Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output Cover Image

Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output
Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output

Author(s): Maram K Balajee, J M Gnanasekar
Subject(s): ICT Information and Communications Technologies
Published by: UIKTEN - Association for Information Communication Technology Education and Science
Keywords: S-BOX; Data Security; Large Prime Number; Random Number;Cryptography;

Summary/Abstract: Data security is a major issue because of rapid evolution of data communication over unsecured internetwork. Here the proposed system is concerned with the problem of randomly generated S-box. The generation of S-box depends on Pseudo-Random-Number-Generators and shared-secret-key. The process of Pseudo-Random-Number-Generator depends on large prime numbers. All Pseudo-Random-Numbers are scrambled according to shared-secret-key. After scrambling, the S-box is generated. In this research, large prime numbers are the inputs to the Pseudo-Random-Number-Generator. The proposed S-box will reduce the complexity of S-box generation. Based on S-box parameters, it experimentally investigates the quality and robustness of the proposed algorithm which was tested. It yields better results with the S-box parameters like Hamming Distance, Balanced Output and Avalanche Effect and can be embedded to popular cryptography algorithms

  • Issue Year: 5/2016
  • Issue No: 1
  • Page Range: 67-75
  • Page Count: 9
  • Language: English
Toggle Accessibility Mode