Enhancing block cipher security with key-dependent random XOR tables generated via hadamard matrices and Sudoku game

Author:

Hoang Linh Dinh1,Tran Thi Luong2

Affiliation:

1. Institute of Cryptographic Science and Technology, Lang Ha, Dong Da, Hanoi, Vietnam

2. Academy of Cryptography Techniques, Tan Trieu, Thanh Tri, Hanoi, Vietnam

Abstract

The XOR operator is a simple yet crucial computation in computer science, especially in cryptography. In symmetric cryptographic schemes, particularly in block ciphers, the AddRoundKey transformation is commonly used to XOR an internal state with a round key. One method to enhance the security of block ciphers is to diversify this transformation. In this paper, we propose some straightforward yet highly effective techniques for generating t-bit random XOR tables. One approach is based on the Hadamard matrix, while another draws inspiration from the popular intellectual game Sudoku. Additionally, we introduce algorithms to animate the XOR transformation for generalized block ciphers. Specifically, we apply our findings to the AES encryption standard to present the key-dependent AES algorithm. Furthermore, we conduct a security analysis and assess the randomness of the proposed key-dependent AES algorithm using NIST SP 800-22, Shannon entropy based on the ENT tool, and min-entropy based on NIST SP 800-90B. Thanks to the key-dependent random XOR tables, the key-dependent AES algorithm have become much more secure than AES, and they also achieve better results in some statistical standards than AES.

Publisher

IOS Press

Subject

Artificial Intelligence,General Engineering,Statistics and Probability

Reference25 articles.

1. A polymorphic advanced encryption standard–a novel approach;Altigani;IEEE Access,2021

2. A secure key dependent dynamic substitution method for symmetric cryptosystems;Ejaz;PeerJ Computer Science,2021

3. A new DNAbased approach of generating key dependent MixColumnstransformation,;Al-Wattar;International Journal of Computer Networks &Communications (IJCNC),2015

4. A novel approach for enhancing security of advance encryption standard using private XOR table and 3D chaotic regarding to software quality factor,;Salih;ICIC Express Letters Part B: Applications, An International Journal of Research and Surveys,2019

5. Enhancing advance encryption standard security based on dual dynamic XOR table and mixcolumns transformation;Salih;Indonesian Journal of Electrical Engineering and Computer Science,2020

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3