Proposals and Implementations of MDS Diffusion Layer Dynamic Algorithms for AES Block Cipher

  • Trần Thị Lượng Academy of cryptography techniques of Viet Nam Government Information Security Commission, Hanoi
Keywords: MDS matrix;, AES, dynamic diffusion layer

Abstract

Block ciphers are an interesting cryptographic
topic that is widely used today. Therefore, the issue of improving the security of block ciphers is increasingly concerned today. There have been many research directions to animate block ciphers to improve their security against well-known strong attacks. In [1], we proposed two diffusion layer dynamic algorithms for SPN block ciphers. In this paper, we will execute these two algorithms with recursive MDS matrices of size 4, 8, and 16, then evaluate the cryptographic properties of the obtained dynamic MDS matrices including branch number, number of fixed points, coefficient of fixed points, number of XOR and Xtime operations. Then, we apply these two dynamic algorithms to dynamically modify the AES block cipher and evaluate the execution speed of the
dynamic AES block ciphers. We propose two new diffusion
layer dynamic algorithms, implement these two algorithms
and modify dynamically AES block cipher according to these
two algorithms, and evaluate the speed of dynamic AES block
ciphers. We also evaluate the security and implementation
resources for dynamically modified AES block ciphers. The
proposed diffusion layer dynamic algorithms contribute to
improving the security of the AES block cipher against many
current strong attacks.

Author Biography

Trần Thị Lượng, Academy of cryptography techniques of Viet Nam Government Information Security Commission, Hanoi
Chủ nhiệm Bộ môn, Khoa An toàn thông tin

References

Luong, T. T, "Building the dynamic diffusion layer for SPN block ciphers based on direct exponent and scalar multiplication", Journal of Science and Technology on Information security, 1(15), 38-45, 2022.

Ishukova, E.A., Krasovki, A.V, Babenko L. K, "Security assessment of Kuznhyechik block cipher using key-related method", basic research (11-4) 698-703, 2016 (Russian).

Tomanenko E. A, "Results of testing the possibility of using hybrid cryptography on the basis of symmetric algorithms", 22, 2022 (Russian).

Dolmatov, V, "GOST R", Block Cipher" Kuznyechik", 34-12, 2015.

Deamen, J., & Rijmen, "The design of rijndael", In AES-The Advanced Encryption Standard, Springer-Verlag, 2002.

Daemen, J., & Rijmen, Aes proposal: Rijndael (version 2), nist aes website, 1999

Zenzin O.X. Ivanov M.A, AES Encryption Standard. Finite field. M.: Kudits-Obraz 176, 15, 2002 (Russian)

Ayoub.F, "Probabilistic completeness of substitutionpermutation encryption networks". IEE Proceedings E

(Computers and Digital Techniques), 129(5), 195-199, 1982.

Heys, H. M., & Tavares, S. E, "Avalanche characteristics of substitution-permutation encryption networks", IEEE Transactions on Computers, 44(9), 1131-1139, 1995.

Heys. H. M., & Tavares. S. E, Substitution-permutation networks resistant to differential and linear cryptanalysis. Journal of cryptology, 9(1), 1-19, 1996.

Schneier B., Kelsey J., Whiting D., Wagner D., Hall C. and Ferguson N, “Twofish: a 128-bit block cipher”, NIST AES Proposal, vol. 15, 1998.

Schneier B., Kelsey J., Whiting D., Wagner D., Hall C. and Ferguson N, “The twofish encryption algorithm”, Wiley, 1999.

Abd-ElGhafar, I., Rohiem, A., Diaa, A., & Mohammed. F, "Generation of AES key dependent S-boxes using RC4

algorithm", In International Conference on Aerospace Sciences and Aviation Technology (Vol. 13, No. AEROSPACE

SCIENCES & AVIATION TECHNOLOGY, ASAT-13, May 26–28, 2009.

