ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Evaluation of Key Dependent S-Box Based Data Security Algorithm using Hamming Distance and Balanced Output

Journal: TEM JOURNAL - Technology, Education, Management, Informatics (Vol.5, No. 1)

Publication Date:

Authors : ; ;

Page : 67-75

Keywords : S-BOX; Data Security; Large Prime Number; Random Number; Cryptography;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Data security is a major issue because of rapid evolution of data communication over unsecured internetwork. Here the proposed system is concerned with the problem of randomly generated S-box. The generation of S-box depends on Pseudo-Random-Number-Generators and shared-secret-key. The process of Pseudo-Random-Number-Generator depends on large prime numbers. All Pseudo-Random-Numbers are scrambled according to shared-secret-key. After scrambling, the S-box is generated. In this research, large prime numbers are the inputs to the Pseudo-Random-Number-Generator. The proposed S-box will reduce the complexity of S-box generation. Based on S-box parameters, it experimentally investigates the quality and robustness of the proposed algorithm which was tested. It yields better results with the S-box parameters like Hamming Distance, Balanced Output and Avalanche Effect and can be embedded to popular cryptography algorithms

Last modified: 2016-03-09 21:17:43