Abstract

Abstract In AES, the standard S-Box is usually generated by using a particular irreducible polynomial {11B} in GF(2 8 ) as the modulus, with a particular additive constant {63}. In this paper, it has been shown that, by maintaining the criteria defined by Rijndael, other moduli and constants can also be used to generate different unknown S-Boxes, thus preventing linear and differential cryptanalysis. A comparative study has been made on the randomness of AES ciphertexts generated, using these S-Boxes, by the NIST Test Suite coded by us. It has been found that besides using the standard one, other modulus polynomials and additive constants are also able to generate equally or better random ciphertexts. Moreover, they can act as additional key-inputs to AES, thus increasing the key-space.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.