Agarwal, P., Singh, A., & Kilicman. A, " Development of key-dependent dynamic S-boxes with dynamic irreducible polynomial and affine constant", Advances in Mechanical Engineering, 10(7), 2018.

Assafli, H. T., & Hashim, I. A, "Generation and Evaluation of a New Time-Dependent Dynamic S-Box Algorithm for AES Block Cipher Cryptosystems", In IOP Conference Series: Materials Science and Engineering, 978, 1, 2020.

Hosseinkhani, R., & Javadi, H. H. S, "Using cipher key to generate dynamic S-box in AES cipher system", International Journal of Computer Science and Security (IJCSS), 6(1), 19-28, 2012.

Juremi, J., Mahmod, R., Zukarnain, Z. A., & Yasin.S.M, "Modified AES s-box based on determinant matrix algorithm", Int. J. Adv. Res. Comput. Sci. Softw. Eng., 7(1), 110- 116, 2017.

Kazlauskas, K., & Kazlauskas. J, "Key-dependent S-box generation in AES block cipher system", Informatica, 20(1), 23-34, 2009.

KHAMLICH. E, "Implementation of stronger AES by using Dynamic S-Box dependent of Master Key", Journal of Theoretical and Applied Information Technology, 53(2), 2013.

Mahmoud, E. M., Abd, A., El Hafez, T. A. E., & El Hafez, T. A, Dynamic AES-128 with key-dependent S-box, 2013.

Murtaza G., Khan A.A., Alam S.W. and Farooqi A, “Fortification of aes with dynamic mix-column transformation,” IACR Cryptology ePrint Archive, 2011.

I.A. Ismil, Galal H. Galal - Edeen, Sherif Khattab and Mohamed Abd ElHamid I. Moustafa El Bahtity, "Performance examination of AES encrytion algorithm with constant and dynamic rotation", International Journal of Reviews in Computing, ISSN: 2076-3328, 31st December 2012. Vol. 12, 2012.

Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain and NurIzura Udzir, "A new DNA based approach of generating key dependent Mixcolumns transformation", International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, 2015.

Adnan Ibrahem Salih, Ashwak Alabaich, Ammar Yaseen Tuama, "Enhancing advance encryption standard security based on dual dynamic XOR table and mixcolumns transformation", Indonesian Journal of Electrical Engineering and Computer Science Vol. 19, No. 3, 2020.

Luong, T. T., Cuong, N. N., & Tho, H. D, "On the calculation of input and output for dynamic MDS matrices in diffusion layer of SPN block ciphers", In 2017 International Conference on Information and Communications (ICIC) (pp. 281-287), 2017.

Luong, T. T., Cuong, N. N., & Tho, H. D, "On the calculation of input and output for dynamic MDS matrices in diffusion layer of SPN block ciphers", In 2017 International Conference on Information and Communications (ICIC), 2017

Luong, T. T., & Cuong, N. N, "The preservation of good cryptographyic properties of mds matrix under direct exponent transformation", Journal of Computer Science and Cybernetics, 31(4), 291-291, 2015.

Luong, T. T., & Cuong, N. N, "DIRECT EXPONENT AND SCALAR MULTIPLICATION TRANSFORMATIONS OF MDS MATRICES: SOME GOOD CRYPTOGRAPHIC RESULTS FOR DYNAMIC DIFFUSION LAYERS OF BLOCK CIPHERS", Journal of Computer Science and Cybernetics, 32(1), 1-17, 2016.

Luong, T. T., Cuong, N. N., & Dung, L. T, "The preservation of the coefficient of fixed points of an MDS matrix under direct exponent transformation", In 2015 International Conference on Advanced Technologies for Communications (ATC) (pp. 111-116), 2015.

Luong, T. T., Cuong, N. N., & Dung, L. T, "A new statement about direct exponent of an MDS matrix in block ciphers", In 2015 Seventh International Conference on Knowledge and Systems Engineering (KSE) (pp. 340-343), 2015

Shannon C.E, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949.

Published
2023-06-26