Skip to main content

Elastic Serial Substitution Box for Block Ciphers with Integrated Hash Function Generation

  • Conference paper
  • First Online:
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016 (IntelliSys 2016)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 16))

Included in the following conference series:

  • 2659 Accesses

Abstract

The most important element in the design of Block Ciphers is Substitution Box, as far as security, hardware complexity and power consumption are concerned. Usually parallel Substitution Boxes are used in Block Ciphers, since data are processed in parallel. In this paper a different Substitution Box concept is presented in which data are substituted in a serial manner with differing data sizes in each substitution. The concept of serial substitution opens up the possibility of integrating a hash generator which also functions in a serial manner. The application of this concept reduces the hardware complexity, improves the security and verifies the integrity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shannon, C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  2. Stallings, W.: Cryptography and Network Security, Principles and Practices. Prentice Hall, Upper Saddle River (2006)

    Google Scholar 

  3. Adams, C., Tavares, S.: The structured design of good S Boxes. J. Cryptol. 3(1), 27–41 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  4. Cobas, J., Brugos, J.: Complexity –theoretical approaches to the design and analysis of cryptographical Boolean functions. In: Computer Aided Systems Theory, EUROCAST 2005. LNCS. Springer, Germany (2005)

    Google Scholar 

  5. Webster, A., Tavares, S.: On the design of S Boxes. In: Advances in Cryptology, CRYPT0 1985. LNCS, vol. 218. Springer (1985)

    Google Scholar 

  6. Dawson, M., Tavares, S.: An expanded set of S Box design criteria based on information theory and its relation to differential-like attacks. In: Advances in Cryptology, EUROCRYPT 1991. LNCS vol. 547. Springer (1991)

    Google Scholar 

  7. Sivabalan, M., Tavares, S., Peppard, L.: On the design of SP networks from an information theoretic point of view. In: Advances in Cryptology, CRYPTO 1992. LNCS, vol. 740. Springer (1993)

    Google Scholar 

  8. Stallings, W.: Cryptography and Network Security, Principles and Practice, 5th edn. Prentice Hall, Noida (2011)

    Google Scholar 

  9. Preneel, B.: The state of cryptographic hash functions. In: Proceedings of EUROCRYPT 1996. Springer (1996)

    Google Scholar 

  10. Deepthi, P.P., Sathidevi, P.S.: Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. Elsevier Comput. Secur. 28, 229–241 (2009)

    Article  Google Scholar 

  11. Shyamala, C.K., Harini, N., Padmanabhan, T.R.: Cryptography and Security. Wiley India Pvt ltd, New Delhi (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. B. Jithendra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Jithendra, K.B., Shahana, T.K. (2018). Elastic Serial Substitution Box for Block Ciphers with Integrated Hash Function Generation. In: Bi, Y., Kapoor, S., Bhatia, R. (eds) Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016. IntelliSys 2016. Lecture Notes in Networks and Systems, vol 16. Springer, Cham. https://doi.org/10.1007/978-3-319-56991-8_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56991-8_48

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56990-1

  • Online ISBN: 978-3-319-56991-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics