Professional Documents
Culture Documents
C22 NRSC2001 Dynamic Generation of S-Boxes in Block Cipher Systems
C22 NRSC2001 Dynamic Generation of S-Boxes in Block Cipher Systems
C22 NRSC2001 Dynamic Generation of S-Boxes in Block Cipher Systems
Abstract
Block cipher systems are widely used in cryptographic applications. The main problcm in
implementing any block cipher system is the fixed structure of S-Boxes elements. In this paper
we present a new method to build up dynamic Look-up-tabies (S-Boxes) changing with every
change of the secret key in addition to an evaluation criterion of block ciphers. This new apprciach
will lead to build up more secure block cipher systems and consequently solve the problem of the
fixed structure block ciphers.
1. Introduction
A cipher system is defined by Shannon [l] as a set T of reversible transformations from the
set M of possible plain messages into the set C of possible cryptograms. Each transformation T is
completely determined by a secret key and the enciphering algorithm. In block cipher system, the
plaintext message is broken into blocks, the ciphcnng process is carried out for the whole block at
the same time, so, using block cipher is somewhat faster than stream cipher. Classical block cipher
systems depend mainly on the S-boxes, which are fixed all the time, and their contents have no
relation with the secret key content. The role of the secret key is to chaise only t:ie adGress of
such S-boxes. So, the structure of the key generator is mainly fixed containing the S-boxes and the
only changeable parameter is the secrct key. The main parameters affecting tlie security.of block
cipher systems will be clarified. A proposed method to build dynamic change S-Boxes as a
function of the secret key will be presented. A complete package of the software programs to
simulate the proposed design and its effectiveness will be developed.
2. B.lsic Building Blocks of Block Cipher System
In the block cipher system, the enciphering algorithm will generally incorporate
substitution fbnctions and / or transposition (permutation) fbnctions.
2.1 Permutcrs
In permutation (transposition), tlie positions of the plaintext letters in the message are
simply rearranged. Perkuters are responsible for diflusion of security parameters [2].
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on December 07,2022 at 22:54:23 UTC from IEEE Xplore. Restrictions apply.
EIGRTEENTH NATIONAL RADIO SCIENCE CONFERENCE
March 27-29 2001,iVIansoura Uiiiv., Egypt
390
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on December 07,2022 at 22:54:23 UTC from IEEE Xplore. Restrictions apply.
EIGHTEENTH NATIONAL RADIO SCIENCE CONFERENCE
March 27-292001,3Iansoura Univ., Egypt
The new proposed approach depends mainly on .a chosen Latin square S-bos called
reference S-box which satisfies the randomness properties. Tlie secret key of the length 128 bits is
used to generate new Latin square S-box or S-boxes derived from the reference one with every
change of the secret key content. This approach is deeper and stronger than the one time pad
approach, which has new key for each new message, as it creates a new algorithm structure for a
new secret key. This new approach will solve the problem of the fixed structure S-Boxes and
consequently will increase the security level of the corresponding block cipher system.
i € { A I ) , 1 I J S 4 , 0 S x 5 15
A nibble permutation is generated by loading the decimal digits i=O through 15 sequentially into a
4-bit register. After each digit is loaded, the permutation generator is iterated fivc times to produce
an element of thc permutation. For each iteration, the three most significant bits of the 4-bit
register arc added to an offset and to an iteration dependent digit, j, to perform the selection of a
single bit from Linear Shift Registcr (LSR). The iteration dependent digits are O,S,16,24 and 32
respectively for each of the five iterations. The offsct is equal to 1 ~ 0 . 5 9and SS for x i, 1. A i..~.K i ,;.
