Abstract
The most important element in the design of Block Ciphers is Substitution Box, as far as security, hardware complexity and power consumption are concerned. Usually parallel Substitution Boxes are used in Block Ciphers, since data are processed in parallel. In this paper a different Substitution Box concept is presented in which data are substituted in a serial manner with differing data sizes in each substitution. The concept of serial substitution opens up the possibility of integrating a hash generator which also functions in a serial manner. The application of this concept reduces the hardware complexity, improves the security and verifies the integrity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shannon, C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)
Stallings, W.: Cryptography and Network Security, Principles and Practices. Prentice Hall, Upper Saddle River (2006)
Adams, C., Tavares, S.: The structured design of good S Boxes. J. Cryptol. 3(1), 27–41 (1990)
Cobas, J., Brugos, J.: Complexity –theoretical approaches to the design and analysis of cryptographical Boolean functions. In: Computer Aided Systems Theory, EUROCAST 2005. LNCS. Springer, Germany (2005)
Webster, A., Tavares, S.: On the design of S Boxes. In: Advances in Cryptology, CRYPT0 1985. LNCS, vol. 218. Springer (1985)
Dawson, M., Tavares, S.: An expanded set of S Box design criteria based on information theory and its relation to differential-like attacks. In: Advances in Cryptology, EUROCRYPT 1991. LNCS vol. 547. Springer (1991)
Sivabalan, M., Tavares, S., Peppard, L.: On the design of SP networks from an information theoretic point of view. In: Advances in Cryptology, CRYPTO 1992. LNCS, vol. 740. Springer (1993)
Stallings, W.: Cryptography and Network Security, Principles and Practice, 5th edn. Prentice Hall, Noida (2011)
Preneel, B.: The state of cryptographic hash functions. In: Proceedings of EUROCRYPT 1996. Springer (1996)
Deepthi, P.P., Sathidevi, P.S.: Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. Elsevier Comput. Secur. 28, 229–241 (2009)
Shyamala, C.K., Harini, N., Padmanabhan, T.R.: Cryptography and Security. Wiley India Pvt ltd, New Delhi (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Jithendra, K.B., Shahana, T.K. (2018). Elastic Serial Substitution Box for Block Ciphers with Integrated Hash Function Generation. In: Bi, Y., Kapoor, S., Bhatia, R. (eds) Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016. IntelliSys 2016. Lecture Notes in Networks and Systems, vol 16. Springer, Cham. https://doi.org/10.1007/978-3-319-56991-8_48
Download citation
DOI: https://doi.org/10.1007/978-3-319-56991-8_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-56990-1
Online ISBN: 978-3-319-56991-8
eBook Packages: EngineeringEngineering (R0)