Proposal of Dynamic Algorithms Combining a Substitution Layer and a Key Addition Layer for Block Ciphers using SHA3-256
Abstract
In recent years, one research direction that has garnered significant attention from scientists is enhancing the security of SPN block ciphers against strong cryptanalysis attacks through dynamic methods. Researchers have focused on proposing dynamic implementations of substitution layers, diffusion layers, and key addition layers, as well as combi- nations of these layers. These proposals are often based on mathematical foundations such as chaotic mappings, DNA techniques, affine transformations, or specially structured MDS matrices, among others. However, none of these studies have utilized the mathematical foundation of hash functions or combined substitution and key addition layers, nor have they leveraged the results of these layers as dynamic parameters for other layers. Therefore, in this study, we propose two dynamic algorithms that combine the key addition layer and substitu- tion layer using the cryptographic hash function SHA3-256. Additionally, the dynamic method for the substitution layer is implemented using parameters derived from the key addition layer. We use the proposed dynamic algorithms to dynamically modify the AES block cipher while evaluating the security and randomness standards of the dynamic AES block cipher. With the two proposed dynamic algorithms, not only is there no increase in the expanded key size, but the security of the modified dynamic AES algorithm can also be significantly enhanced to 288
References
V. Rijmen and J. Daemen, “Advanced encryption standard,” in Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technol- ogy, vol. 19, 2001, p. 22.
W. I. Alsobky and H. Saeed, “Different types of attacks on block ciphers,” International Journal of Recent Technology and Engineering (IJRTE), vol. 9, no. 3, pp. 28–31, 2020.
L. T. Thi, “Enhancing the security of aes block cipher based on modified mixcolumn,” Journal of Computer Science and Cybernetics, vol. 40, no. 2, pp. 187–203, 2024.
T. T. Luong and H. D. Linh, “Generating key-dependent involutory mds matrices through permutations, direct expo- nentiation, and scalar multiplication,” International Journal of Information and Computer Security, vol. 23, no. 4, pp. 410–432, 2024.
L. D. Hoang and L. T. T. Thi, “Enhancing block cipher security with key-dependent random xor tables generated via hadamard matrices and sudoku game,” Journal of Intelligent & Fuzzy Systems, 2024, (Preprint), 1–17.
T. T. Luong, N. V. Long, and B. Vo, “Efficient implemen- tation of the linear layer of block ciphers with large mds matrices based on a new lookup table technique,” PLOS ONE, vol. 19, no. 6, p. e0304873, 2024.
U¨ nal C¸ avus¸og˘lu, A. Zengin, I. Pehlivan, and S. Kac¸ar, “A novel approach for strong s-box generation algorithm de- sign based on chaotic scaled zhongtang system,” Nonlinear Dynamics, vol. 87, pp. 1081–1094, 2017.
M. Usama, “An effective method of constructing strong lightweight s-boxes based on combining enhanced logistic and enhanced sine map,” IEEE Transactions on Computers, vol. 14, no. 8, 2021.
F. J. Lumal, “New dynamical key dependent s-box based on chaotic maps,” IOSR Journal, vol. 17, no. 4, pp. 91–101, 2015.
H. S. Alhadawi, M. A. Majid, D. Lambic´ et al., “A novel method of s-box design based on discrete chaotic maps and cuckoo search algorithm,” Multimedia Tools and Applica- tions, vol. 80, pp. 7333–7350, 2021.
I. Hussain, A. Anees, T. A. Al-Maadeed, and M. T. Mustafa, “Construction of s-box based on chaotic map and algebraic structures,” Symmetry, vol. 11, no. 3, pp. 494–501, 2019.
M. Long and L. Wang, “S-box design based on discrete chaotic map and improved artificial bee colony algorithm,” IEEE Access, vol. 9, pp. 86 144–86 154, 2021.
