ĐÁNH GIÁ SỐ HỘP S HOẠT ĐỘNG CỦA MÃ KHỐI AES CẢI BIÊN ĐỘNG VỚI CÁC MA TRẬN MDS CỠ 4×4 VÀ 8×8
Thông tin bài báo
Ngày nhận bài: 25/10/23                Ngày hoàn thiện: 27/12/23                Ngày đăng: 27/12/23Tóm tắt
Từ khóa
Toàn văn:
PDF (English)Tài liệu tham khảo
[1] J. Daemen and V. Rijmen, The design of Rijndael: AES-the advanced encryption standard. Springer, 2002.
[2] S. K. Gupta, M. Ghosh, and S. K. Mohanty, “Cryptanalysis of Kalyna Block Cipher Using Impossible Differential Technique,” Proceedings of the Sixth International Conference on Mathematics and Computing. Advances in Intelligent Systems and Computing, vol. 1262, pp. 162-166, 2020.
[3] G. A. W. S. Wang, “Differential fault analysis on PRESENT key schedule,” International Conference on Computational Intelligence and Security, 2010, pp. 362-366.
[4] J. Kelsey, B. Schneier, and D. Wagner, “Key-schedule cryptanalysis of idea, g-des, gost, safer, and triple-des,” Annual international cryptology conference, Springer, 1996, pp. 237-251.
[5] V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E. D. Win, “The cipher SHARK,” International Workshop on Fast Software Encryption, 1996, pp. 99-111.
[6] J. Daemen, L. Knudsen, and V. Rijmen, “The block cipher Square,” International Workshop on Fast Software Encryption, 1997, pp. 149–165.
[7] G. Murtaza, A. A. Khan, and S. W. Alam, Fortification of aes with dynamic mix-column transformation, IACR Cryptology ePrint Archive, ISBN-10: 3659363634, 2011, p. 184.
[8] R. W. Mohamed, M. Abdulrashid, S. M. Moesfa, and M. Ramlan, “A method for linear transformation in substitution permutation network symmetric-key block cipher,” International application published under the patent cooperation treaty, 2012, pp. 3-14.
[9] A. H. Al-Wattar, R. Mahmod, Z. A. Zukarnain, and N. Udzir, “A new DNA based approach of generating key dependent Mixcolumns transformation,” International Journal of Computer Networks & Communications (IJCNC), vol. 7, no. 2, pp. 33-38, 2015.
[10] T. T. Luong, “Building the dynamic diffusion layer for SPN block ciphers based on direct exponent and scalar multiplication,” Journal of Science and Technology on Information Security, vol. 1, no CS(15), pp. 38-45, 2022.
[11] T. T. Luong, “Constructing Recursive MDS Matrices Effective for Implementation from Reed-Solomon Codes and Preserving the Recursive Property of MDS Matrix of Scalar Multiplication,” Journal of Informatics & Mathematical Sciences, vol. 11, no 2, pp. 155-177, 2019.
[12] T. T. Luong, “Proposals and implementations of MDS diffusion layer dynamic algorithms for AES block cipher,” Journal on Information technologies & Communication, vol. 2023, no. 2, pp. 28-35, 2022.
[13] Abd-ElGhafar, A. Rohiem, A. Diaa, and F. Mohammed , “Generation of aes key dependent s-boxes using rc4 algorithm,” 13th International Conference on Aerospace Sciences & Aviation Technology, ASAT- 13, 2009, pp. ASAT-13-CE-24.
[14] K. Kazlauskas and J. Kazlauskas, “Key-dependent s-box generation in aes block cipher system,” INFORMATICA, vol. 20, no. 1, pp. 23-34, 2009.
[15] R. Hosseinkhani and H. H. S. Javadi, “Using cipher key to generate dynamic s-box in aes cipher system,” International Journal of Computer Science and Security (IJCSS), vol. 6, pp. 32-38, 2012.
[16] E. M. Mahmoud, A. A. E. Hafez, T. A. Elgarf, and A. Zekry, “Dynamic aes-128 with key-dependent s-box,” International Journal of Engineering Research and Applications, vol. 3, no 1, pp. 1662-1670, 2013.
[17] J. Juremi, R. Mahmod, Z. A. Zukarnain, and S. M. Yasin, “Modified AES s-box Based on Determinant Matrix Algorithm,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 7, no 1, pp. 162-168, 2017.
[18] P. Agarwal, A. Singh, and A. Kilicman, “Development of key-dependentdynam ic s-boxes with dynamic irreducible polynomial and affine constant,” Advances in mechanical engineering, vol. 10, no. 7, pp. 1–18, 2018.
[19] H. T. Assafli, and I. A. Hashim, “Generation and Evaluation of a New Time-Dependent Dynamic s-box Algorithm for AES Block Cipher Cryptosystems,” 3rd International Conference on Recent Innovations in Engineering (ICRIE 2020), Materials Science and Engineering, 2020, pp. 62-68.
[20] A. I. Salih, A. Alabaichi, and A. S. Abbas, “A novel approach for enhancing security of advance encryption standard using private Xor table and 3d chaotic regarding to software quality factor,” ICIC Express Letters Part B: Applications, vol. 10, no 9, pp. 1574 -1581, 2019.
[21] A. Salih, A. Alabaichi, and A. Y. Tuama, “Enhancing advance encryption standard security based on dual dynamic XOR table and mixcolumns transformation,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 19, no. 3, pp. 1574 -1581, 2020.
[22] L. R. Knudsen, Practically secure Feistel ciphers, Springer Berlin Heidelberg, 1993, pp. 211-221.
[23] V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E. D. Win, “The cipher shark,” in Fast Software Encryption. Springer, 1996, pp. 99-111.
[24] R. Elumalai and A. R. Reddy, “Improving diffusion power of aes rijndael with 8x8 mds matrix,” International Journal of Scientific & Engineering Research, vol. 2, pp. 1-5, 2011.
[25] J. S. Kang, S. Hong, S. Lee, O. Yi, C. Park, and J. Lim, “Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks,” ETRI Journal, vol. 23, no 4, pp. 49-55, 2001.
DOI: https://doi.org/10.34238/tnu-jst.9053
Các bài báo tham chiếu
- Hiện tại không có bài báo tham chiếu