MODIFICATION ADVANCED ENCRYPTION STANDARD (AES) ALGORITHM WITH PERFECT STRICT AVALANCHE CRITERION S-BOX
نویسندگان
چکیده
The Advanced Encryption Standard or better known as the AES Algorithm is a standard algorithm and has been widely used an application of cryptography. Currently, lot research developing about attacks on algorithm. Therefore, there have many studies related to modifications with aim increasing security produce alternatives encryption algorithms that can be secure data. In this study, were made by replacing S-box using perfect SAC in SubBytes process. Perfect exact average value 0.5. will must good strength, therefore tested, namely AC, SAC, BIC, XOR Table Distribution, LAT Distribution tests. Based results it was found had almost same test S-box. Furthermore, after applied algorithm, analyzed how effect these uses randomness testing for block cipher strict avalanche criterion (SAC) test. meet since second round than original values 0.5003 0.5019.
منابع مشابه
Optimization of AES Encryption Algorithm with S- Box
In any wireless communication, security is crucial during data transmission. The encryption and decryption of data is the major challenge faced in the wireless communication for security of the data. These algorithms are used to ensure the security in the transmission channels. Similarly hardware utilization and power consumption are another major things to be considered since most of the mobil...
متن کاملStrict key avalanche criterion
A block cipher, such as the DES cipher, is used to encrypt binary plaintext in discrete blocks of length n using a key of length m, to form ciphertext blocks of length n. A block cipher is said to satisfy the strict key avalanche criterion if a one bit change in the key causes on the average one half of the ciphertext bit positions to change. In this paper the importance of the strict key avala...
متن کاملHardware Visualization of the Advanced Encryption Standard (AES) Algorithm
Advanced Encryption Standard (AES) was issued as FIPS by NIST as a successor to data encryption standard (DES) algorithms. The applications of the AES are wide including any sensitive data requires cryptographic protection before communication or storage. Thus, many students are interested in learning how the AES is working. One of the inherent limitations of traditional methods for explaining/...
متن کاملApplication Specific Scalable Architectures for Advanced Encryption Standard (AES) Algorithm
The work presented proposes two diverse FPGA based architectures with high-speed and low area constraints for suitable implementation of Advanced Encryption Standard (AES). The main focus of this paper is to compare different design architectures existing in literature with the proposed ones, based on application specific constraints. The high speed design presented here proposes a good enginee...
متن کاملAdvanced Encryption Standard (AES) in Counter Mode
The Advanced Encryption Standard (AES), also known as Rijndael is a block cipher. The National Institute of Standards and Technology (NIST) has defined five modes of operation for AES. Each of these modes has different characteristics. The five modes are: Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher FeedBack (CFB), Output FeedBack (OFB), and Counter (CTR). Only AES Counter mo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Jurnal Teknik Informatika
سال: 2022
ISSN: ['1979-9160', '2549-7901']
DOI: https://doi.org/10.20884/1.jutif.2022.3.4.352