A. H. Saeed, “Development of dna-based dynamic key- dependent block cipher,” Ph.D. dissertation, Universiti Putra Malaysia, 2015, thesis to Graduate Studies for the Degree of Doctor of Philosophy.
F. Artug˘er, “A novel algorithm based on dna coding for substitution box generation problem,” Neural Computing and Applications, vol. 36, pp. 1283–1294, 2023.
A. T. Maolood, A. K. Farhan, W. I. El-Sobky, H. N. Zaky, H. L. Zayed, H. E. Ahmed, and T. O. Diab, “Fast novel efficient s-boxes with expanded dna codes,” Security and Communication Networks, vol. 2023, no. 1, 2023.
P. Agarwal, A. Singh, and A. Kilicman, “Development of key-dependent dynamic s-boxes with dynamic irreducible polynomial and affine constant,” Advances in Mechanical Engineering, vol. 10, no. 7, pp. 1–18, 2018.
U. Waqas, S. Afzal, M. A. Mir, and M. Yousaf, “Generation of aes like s-boxes by replacing affine matrix,” in 12th Inter- national Conference on Frontiers of Information Technology, 2014, pp. 159–164.
H. T. Assafli and I. A. Hashim, “Generation and evaluation of a new time-dependent dynamic s-box algorithm for aes block cipher cryptosystems,” in 3rd International Confer- ence on Recent Innovations in Engineering (ICRIE 2020), Materials Science and Engineering, 2020.
M. Dara and K. Manochehri, “Using rc4 and aes key schedule to generate dynamic s-box in aes,” Information Security Journal: A Global Perspective, vol. 23, no. 1-2, 2014.
A. I. Salih, A. Alabaichi, and A. S. Abbas, “A novel approach for enhancing security of aes using private xor table and 3d chaotic regarding to software quality factor,” ICIC Express Letters Part B: Applications, vol. 10, no. 9, pp. 1574–1581, 2019.
B. Prasetiyo and M. N. Ardian, “Enhancement security aes algorithm using a modification of transformation shiftrows and dynamic s-box,” in Journal of Physics: Conference Series, vol. 1567, no. 3, 2020, p. 032025.
T. T. Luong, N. N. Cuong, and B. Vo, “Aes security improvement by utilizing new key-dependent xor tables,” IEEE Access, pp. 53 158–53 177, 2024.
J. Daemen et al., “Aes proposal: Rijndael,” Katholieke Universiteit Leuven, ESAT-COSIC, Tech. Rep., 1999.
E. R. and R. A. R., “Improving diffusion power of aes rijndael with 8x8 mds matrix,” International Journal of Scientific & Engineering Research, vol. 2, pp. 1–5, 2011.
S. M., D. M., M. H., and O. B., “On construction of invo- lutory mds matrices from vandermonde matrices in gf(2q),” Designs, Codes and Cryptography, vol. 64, no. 3, pp. 287– 308, 2012.
G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “The keccak reference, version 3.0,” http://keccak.noekeon.org/ Keccak-reference-3.0.pdf, 2011.
G. Bertoni, J. Daemen, and M. Peeters, “Cryptographic sponge functions,” http://sponge.noekeon.org/CSF-0.1.pdf, 2011.
M. J. Dworkin, “Sha-3 standard: Permutation-based hash and extendable-output functions,” National Institute of Standards and Technology, Tech. Rep., 2015.
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo, “A statistical test suite for random and pseudorandom number generators for cryptographic applica- tions,” NIST, Tech. Rep., 2010.
A. I. Salih and A. A. A. Y. T., “Enhancing aes security based on dual dynamic xor table and mixcolumns transformation,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 19, no. 3, pp. 1574–1581, 2020.
L. H. Dinh, L. T. Thi, and L. N. Van, “On the mathematical aspects of cryptographic randomness tests using discrete fourier transform,” in 2024 1st International Conference On Cryptography And Information Security (VCRIS). IEEE, 2024, pp. 1–6.
