General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail: ijcte@iacsitp.com
    • Journal Metrics:

Editor-in-chief
Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2012 Vol.4(2): 158-164 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2012.V4.442

A New Approach for Designing Key-Dependent S-Box Defined over GF (24) in AES

Hanem M. El-Sheikh, Omayma A. El-Mohsen, Senior Member, IACSIT, Talaat Elgarf, and Abdelhalim Zekry, Senior Member, IACSIT

Abstract—In this paper a new approach for designing S-box in Advanced Encryption Standard (AES) is proposed. The proposed S-box is constructed from small S-boxes defined over GF (24) instead of GF (28) as in traditional AES. Rijndael Algorithm (RA), as one of AES standards, is modified by applying the new approach. The Modified Rijndael Algorithm (MRA) is constructed by replacing the S-box of RA by small S-boxes, and the key expansion procedure of RA is modified consequently. Each one of the small S-boxes has different equation and each equation is extracted using one of the three irreducible polynomials existing in GF (24). So, detecting different equations by cryptanalysts is very difficult compared to the S-box of RA which uses one equation and one irreducible polynomial. The substitution from small S-boxes is done based on the round key, so this achieves diffusion, confusion and therefore security for MRA. The MRA is tested using avalanche effect and strict avalanche criterion (SAC) to evaluate security. The performance evaluation is calculated and proved that MRA is more suitable for the applications that require security and QoS such as voice over IP (VoIP).

Index Terms—AES, key dependent S-box, finite field, cryptographic algorithms, strict avalanche criterion.

Hanem M. El-Sheikh was with the Faculty of Engineering, Alexandria University, Alexandria, Egypt (e-mail: honymora@yahoo.com).
Omayma A. Mohsen is with the Switching Department, and the scientific committee at the National Telecommunication Institute.
Abdelhalim Zekry is with the electronics at faculty of Engineering, Ain Shams University, Cairo, Egypt.

[PDF]

Cite: Hanem M. El-Sheikh, Omayma A. El-Mohsen, Talaat Elgarf, and Abdelhalim Zekry, "A New Approach for Designing Key-Dependent S-Box Defined over GF (24) in AES," International Journal of Computer Theory and Engineering vol. 4, no. 2, pp. 158-164, 2012.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.