Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 795292, 12 pages
http://dx.doi.org/10.1155/2014/795292
Research Article

Two-Key Dependent Permutation for Use in Symmetric Cryptographic System

1Department of Computer Science Engineering, SASTRA University, Srinivasa Ramanujan Centre, Kumbakonam 612 001, India
2School of Computing, SASTRA University, Thanjavur 613 401, India
3School of Humanities and Sciences, SASTRA University, Thanjavur 613 401, India

Received 23 June 2014; Revised 30 August 2014; Accepted 30 August 2014; Published 2 October 2014

Academic Editor: Cheng Shao

Copyright © 2014 Arulmani Kuppusamy et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. National Bureau of Standards, “Data encryption standard,” Tech. Rep. 46, U.S. Department of Commerce, FIPS Publication, 1977. View at Google Scholar
  2. B. Schneier, “Description of a new variable-length key, 64-bit block cipher (Blowfish),” in Proceedings of the Fast Software Encryption, Cambridge Security Workshop, pp. 191–204, Springer, 1993.
  3. R. C. Merkle, “Fast software encryption functions,” in Advances in Cryptology—CRYPTO '90 Proceedings, vol. 537, pp. 476–501, Springer, 1991. View at Publisher · View at Google Scholar
  4. B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, The Twofish Encryption Algorithm: A 128-Bit Block Cipher, John Wiley & Sons, New York, NY, USA, 1999.
  5. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
  6. W. Stallings, Cryptography and Network Security, Prentice Hall, New York, NY, USA, 2011.
  7. N. Koblitz, A Course in Number Theory and Cryptography, Springer, New York, NY, USA, 1994. View at MathSciNet
  8. C. E. Shannon, “Communication theory of secrecy systems,” The Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. View at Publisher · View at Google Scholar · View at MathSciNet
  9. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer, 1993. View at Publisher · View at Google Scholar · View at MathSciNet
  10. M. Matsui, “Linear cryptanalysis method for DES cipher,” in Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT ’93), pp. 386–397, Springer, 1993.
  11. C. M. Adams and S. E. Tavares, “Designing S-boxes for ciphers resistant to differential cryptanalysis,” in Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography, pp. 181–190, Rome, Italy, February 1993.
  12. GOST 28147-89,Cryptographic Protection for Data Processing Systems, Cryptographic Transformation Algorithm, Government Standard of the U.S.S.R., Inv. No. 3583, UDC 681.325.6:006.354. (Russian).
  13. N. K. Pareek, V. Patidar, and K. K. Sud, “Substitution-diffusion based image cipher,” International Journal of Network Security & Its Applications, vol. 3, no. 2, 2011. View at Google Scholar
  14. R. Zhang and L. Chen, “A block cipher using key-dependent S-box and P-boxes,” in Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE '08), pp. 1463–1468, Cambridge, UK, July 2008. View at Publisher · View at Google Scholar · View at Scopus
  15. H. M. El-Sheikh, O. A. El-Mohsen, T. Elgarf, and A. Zekry, “A new approach for designing key-dependent S-box defined over GF (24) in AES,” International Journal of Computer Theory and Engineering, vol. 4, no. 2, pp. 158–164, 2012. View at Google Scholar
  16. Abd-ElGhafar, A. Rohiem, A. Diaa, and F. Mohammed, “Generation of AES key dependent S-boxes using RC4 algorithm,” in Proceedings of the 13th International Conference on Aerospace Sciences & Aviation Technology (ASAT '13), May 2009.
  17. E. M. Mahmoud, A. Abd El Hafez, T. A. Elgarf, and A. Zekry, “Dynamic AES-128 with key-dependent S-box,” International Journal of Engineering Research and Applications, vol. 3, no. 1, pp. 1662–1670, 2013. View at Google Scholar
  18. D. Lambić and M. Živković, “Comparison of random S-box generation methods,” Publications de l'Institut Mathematique, vol. 93, no. 107, pp. 109–115, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. K. Kazlauskas and J. Kazlauskas, “Key-dependent S-box generation in AES block cipher system,” Informatica, vol. 20, no. 1, pp. 23–34, 2009. View at Google Scholar · View at Scopus
  20. J. Peng and S. Jin, “Designing key-dependent S-boxes using hyperchaotic chen system,” in Proceedings of the International Conference on Information Engineering and Applications (IEA '13), vol. 216 of Lecture Notes in Electrical Engineering, pp. 733–740, 2013.