Enhancing AES Security through Advanced S-Box Design: Strategies and Solutions

Abstract

AES is yet one of the prominent cryptographic algorithms of the 21st century with the reputation of excellent performance and reliability. AES revolves around the S-Box, a nonlinear substitutive table that is essential to attain the level of cryptosecurity. In this paper, there are several methods discussed as how to increase AES S-Box functionality with regard to new cryptographic threats and their effectiveness. We detail the consequences of raising S-Box length and size, dynamical S-Box producing, higher nonlinearity, and efficient methods of S-Box calculation by means of hardware and software. Furthermore, it explains the issues with these improvements and how they impact security measures & relevant computations. Here it is possible to state that applying all these modern approaches, it is possible to strengthen the AES S-Box essentially and ensure compliance with present day demands to cryptographic solutions.

Country : Iraq

1 Sura Nabil Hamed Alsweedy2 Sufyan Salim Aldabbagh

  1. Computer Science Department, College of Computer Science and Mathematics, University of Mosul, Mosul-Iraq
  2. Computer Science Department, College of Computer Science and Mathematics, University of Mosul, Mosul-Iraq

IRJIET, Volume 8, Issue 8, August 2024 pp. 182-192

doi.org/10.47001/IRJIET/2024.808020

References

  1. ETSI, Quantum Safe Cryptography and Security: An introduction, no. 8. 2015.
  2. J. Daemen and V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard. 2002. doi: 10.1007/978-3-662-04722-4.
  3. A.Altigani, S. Hasan, B. Barry, S. Naserelden, M. A. Elsadig, and H. T. Elshoush, “A Polymorphic Advanced Encryption Standard - A Novel Approach,” IEEE Access, vol. 9, pp. 20191–20207, 2021, doi: 10.1109/ACCESS.2021.3051556.
  4. F. V. Wenceslao, “Enhancing the Performance of the Advanced Encryption Standard(AES)Algorithm Using Multiple Substitution Boxes,” Int. J. Commun. Networks Inf. Secur., vol. 10, no. 3, pp. 496–501, 2018, doi: 10.17762/ijcnis.v10i3.3589.
  5. H. S. Zied, A. G. A. Ibrahim, and A. I. Salem, “S-Box Modification for the Block Cipher Algorithms,” Prz. Elektrotechniczny, vol. 99, no. 4, pp. 278–281, 2023, doi: 10.15199/48.2023.04.48.
  6. K. Mohamed, M. N. Mohammed Pauzi, F. H. Hj Mohd Ali, S. Ariffin, and N. H. Nik Zulkipli, “Study of S-box properties in block cipher,” I4CT 2014 - 1st Int. Conf. Comput. Commun. Control Technol. Proc., no. June, pp. 362–366, 2014, doi: 10.1109/I4CT.2014.6914206.
  7. A.Alamsyah, B. Prasetiyo, and Y. Muhammad, “S-box Construction on AES Algorithm using Affine Matrix Modification to Improve Image Encryption Security,” Sci. J. Informatics, vol. 10, no. 2, pp. 69–82, 2023, doi: 10.15294/sji.v10i2.42305.
  8. K. M. Hosny, M. A. Zaki, N. A. Lashin, M. M. Fouda, and H. M. Hamza, “Multimedia Security Using Encryption: A Survey,” IEEE Access, vol. 11, no. June, pp. 63027–63056, 2023, doi: 10.1109/ACCESS.2023.3287858.
  9. S. T. Wu and J. R. Chang, “Secure One-Way Hash Function Using Cellular Automata for IoT,” Sustain., vol. 15, no. 4, 2023, doi: 10.3390/su15043552.
  10. T. Bin Azad, “Chapter 4 - Understanding XenApp Security,” T. B. B. T.-S. C. P. S. in the E. Azad, Ed., Burlington: Syngress, 2008, pp. 259–316. doi: https://doi.org/10.1016/B978-1-59749-281-2.00004-4.
  11. K. Suresh Babu, R. K B, K. Kiran, T. H. Devi, V. K R, and L. Patnaik, Authentication of secret information in image Steganography. 2008. doi: 10.1109/TENCON.2008.4766581.
  12. Q. Zhang, L. Liu, and X. Wei, “Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps,” AEU - Int. J. Electron. Commun., vol. 68, pp. 186–192, Mar. 2014, doi: 10.1016/j.aeue.2013.08.007.
  13. X. Wang and S.-X. Gu, “Novel image encryption algorithm based on cycle shift and chaotic system,” Opt. Lasers Eng., vol. 68, May 2015, doi: 10.1016/j.optlaseng.2014.12.025.
