Vol.5, No.1, February 2016.                                                                                                               ISSN: 2217-8309

                                                                                                                                                          eISSN: 2217-8333

 

TEM Journal

 

TECHNOLOGY, EDUCATION, MANAGEMENT, INFORMATICS

Association for Information Communication Technology Education and Science


Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output

 

Balajee Maram K, J M Gnanasekar

 

© 2016 Balajee Maram K and J M Gnanasekar: published by UIKTEN. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. (CC BY-NC-ND 4.0)

 

Citation Information: TEM Journal. Volume 5, Issue 1, Pages 67–75, ISSN 2217-8309, DOI: 10.18421/TEM51-11, February 2016

 

Abstract:

 

Data security is a major issue because of rapid evolution of data communication over unsecured internetwork. Here the proposed system is concerned with the problem of randomly generated S-box. The generation of S-box depends on Pseudo-Random-Number-Generators and shared-secret-key. The process of Pseudo-Random-Number-Generator depends on large prime numbers. All Pseudo-Random-Numbers are scrambled according to shared-secret-key. After scrambling, the S-box is generated. In this research, large prime numbers are the inputs to the Pseudo-Random-Number-Generator. The proposed S-box will reduce the complexity of S-box generation. Based on S-box parameters, it experimentally investigates the quality and robustness of the proposed algorithm which was tested. It yields better results with the S-box parameters like Hamming Distance, Balanced Output and Avalanche Effect and can be embedded to popular cryptography algorithms

 

Keywords – S-BOX, Data Security, Large Prime Number, Random Number, Cryptography

 

-----------------------------------------------------------------------------------------------------------

Full text PDF >  

-----------------------------------------------------------------------------------------------------------

 


Copyright © 2012-2016 UIKTEN, All Rights reserved
Copyright licence: All articles are licenced via Creative Commons CC BY-NC-ND 4.0 licence