n i ,d, respectively. Table 4. ldefines, which bits froin LSR that, are used to generate the nibble
permutation. The least significant bit of the 4-bit register is XORed with the selected bit from
LSR. The resulting bit is then sliified into tlie register and thc iicxt iteration is started. Another
way to view tlie nibble permutation generation is by considering thc 40-bits from LSR used in the
generation as five consecutive bytes. The offset scpecifies wliicii 40-bit group of bits from LSR
will be uscd. The iteration dependent variable, j, selects which of the five bytes is to bc used and
the 3 most significant bits from thc registcr select the bit withiri tlie byte. It should be observed
that a bit from LSR is selected for each iteration and there are. 16 elements in the permutation. This
requires a selection of 5 x 16=80 bits per permutation. Therefore, each of the 40-bits used in the
permutation generation will be u x d exactly twice. ARcr fivc iterations, the four-bit content of the
register becomes the first element of the first permutation. The four-bit register is then loaded with
the ncxt decimal digit i and the five iterations arc repeated to produce the next element. This is
repeated for all sixtcen decimal digit inputs. After x Al.1, is generated, the offsct is changed to 30
and the entire process is repeated to generate n A1.2, . Finally, 'IL AI,J and a A1.4, are senerated with
offset of 59 and 58 respcctiveIy. Once the first set of four nibbic permutations have been created
and the corresponding table creatcd, the LSR register is stepped 125 steps and tlie nibble
Senerating process is repcated to produce four new nibble permutations. These nibbles will be
used as the basic elements to construct the dynamic S-Boxes. All the previous proccsses are key
dependent and change with each new key.
391
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on December 07,2022 at 22:54:23 UTC from IEEE Xplore. Restrictions apply.
EIGHTEENTH NATIONAL RADIO SCIENCE CONFERENCE
March 27-29 2001,iVI1ansoura Univ., Egypt
5.Conclusion
. The new proposed approach is to build up dynamic Look up Tables (S-Boxes) changing
for every change of the secret key. The effectiveness of this new method is verified by changing
one bit only of the secret key to have new S-Boxes. This means that it is evident that for any
change of the secret key the structure of the block cipher system will be changed. This new
approach will lead to build up more secure block ciphers, solve the problem of the fixed structure
S-Boxes and consequently will increase the security level of the corresponding Block Cipher
System.
6. References
[ 11 C.E. Shannon, '' Communication Theory of Secrecy Systems ",Bell Sysit. Tech 5.28,
PP.656-715,1949.
[2] B.SMar, " Digital Communications-Fundamentals And Applications " Prentice- Hall, New
Jersey, 1988.
133 B.Schneier, " Applied Cryptography: Protocols, Algorithms, And Source: Code Inc " New
York, 1996.
[4] H.Beker, and F.Piper, " Cipher Systems: The Protection of Communicat.ions", Printed
and bound in Great Britain by Clark Constable, 1982.
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on December 07,2022 at 22:54:23 UTC from IEEE Xplore. Restrictions apply.
EIGHTEENTH NATIONAL RADIO SCIENCE CONFERENCE
March 27-292001,Mansoura Univ., Egypt
[6]X. Lai., “ On the Design and Security of Block Ciphers ” ,ETH series in Information
Processing, Konstanz, Hartung-Goree Verlag, Vol. 1, 1992, PP.320-365
393
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on December 07,2022 at 22:54:23 UTC from IEEE Xplore. Restrictions apply.
EIGHTEENTH NATIONAL RADIO SCIENCE CONFERENCE
March 27-29 2001,Mansoura Univ., Egypt
Initial permutation
Permuted
r
input + i f
1 Lo Ro
f
Ll=RO
I K:
i .Ir
R I ~ I@SF(RIs.KI~)
I
Permuted
OUtPllt
Iiiverse Initial Perniuhtion
I
OUTPUT
394
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on December 07,2022 at 22:54:23 UTC from IEEE Xplore. Restrictions apply.
EIGIITEENTH NATIONAL RADIO SCIENCE CONFERENCE
March 27-29 2001,iInnsoura Univ., Egypt
88-127
395
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on December 07,2022 at 22:54:23 UTC from IEEE Xplore. Restrictions apply.
EIGHTEENTH NATIONAL RADIO SCIENCE COWERENCE
March 27-29 2001,Mansoura Univ., Egypt
. , ,"
I
396
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on December 07,2022 at 22:54:23 UTC from IEEE Xplore. Restrictions apply.
EIGHTEENTH NATIONAL RADIO SCIEXCE CONFERENCE
ItIarch 27-29 2001,Mansoura Univ., Egypt
8-bit counter
X Y
397
Authorized licensed use limited to: Government of Egypt - SPCESR - (EKB). Downloaded on December 07,2022 at 22:54:23 UTC from IEEE Xplore. Restrictions apply.