Skip to main content

High-Security Pipelined Elastic Substitution Box with Embedded Permutation Facility

  • Conference paper
  • First Online:
Innovations in Computer Science and Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 413))

Abstract

In today’s world a major percentage of information and resource sharing is carried out through electronic means. A good portion of the above said activities needs security essentially. Since all the resources for any technology is provided by the nature, directly or indirectly, it is the moral responsibility entrusted with researchers to bring out maximum efficiency with minimal resources. In this paper a novel method is proposed in which Substitution Box is operated in a pipelined fashion, which can optimize hardware complexity and speed of the Block Ciphers. Facility for key-based permutation of message bits is integrated with the design, which offers additional security. The complexity and security analysis is also done.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. C. Shannon, Communication theory of secrecy systems, Bell Systems Technical Journal, vol. 28, 1949.

    Google Scholar 

  2. C Adams and S Tavares, The structured design of good S Boxes, Journal of Cryptology, 3(1):27–41,1990.

    Google Scholar 

  3. J.Cobas and J.Brugos. Complexity theoretical approaches to the design and analysis of cryptographical Boolean functions In Computer Aided Systems Theory-EUROCAST 2005, LNCS. Springer-Verlag, Berlin, Germany, 2005.

    Google Scholar 

  4. A. Webster, S. Tavares, On the Design of S Boxes, Advances in Cryptology-CRYPT0 1985, LNCS 218, Springer-Verlag, 1985.

    Google Scholar 

  5. M. Dawson, S. Tavares, An Expanded Set of S Box Design Criteria Based on Information Theory and its Relation to Differential-like Attacks, Advances in Cryptology—EUROCRYPT 1991, LNCS 547, Springer-Verlag 1991.

    Google Scholar 

  6. M Sivabalan, S. Tavares, L. Peppard, On the design of SP networks from an information theoretic point of view, Advances in Cryptology—CRYPTO 1992, LNCS 740, Springer Verlag 1993.

    Google Scholar 

  7. Kai Hwang and Faye A. Briggs, Computer Architecture and Parallel processing, Tata McGraw-Hill, New Delhi 2012.

    Google Scholar 

  8. W. Stallings, Cryptography and Network Security, Principles and Practices, Prentice Hall, 2006.

    Google Scholar 

  9. Jithendra K.B, Shahana T.K, High Security Elastic Serial Substitution Box for Block Ci-phers, Proceedings of Second International Conference on Networking, Information and Communication (ICNIC), Bangalore 2015.

    Google Scholar 

  10. C K Shyamala, N Harini, T R Padmanabhan, Cryptography and Security, Wiley India Pvt ltd, New Delhi, 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. B. Jithendra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Jithendra, K.B., Shahana, T.K. (2016). High-Security Pipelined Elastic Substitution Box with Embedded Permutation Facility. In: Saini, H., Sayal, R., Rawat, S. (eds) Innovations in Computer Science and Engineering. Advances in Intelligent Systems and Computing, vol 413. Springer, Singapore. https://doi.org/10.1007/978-981-10-0419-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0419-3_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0417-9

  • Online ISBN: 978-981-10-0419-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics