformation approach for Rijndael security.
by: Muda, Zaiton, et al.
Published: (2010)
by: Muda, Zaiton, et al.
Published: (2010)
Rotating and non-rotating sensors for improving condition monitoring of wind turbines
by: Al-Hadad, M., et al.
Published: (2017)
by: Al-Hadad, M., et al.
Published: (2017)
Acoustic Emission (Ae) Techniques For The Damage Assessment Of Structures.
by: Muhamad Bunnori, Nor Azura, et al.
Published: (2012)
by: Muhamad Bunnori, Nor Azura, et al.
Published: (2012)
Increasing Data Anonymity using AES and Privacy Technique
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
AeU offers open Source ERP programme
Published: (2009)
Published: (2009)
AeU library enters open source territory
Published: (2010)
Published: (2010)
Consistency of urban background black carbon concentration measurements by portable AE51 and reference AE22 aethalometers: effect of corrections for filter loading
by: Masey, Nicola, et al.
Published: (2020)
by: Masey, Nicola, et al.
Published: (2020)
Frequency dependent RSSI behavior of rotating polarization waves in diverse environmental conditions
by: Ali, Muhammad Moazzam, et al.
Published: (2024)
by: Ali, Muhammad Moazzam, et al.
Published: (2024)
A framework for GPU-accelerated AES-XTS encryption in mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2011)
by: Alomari, Mohammad Ahmed, et al.
Published: (2011)
Verilog design of a 256-bit AES crypto processor core
by: Lai, Yit Pin
Published: (2007)
by: Lai, Yit Pin
Published: (2007)
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
by: Moh, Heng Huong
Published: (2014)
by: Moh, Heng Huong
Published: (2014)
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013)
by: Arif Hanafi, Sharif Katullah
Published: (2013)
Speed Efficient Hardware Implementation Of Advanced Encryption Standard (Aes)
by: Low, Chiau Thian
Published: (2017)
by: Low, Chiau Thian
Published: (2017)
Self-initiated expatriation: changing the ontological and methodological box
by: McKenna, Stephen, et al.
Published: (2016)
by: McKenna, Stephen, et al.
Published: (2016)
Development of DNA-based dynamic key-dependent block cipher
by: Saeed, Auday H.
Published: (2015)
by: Saeed, Auday H.
Published: (2015)
Efficacy test of bacillus thuringiensis israelensis against larvae cx.quinquefasciatus, ae.aegypti, and ae.albopictus in various containers at laboratory of parasitology Faculty of Medicine, Universitas Indonesia
by: Lukmanul H,, et al.
Published: (2011)
by: Lukmanul H,, et al.
Published: (2011)
Selective video encryption algorithm based on H.264/AVC and AES
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
Design of an Ultra High Speed AES Processor for Next Generation IT Security.
by: Aris, Ishak, et al.
Published: (2011)
by: Aris, Ishak, et al.
Published: (2011)
Early detection of corrosion activity in reinforced concrete slab by AE technique
by: Ismail, Mohamed A., et al.
Published: (2006)
by: Ismail, Mohamed A., et al.
Published: (2006)
Similar Items
-
The new approach of Rijndael key schedule
by: Sulaiman, Salasiah, et al.
Published: (2012) -
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014) -
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
by: Agarwal, Praveen, et al.
Published: (2018) -
Key dependent dynamic S-Boxes on 3D cellular automata for block cipher
by: Md Yasin, Sharifah, et al.
Published: (2020) -
Randomness improvement of AES using MKP
by: Al-Alak, Saif, et al.
Published: (2013)