SMX Algorithm A Novel Approach to Avalanche Effect

  • Slides: 19
Download presentation
SMX Algorithm: A Novel Approach to Avalanche Effect on Advanced Encryption Standard AES RESEARCH

SMX Algorithm: A Novel Approach to Avalanche Effect on Advanced Encryption Standard AES RESEARCH PRESENTATION SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI

AES � � � DES Failed, trust broken, 3 DES was a temporary solution.

AES � � � DES Failed, trust broken, 3 DES was a temporary solution. NIST in 1997 issues a call for proposals for a new Advanced Encryption Standard. Requirements: � Security better or equal to 3 DES, � Improved efficiency. � Mustbe a symetric block cipher with a block length of 128 bits and support for key lengths of 128, 192, and 256 bits. Evaluation criteria: � include security, � computational efficiency, � memory requirements, � hardware and software suitability, and � flexibility. In first round, 15 proposals were accepted, out of which in 2 nd round 5 algorithms were shortlisted and out of them Rijndeal was proposed as AES developed by cryptographers from Belgium, i. e Dr. Joan Daemen and Dr. Vincent Rijmen.

AES uses block length of 128 bits and a key length that can be

AES uses block length of 128 bits and a key length that can be 128, 192 or 256 bits. 1. Substitute Bytes: Uses S-box to perform byte by byte substitution of block. 2. Shift Rows: Simple permutation row by row. 3. Mix columns: Substitution that alters each byte in column as a function of all of bytes in column. 4. Add Round Keys: Simple bitwise XOR of current block with a portion of expanded key. � For both encryption and decryption, the cipher begins with an � � Add Round Key stage, followed by � Nine rounds that each includes all four stages, � Followed by a tenth round of three stages. Only the Add Round Key stage makes use of the key. For this reason, the cipher begins and ends with an Add Round Key stage. � Advantage: Each stage is easily reversible. �

AES STRUCTURE

AES STRUCTURE

AES STRUCTURE

AES STRUCTURE

AES STRUCTURE

AES STRUCTURE

problem statement Ø Use of static S-Box IN aes Ø NO RANDOMNESS IN THE

problem statement Ø Use of static S-Box IN aes Ø NO RANDOMNESS IN THE OUTPUT Ø Prone to attacks

PROPOSED METHODOLOGY Dynamic S-Box : 16 byte KEY 0 1 2 3 4 5

PROPOSED METHODOLOGY Dynamic S-Box : 16 byte KEY 0 1 2 3 4 5 6 7 8 9 10 11 12 Sum =KEY[0]+KEY[1]+…. . +KEY[15] Index=Sum %16 Dynamic Sbox=Static Sbox xor KEY[Index] 13 14 15

Encryption ALGORITHM OF PROPOSED smx aes • Chose a master key for AES. •

Encryption ALGORITHM OF PROPOSED smx aes • Chose a master key for AES. • Compute sum of each round key and mod with 16 to get the index of the round key. • for i= 1 to 10 sum[i]=Round. Key[0]+Round. Key[1]+. . . . +Round. Key[15]. • index=sum[i]%16. • Compute New SMXS-Box, where each cell is equal to XOR with index of the key. New SMXSbox=Inv. Sbox. AES⊕Round. Key[index]. • Continue as described in the AES algorithm.

DECRYPTION ALGORITHM OF PROPOSED smx aes • Chose a initial key for AES. •

DECRYPTION ALGORITHM OF PROPOSED smx aes • Chose a initial key for AES. • Compute sum of each round key and mod with 16 to get the index of the round key. • for i= 1 to 10 sum[i]=Round. Key[0]+Round. Key[1]+. . . . +Round. Key[15]. • index=sum[i]%16. • Compute New SMXS-Box, where each cell is equal to XOR with index of the key. New SMXSbox=Inv. Sbox. AES⊕Round. Key[index]. • Computing inverse INV New SMXSbox = INV(Inv. Sbox. AES⊕ Round. Key[index]). • Continue as described in the AES algorithm.

AVALANCHE EFFECT Avalanche effect, is the measure of the number of bits flipped in

AVALANCHE EFFECT Avalanche effect, is the measure of the number of bits flipped in the ciphertext when one bit of the plaintext is changed. The measure of the output bits should be changed 50% with respect to the input bits. Avalanche effect = (number of flipped bits * 100 total number of bits)

AVALANCHE EFFECT of normal aes

AVALANCHE EFFECT of normal aes

AVALANCHE EFFECT of dynamic aes

AVALANCHE EFFECT of dynamic aes

AVALANCHE EFFECT of proposed smx aes

AVALANCHE EFFECT of proposed smx aes

COMPARISON OF NORMAL AES, DYNAMIC AES, AND PROPOSED smx AES based on plaintext q

COMPARISON OF NORMAL AES, DYNAMIC AES, AND PROPOSED smx AES based on plaintext q 20 % gain in comparison of dynamic AES and 35 % gain in comparison of normal AES.

COMPARISON OF DYNAMIC AES AND PROPOSED AES based on plaintext q The range of

COMPARISON OF DYNAMIC AES AND PROPOSED AES based on plaintext q The range of variations in dynamic AES is 17. 19 where as in proposed SMX AES is 13. 29, a gain of 3. 9 points.

COMPARISON OF DYNAMIC AES AND PROPOSED AES based on master key

COMPARISON OF DYNAMIC AES AND PROPOSED AES based on master key

Simulation time of all three algorithms q Encryption time gain in SMX AES in

Simulation time of all three algorithms q Encryption time gain in SMX AES in comparison of dynamic AES is 0. 00264615 seconds. 0. 02036 0. 02062 0. 02234 0. 02122 0. 01969 0. 02033 q Decryption time gain in SMX AES in comparison of dynamic AES is 0. 000893 seconds.

conclusion • SMX AES shows that there is 20% gain in comparison of dynamic

conclusion • SMX AES shows that there is 20% gain in comparison of dynamic AES and 35 % gain in comparison of normal AES. • The range of variations in dynamic AES is 17. 19 where as in proposed SMX AES is 13. 29, a clear gain of 3. 9 points in SMX AES. • The most significant time gain test results show that encryption time gain in SMX AES in comparison of dynamic AES is 0. 00264615 seconds. Similarly, decryption time gain in SMX AES in comparison of dynamic AES is 0. 000893 seconds.