Generation of good cryptographic substitution-boxes
This research aimed to create a cryptographically strong and efficient 8-by-8 bit Sbox from numerous candidate 8-by-8 bit Sboxes. Various methods are used to create the new Sboxes, mainly using Feistel construction. Thereafter, the candidate Sboxes are compared using cryptographic criteria such as a...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/144743 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-144743 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1447432023-02-28T23:18:35Z Generation of good cryptographic substitution-boxes Ong, Wee Hern Thomas Peyrin School of Physical and Mathematical Sciences thomas.peyrin@ntu.edu.sg Science::Mathematics This research aimed to create a cryptographically strong and efficient 8-by-8 bit Sbox from numerous candidate 8-by-8 bit Sboxes. Various methods are used to create the new Sboxes, mainly using Feistel construction. Thereafter, the candidate Sboxes are compared using cryptographic criteria such as absence of fixed points, differential uniformity, maximal linear bias and minimum algebraic degree. The results revealed that although Feistel construction methods may not be able to improve the cryptographic bounds of the 8-by-8 bit Sbox, compared to AES Sbox, but slight modifications made to existing 8-by-8 bit Sboxes (except AES) allow an improvement in the construction of 8-by-8 bit Sboxes, inching closer to the AES Sbox cryptographic standards. This might be due to different methods of construction of Sboxes which arise to different Sboxes with varying cryptographic properties. Keywords – security, attacks, substitution boxes Bachelor of Science in Mathematical Sciences 2020-11-23T05:35:23Z 2020-11-23T05:35:23Z 2020 Final Year Project (FYP) https://hdl.handle.net/10356/144743 en application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Science::Mathematics |
spellingShingle |
Science::Mathematics Ong, Wee Hern Generation of good cryptographic substitution-boxes |
description |
This research aimed to create a cryptographically strong and efficient 8-by-8 bit Sbox from numerous candidate 8-by-8 bit Sboxes. Various methods are used to create the new Sboxes, mainly using Feistel construction. Thereafter, the candidate Sboxes are compared using cryptographic criteria such as absence of fixed points, differential uniformity, maximal linear bias and minimum algebraic degree. The results revealed that although Feistel construction methods may not be able to improve the cryptographic bounds of the 8-by-8 bit Sbox, compared to AES Sbox, but slight modifications made to existing 8-by-8 bit Sboxes (except AES) allow an improvement in the construction of 8-by-8 bit Sboxes, inching closer to the AES Sbox cryptographic standards. This might be due to different methods of construction of Sboxes which arise to different Sboxes with varying cryptographic properties.
Keywords – security, attacks, substitution boxes |
author2 |
Thomas Peyrin |
author_facet |
Thomas Peyrin Ong, Wee Hern |
format |
Final Year Project |
author |
Ong, Wee Hern |
author_sort |
Ong, Wee Hern |
title |
Generation of good cryptographic substitution-boxes |
title_short |
Generation of good cryptographic substitution-boxes |
title_full |
Generation of good cryptographic substitution-boxes |
title_fullStr |
Generation of good cryptographic substitution-boxes |
title_full_unstemmed |
Generation of good cryptographic substitution-boxes |
title_sort |
generation of good cryptographic substitution-boxes |
publisher |
Nanyang Technological University |
publishDate |
2020 |
url |
https://hdl.handle.net/10356/144743 |
_version_ |
1759857782362734592 |