# Substitution-Permutation Network Cryptosystems Using Key-Dependent S-Boxes

@inproceedings{Keliher1997SubstitutionPermutationNC, title={Substitution-Permutation Network Cryptosystems Using Key-Dependent S-Boxes}, author={Liam Keliher}, year={1997} }

Substitution-permutation networks (SPNs) are an important class of private key cryptosystems, having substitution boxes (s-boxes) as a critical internal component. Much of the research into s-boxes has focussed on determining those s-box properties which yield a cryptographically strong SPN. We investigate s-boxes which are generated in a pseudo-random fashion from a key. This approach has the advantage of decreasing the e ectiveness of certain attacks. In addition, combinatorial results give…

No Paper Link Available

## 9 Citations

### Brownian Techniques for Constructing High-Strong Cryptographic S-boxes

- Mathematics, Computer ScienceICSDE'18
- 2018

Brownian motion is used to generate strong 8 × 8 S-box generated from Brownian motion using a secret key, which will increase the complexity for cryptanalysis attacks.

### Avalanche and Bit Independence Properties for the Ensembles of Randomly Chosen n × n S-Boxes

- Computer Science
- 2001

Cryptographic test methods such as avalanche, strict avalanche and bit independence criteria, which measure the degree of security of the s-boxes of substitution-permutation networks, are applied to randomly generated ensembles of n× n s- boxes to find out to what extent those criteria measure different cryptographic aspects of s-boxing.

### An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box

- Computer Science
- 2014

The results showed that the RAF algorithm that integrates the CCS and dynamic P-Box serves as an effective approach that can consume less memory and strengthen security.

### Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES

- Computer Science, MathematicsInf. Secur. J. A Glob. Perspect.
- 2014

This article uses RC4 and AES Key Expansion algorithms to generate dynamic S-box for AES to generate more secure S-boxes and examines the security results to find out which one will have better results in security analysis.

### Feistel-inspired scrambling improves the quality of linear congruential generators

- Computer ScienceMonte Carlo Methods Appl.
- 2017

The Feistel-inspired scrambling technique is modular, and can be applied to any 64-bit PRNG, and it is believed that it can serve as an inexpensive model for a scrambler that can be used with most PRNGs via post-processing.

### Randamization Technique for Desiging of Substitution Box in Data Encryption Standard Algorithm

- Computer ScienceInternational Journal of Mathematical Sciences and Computing
- 2019

The results of experimentation prove that proposed randomized approach also generate promising results, which can be particularly useful for devices with less processing power.

### Abacus : A Candidate for SHA-3

- Computer Science
- 2008

Abacus is a byte-oriented cryptographic sponge that digests a message in one-byte blocks and outputs a hash of any byte length, which makes it resistant to the attacks that plague the MD5/SHA family.

### A New Approach on AES to Increase the Resistivity of the Cipher System

- Computer ScienceInternational Journal of Computer Applications
- 2020

The proposed work aims to provide confidentiality through Advanced Encryption Standard (AES) through the addition in the existing AES algorithm by including a new operation called Math Trick and moderately increased security compared to the existing system.

### New immobilizer concept based on Scania’s electrical platform

- Computer Science
- 2019

Immobilizers are security systems that are set up and installed in modern vehicles in order to prevent thieves from starting the vehicles. The idea is that if any wrong keys are used to start the v…

## References

SHOWING 1-10 OF 41 REFERENCES

### Constructing Symmetric Ciphers Using the CAST Design Procedure

- Computer Science, MathematicsDes. Codes Cryptogr.
- 1997

This paper describes the CAST design procedure for constructing a family of DES-like Substitution-Permutation Network (SPN) cryptosystems which appear to have good resistance to differential…

### Differential cryptanalysis of DES-like cryptosystems

- Computer Science, MathematicsJournal of Cryptology
- 2004

A new type of cryptanalytic attack is developed which can break the reduced variant of DES with eight rounds in a few minutes on a personal computer and can break any reduced variantof DES (with up to 15 rounds) using less than 256 operations and chosen plaintexts.

### Avalanche Characteristics of Substitution-Permutation Encryption Networks

- Computer Science, MathematicsIEEE Trans. Computers
- 1995

The results presented in this paper demonstrate that the avalanche behavior of encryption networks can be improved by using larger S- boxes and it is shown that increasing the diffusion properties of the S-boxes or replacing the permutations by diffusive linear transformations is effective in improving the network avalanche characteristics.

### Probabilistic completeness of substitution-permutation encryption networks

- Computer Science, Mathematics
- 1982

A variant of the substitution-permutation encryption network, which incorporates random permutations, is presented and shown to retain, with a very high probability, the cryptographically important…

### On the Design of S-Boxes

- Mathematics, Computer ScienceCRYPTO
- 1985

The ideas of completeness and the avalanche effect were first introduced by Kam and Davida [1] and Feistel [2], respectively. If a cryptographic transformation is complete, then each ciphertext bit…

### On the Distribution of Characteristics in Bijective Mappings

- Mathematics, Computer ScienceEUROCRYPT
- 1993

It is proved that if π: Z2m→ Z2mis a bijective mapping, then the expected size of the largest entry in the XOR table for π is bounded by 2m, and it is demonstrated that there are easily constructed classes of iterated mappings for which the probability of a differential-like attack succeeding is very small.

### The design of complete encryption networks using cryptographically equivalent permutations

- Computer Science, MathematicsComput. Secur.
- 1983

### Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis

- Computer Science, MathematicsInf. Process. Lett.
- 1995

### Linear Cryptanalysis Method for DES Cipher

- Computer Science, MathematicsEUROCRYPT
- 1993

A new method is introduced for cryptanalysis of DES cipher, which is essentially a known-plaintext attack, that is applicable to an only-ciphertext attack in certain situations.

### Some cryptographic techniques for machine-to-machine data communications

- Computer Science, MathematicsProceedings of the IEEE
- 1975

Some of the threats to the integrity of multiuser teleprocessing systems and to the data they contain can be countered by the use of cryptography. Stream-generator ciphers are not ideally suited for…