A generalized methodology for designing non-linear elements in symmetric cryptographic primitives

@article{Easttom2018AGM,
  title={A generalized methodology for designing non-linear elements in symmetric cryptographic primitives},
  author={Chuck Easttom},
  journal={2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)},
  year={2018},
  pages={444-449}
}
  • Chuck Easttom
  • Published 2018
  • Computer Science
  • 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)
  • Symmetric ciphers are widely used for a variety of security purposes. These cryptographic primitives are ubiquitous. The primary source of non-linearity in any symmetric cryptographic primitive is the substitution box, or s-box. While there have been many proposals for varying ways to construct s-box's, this paper proposes a generalized methodology that can be used with any symmetric cipher, either in the creation of new s-boxes, during cipher design, the evaluation of the efficacy of existing… CONTINUE READING
    2 Citations

    Figures and Topics from this paper

    An Examination of Inefficiencies in Key Dependent Variations of the Rijndael S-Box
    • Chuck Easttom
    • Computer Science
    • Electrical Engineering (ICEE), Iranian Conference on
    • 2018
    • 2
    Random S-Boxes Generation Methods for Symmetric Cryptography
    • 3
    • Highly Influenced

    References

    SHOWING 1-10 OF 27 REFERENCES
    Key-Dependent S-Box Generation in AES Block Cipher System
    • 77
    • PDF
    A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique
    • 26
    New Dynamical Key Dependent S-Box based on chaotic maps
    • 4
    • PDF
    Enhancing AES using Novel Block Key Generation Algorithm and Key Dependent S-boxes
    • 3
    Crypto Archeology : Unearthing Design Methodologies of DES S-Boxes
    • 1
    • PDF
    Random S-Box generation in AES by changing irreducible polynomial
    • 8
    Cryptographic properties of modified AES-like S-boxes
    • 9
    • Highly Influential
    AN IMPROVED AES S-BOX AND ITS PERFORMANCE ANALYSIS
    • 27
    • PDF