• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Nov 09, 2017 News!Vol.9, No.5 has been published with online version. 16 peer reviewed articles from 11 specific areas are published in this issue.   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2012 Vol.4(2): 158-164 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2012.V4.442

A New Approach for Designing Key-Dependent S-Box Defined over GF (24) in AES

Hanem M. El-Sheikh, Omayma A. El-Mohsen, Senior Member, IACSIT, Talaat Elgarf, and Abdelhalim Zekry, Senior Member, IACSIT
Abstract—In this paper a new approach for designing S-box in Advanced Encryption Standard (AES) is proposed. The proposed S-box is constructed from small S-boxes defined over GF (24) instead of GF (28) as in traditional AES. Rijndael Algorithm (RA), as one of AES standards, is modified by applying the new approach. The Modified Rijndael Algorithm (MRA) is constructed by replacing the S-box of RA by small S-boxes, and the key expansion procedure of RA is modified consequently. Each one of the small S-boxes has different equation and each equation is extracted using one of the three irreducible polynomials existing in GF (24). So, detecting different equations by cryptanalysts is very difficult compared to the S-box of RA which uses one equation and one irreducible polynomial. The substitution from small S-boxes is done based on the round key, so this achieves diffusion, confusion and therefore security for MRA. The MRA is tested using avalanche effect and strict avalanche criterion (SAC) to evaluate security. The performance evaluation is calculated and proved that MRA is more suitable for the applications that require security and QoS such as voice over IP (VoIP).

Index Terms—AES, key dependent S-box, finite field, cryptographic algorithms, strict avalanche criterion.

Hanem M. El-Sheikh was with the Faculty of Engineering, Alexandria University, Alexandria, Egypt (e-mail: honymora@yahoo.com).
Omayma A. Mohsen is with the Switching Department, and the scientific committee at the National Telecommunication Institute.
Abdelhalim Zekry is with the electronics at faculty of Engineering, Ain Shams University, Cairo, Egypt.

[PDF]

Cite: Hanem M. El-Sheikh, Omayma A. El-Mohsen, Talaat Elgarf, and Abdelhalim Zekry, "A New Approach for Designing Key-Dependent S-Box Defined over GF (24) in AES," International Journal of Computer Theory and Engineering vol. 4, no. 2, pp. 158-164, 2012.
Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com