Elastic Serial Substitution Box for Block Ciphers with Integrated Hash Function Generation

  • K. B. JithendraEmail author
  • T. K. Shahana
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 16)


The most important element in the design of Block Ciphers is Substitution Box, as far as security, hardware complexity and power consumption are concerned. Usually parallel Substitution Boxes are used in Block Ciphers, since data are processed in parallel. In this paper a different Substitution Box concept is presented in which data are substituted in a serial manner with differing data sizes in each substitution. The concept of serial substitution opens up the possibility of integrating a hash generator which also functions in a serial manner. The application of this concept reduces the hardware complexity, improves the security and verifies the integrity.


Block cipher Cryptanalysis Hardware complexity Substitution box Serial substitution Security Hash function Toeplitz 


  1. 1.
    Shannon, C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Stallings, W.: Cryptography and Network Security, Principles and Practices. Prentice Hall, Upper Saddle River (2006)Google Scholar
  3. 3.
    Adams, C., Tavares, S.: The structured design of good S Boxes. J. Cryptol. 3(1), 27–41 (1990)MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Cobas, J., Brugos, J.: Complexity –theoretical approaches to the design and analysis of cryptographical Boolean functions. In: Computer Aided Systems Theory, EUROCAST 2005. LNCS. Springer, Germany (2005)Google Scholar
  5. 5.
    Webster, A., Tavares, S.: On the design of S Boxes. In: Advances in Cryptology, CRYPT0 1985. LNCS, vol. 218. Springer (1985)Google Scholar
  6. 6.
    Dawson, M., Tavares, S.: An expanded set of S Box design criteria based on information theory and its relation to differential-like attacks. In: Advances in Cryptology, EUROCRYPT 1991. LNCS vol. 547. Springer (1991)Google Scholar
  7. 7.
    Sivabalan, M., Tavares, S., Peppard, L.: On the design of SP networks from an information theoretic point of view. In: Advances in Cryptology, CRYPTO 1992. LNCS, vol. 740. Springer (1993)Google Scholar
  8. 8.
    Stallings, W.: Cryptography and Network Security, Principles and Practice, 5th edn. Prentice Hall, Noida (2011)Google Scholar
  9. 9.
    Preneel, B.: The state of cryptographic hash functions. In: Proceedings of EUROCRYPT 1996. Springer (1996)Google Scholar
  10. 10.
    Deepthi, P.P., Sathidevi, P.S.: Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. Elsevier Comput. Secur. 28, 229–241 (2009)CrossRefGoogle Scholar
  11. 11.
    Shyamala, C.K., Harini, N., Padmanabhan, T.R.: Cryptography and Security. Wiley India Pvt ltd, New Delhi (2011)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Department of Electronics and CommunicationCollege of Engineering, VadakaraCalicutIndia
  2. 2.Division of Electronics Engineering, School of EngineeringCochin University of Science and TechnologyKochiIndia

Personalised recommendations