  14. M. Kaur, S. Singh, and M. Kaur, “Computational Image Encryption Techniques: A Comprehensive Review,” Math. Probl. Eng., vol. 2021, Jul. 2021, doi: 10.1155/2021/5012496.
  15. B. Mondal, S. Singh, and P. Kumar, “A secure image encryption scheme based on cellular automata and chaotic skew tent map,” J. Inf. Secur. Appl., vol. 45, pp. 117–130, 2019, doi: 10.1016/j.jisa.2019.01.010.
  16. N. Aleisa, “A comparison of the 3DES and AES encryption standards,” Int. J. Secur. its Appl., vol. 9, no. 7, pp. 241–246, 2015, doi: 10.14257/ijsia.2015.9.7.21.
  17. J. Nechvatal, E. Barker, L. Bassham, M. Dworkin, and E. Roback, “Report on the Development of the Advanced Encryption Standard (AES),” vol. 106, no. 3, 2001.
  18. L. Rouquette, D. Gérault, M. Minier, and C. Solnon, “And Rijndael?: Automatic Related-Key Differential Analysis of Rijndael,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 13503 LNCS, pp. 150–175, 2022, doi: 10.1007/978-3-031-17433-9_7.
  19. A.Nadjia and A. Mohamed, “AES IP for hybrid cryptosystem RSA-AES,” 12th Int. Multi-Conference Syst. Signals Devices, SSD 2015, no. March, 2015, doi: 10.1109/SSD.2015.7348109.
  20. K. L. Narayanan, P. Kannan, and S. E. Rajavel, “A Comparative Study and Performance Evaluation of Cryptographic Algorithms : AES and Blowfish,” Int. J. Adv. Res. Trends Eng. Technol., vol. 1, no. 3, pp. 81–86, 2014.
  21. F. S. Hossain, M. L. Ali, and M. A. Al Abedin Syed, “A very low power and high throughput AES processor,” 14th Int. Conf. Comput. Inf. Technol. ICCIT 2011, no. December, pp. 339–343, 2011, doi: 10.1109/ICCITechn.2011.6164810.
  22. Abdullah-All-Tanvir, I. Ali Khandokar, A. K. M. Muzahidul Islam, S. Islam, and S. Shatabda, “A gradient boosting classifier for purchase intention prediction of online shoppers,” Heliyon, vol. 9, no. 4, p. e15163, 2023, doi: 10.1016/j.heliyon.2023.e15163.
  23. G. N. Selimis, A. P. Kakarountas, A. P. Fournaris, A. Milidonis, and O. Koufopavlou, “A Low Power Design for Sbox Cryptographic Primitive of Advanced Encryption Standard for Mobile End-Users,” J. Low Power Electron., vol. 3, no. 3, pp. 327–336, 2007, doi: 10.1166/jolpe.2007.139.
  24. A.AlRababah, “Digital Image Encryption Implementations Based on AES Algorithm,” VAWKUM Trans. Comput. Sci., vol. 13, no. 1, p. 1, 2017, doi: 10.21015/vtcs.v13i1.453.
  25. M. E. Hameed, M. M. Ibrahim, and N. A. Manap, “Review on improvement of advanced encryption standard (AES) algorithm based on time execution, differential cryptanalysis and level of security,” J. Telecommun. Electron. Comput. Eng., vol. 10, no. 1, pp. 139–145, 2018.
  26. M. Veshala and T. Srinivasulu, Improving the Energy Efficiency of the WSNs by Optimal Relay Node Selection using Modified Gravitational Search Approach, no. Iccmc. 2021. doi: 10.1109/ICCMC51019.2021.9418240.
  27. A.Singh, P. Agarwal, and M. Chand, “Analysis of Development of Dynamic S-Box Generation,” Comput. Sci. Inf. Technol., vol. 5, no. 5, pp. 154–163, 2017, doi: 10.13189/csit.2017.050502.
  28. A.Jana, A. K. Kundu, and G. Paul, More Vulnerabilities of Linear Structure Sbox-Based Ciphers Reveal Their Inability to Protect DFA.
  29. J. Cui, L. Huang, H. Zhong, C. Chang, and W. Yang, “An improved AES S-box and its performance analysis,” Int. J. Innov. Comput. Inf. Control, vol. 7, no. 5 A, pp. 2291–2302, 2011.
  30. W. Zhang and E. Pasalic, “Highly nonlinear balanced S-boxes with good differential properties,” IEEE Trans. Inf. Theory, vol. 60, no. 12, pp. 7970–7979, 2014, doi: 10.1109/TIT.2014.2360880.
  31. M. Gupta and A. Sinha, “Enhanced-AES encryption mechanism with S-box splitting for wireless sensor networks,” Int. J. Inf. Technol., vol. 13, Feb. 2021, doi: 10.1007/s41870-021-00626-w.
  32. O. Sahoo, D. Kole, and H. Rahaman, An Optimized S-Box for Advanced Encryption Standard (AES) Design. 2012. doi: 10.1109/ICACC.2012.35.
