Analysis of Fundamental Algebraic Concepts and Information Security System
DOI:
https://doi.org/10.33367/jtme.v2i1.5187Keywords:
Algebra, Cryptography, Information Security Systems, Fundamental Algebraic Concepts, Crypto-Algebra, Analysis of AlgebraAbstract
Cryptography plays a crucial role in protecting the data from unauthorized access. Nowadays, various cryptographic algorithms are used. It is not meant for information technology to secure the proposed work's primary target to achieve these tasks and goals. Using a literature review, we study security information systems using S-Boxes. In the research, we discuss two different techniques to generate the new S-boxes and then discuss their other properties to improve the strength of encryption. This chapter is further divided into sections that comprehensively explain the various concepts.
References
Altaleb, A., Saeed, M. S., Hussain, I., & Aslam, M. (2017). An algorithm for the construction of substitution box for block ciphers based on projective general linear group. AIP Advances, 7(3), 035116. https://doi.org/10.1063/1.4978264
Beth, T., & Ding, C. (1994). On Almost Perfect Nonlinear Permutations. In T. Helleseth (Ed.), Advances in Cryptology—EUROCRYPT ’93 (Vol. 765, pp. 65–76). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-48285-7_7
Cui, L., & Cao, Y. (2007). A new S-box structure named Affine-Power-Affine. International Journal of Innovative Computing, Information and Control, 751–759.
Daemen, J., & Rijmen, V. (1999). Rijndael AES algorihm submission. AES proposal.
Detombe, J., & Tavares, S. (1992). Constructing large cryptographically strong S-boxes. Advances in Cryptology, Proc. Of CRYPTO92, LNCS, 165–181.
Elhosary, A. M., Hamdy, N., & Rohiem, A. E. (2013). State of the ART in Boolean function Cryptographic assessment. International Journal of Computer Network and Computer Security, 1(3), 88–94.
Hussain, I., Shah, T., & Asif, M. (2012). Efficient image encryption algorithm based onS_8 S-box transformation and NCA map. Elsevier, 285, 4887–4890.
Hussain, I., Shah, T., & Mahmood, H. (2010). A new algorithm to construct secure keys for AES. International Journal of Contemporary Mathematical Sciences, 5(26), 1263–1270.
Hussain, I., Shah, T., Mahmood, H., Gondal, M. A., & Bhatti, V. Y. (2011). Some analysis of S-box based on residue of Prime Number. Proceeding of the Pakistan Academy of Science, 48(11), 111–115.
Kazlauskas, K., Smaliukas, R., & Vaicekauskas, G. (2016). A novel method to design S-boxes based on key-dependent permutation schemes and its quality analysis. IJACSA, 7(4).
Matsui, M. (1994). Linear cryptanalysis method for DES cipher. EUPOCRYPT93, LNCS, 765, 386–397.
Medeleanu, F., Racucia, C., & Rogobete, M. (2015). Considerations about the possibilities to improve AES S-box cryptographic properties by Multiplication. Proceedings of the Romanian Academy, 16, 339–344.
Meletious, G. C., Triantafyllou, D. S., & Vrahatis, M. N. (2015). Handling problems in cryptography with matrix factorization. Journal of Applied Mathematics and Bioinformatics, 5(3), 37–48.
Mhajloska, H., & Gligoroski, D. (2011). A new approach into constructing S-boxes for lightweight block ciphers. CIIT.
Rosenthal, J. (2003). A polynomial description of Rijndael Advanced Encryption Standard. Journal of Algebra and Its Applications, 2(11), 223–236.
Siddiqui, N. S., Afsar, U., Shah, T., & Qureshi, A. (2016). A novel construction of S_16 AES S- boxes. International Journal of Computer Science and Information Security, 14(8).
Abstract
Views:
123,
PDF downloads: 82


