  33. S. Sudhakar, A. Akashwar, M. Ajay Someshwar, T. Dhaneshguru, and M. Prem Kumar, “Improving Security Using Modified S-Box for AES Cryptographic Primitives,” Open Access by IOS Press Distrib. under terms Creat. Commons Attrib., pp. 830–835, 2021, doi: 10.3233/apc210288.
  34. F. Mohammad, A. E. Rohiem, and A. Elbayoumy, “A Novel S-box of AES Algorithm Using Variable Mapping Technique,” Int. Conf. Aerosp. Sci. Aviat. Technol., vol. 13, no. AEROSPACE SCIENCES, pp. 1–10, 2009, doi: 10.21608/asat.2009.23494.
  35. J. Juremi, R. Mahmod, S. Sulaiman, and J. Ramli, “Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key,” Int. J. Cyber-Security Digit. Forensics, vol. 1, no. 3, pp. 183–188, 2012.
  36. R. Hosseinkhani, “Using Cipher Key to Generate Dynamic S-Box in AES Cipher System,” Int. J. Comput. Sci. Secur. (IJCSS), Vol.  Issue  2012, no. 6, pp. 19–28, 2012.
  37. N. Tsedura and C. Chibaya, Effects of Runtime Generated S-Boxes to the DES Model. 2020. doi: 10.1109/IMITEC50163.2020.9334146.
  38. A.Alabaichi and A. Salih, Enhance security of advance encryption standard algorithm based on key-dependent S-box. 2015. doi: 10.1109/ICDIPC.2015.7323004.
  39. K. Kazlauskas, G. Vaicekauskas, and R. Smaliukas, “An Algorithm for Key-Dependent S-Box Generation in Block Cipher System,” Inform., vol. 26, no. 1, pp. 51–65, 2015, doi: 10.15388/Informatica.2015.38.
  40. Z. Rahaman, A. Diana, M. Akter, and A. Newaz, “A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 2, 2017, doi: 10.14569/ijacsa.2017.080241.
  41. D. Shukla, V. Trivedi, and (Dr.) Munesh Trivedi, “Encryption algorithm in cloud computing,” Mater. Today Proc., vol. 37, Aug. 2020, doi: 10.1016/j.matpr.2020.07.452.
  42. H. S. Yahia et al., “Comprehensive Survey for Cloud Computing Based Nature-Inspired Algorithms Optimization Scheduling,” Asian J. Res. Comput. Sci., no. May, pp. 1–16, 2021, doi: 10.9734/ajrcos/2021/v8i230195.
  43. I.A. Khan and R. Qazi, “Data Security in Cloud Computing Using Elliptic Curve Cryptography,” Online), vol. 1, no. 1, pp. 2664–9519, 2019.
  44. M. Manna and M. Ali Mohammed A, “Data Encryption Scheme for Large Data Scale in Cloud Computing,” J. Telecommun. Electron. Comput. Eng., vol. 9, no. 2–12, pp. 1–5, 2017.
  45. Y. Li, K. Gai, L. Qiu, M. Qiu, and H. Zhao, “Intelligent cryptography approach for secure distributed big data storage in cloud computing,” Inf. Sci. (Ny)., vol. 387, pp. 103–115, 2017, doi: https://doi.org/10.1016/j.ins.2016.09.005.
  46. Z. R. Saeed, Z. Ayop, N. Azma, and B. M. Rizuan, “Improved Cloud Storage Security of Using Three Layers Cryptography Algorithms,” Int. J. Comput. Sci. Inf. Secur., vol. 16, no. 10, pp. 34–39, 2018.
  47. K. Jithendra and T. K. Shahana, A New Efficient Sbox for Strengthening PRESENT Like Block Ciphers Against Linear Cryptanalysis. 2019. doi: 10.1109/ICICICT46008.2019.8993397.
  48. D. Alsaffar et al., “Image Encryption Based on AES and RSA Algorithms,” 2020 3rd Int. Conf. Comput. Appl. \& Inf. Secur., pp. 1–5, 2020.
  49. A.Y. Al-Dweik, I. Hussain, M. Saleh, and M. T. Mustafa, “A novel method to generate key-dependent s-boxes with identical algebraic properties,” J. Inf. Secur. Appl., vol. 64, pp. 1–20, 2022, doi: 10.1016/j.jisa.2021.103065.
  50. K. Mohamed, M. N. M. Pauzi, F. H. H. M. Ali, and S. Ariffin, “Analyse On Avalanche Effect In Cryptography Algorithm,” Proc. Int. Conf. Sustain. Pract. Dev. Urban. (IConsPADU 2021), 16 Novemb. 2021, Univ. Selangor (UNISEL), Malaysia, vol. 3, no. November, pp. 610–618, 2022, doi: 10.15405/epms.2022.10.57.
  51. D. Kodzo, M. Hodowu, D. R. Korda, and E. Danso Ansong, “An Enhancement of Data Security in Cloud Computing with an Implementation of a Two-Level Cryptographic Technique, using AES and ECC Algorithm,” Int. J. Eng. Res. Technol., vol. 9, no. March 2021, pp. 2278–0181, 2020.
  52. X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New algorithms for secure outsourcing of modular exponentiations,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 9, pp. 2386–2396, 2014, doi: 10.1109/TPDS.2013.180.