S-box optimisation using heuristic methods

Herman Isa, Norziana Jamil, Muhammad Reza Z'Aba

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Isa et al. (2013, 2016) proposed two heuristic algorithms (redundancy removal and bee waggle dance) to construct cryptographically strong substitution boxes (S-boxes). The resulting S-boxes produced by these algorithms are suitable for cryptographic use. Inspired by their work, this paper explores a new method to optimise an S-box by integrating these two algorithms. Our experiments show that at least three cryptographically strong S-boxes can be produced by the new method. The results also improves upon a previous construction by Mamadolimov et al. (2013) which utilises the redundancy removal algorithm.

Original languageEnglish
Title of host publicationProceedings of the 5th International Cryptology and Information Security Conference 2016, CRYPTOLOGY 2016
EditorsHeng Swee Huay, Mohamad Rushdan Md. Said, Muhammad Rezal Kamel Ariffin, Moesfa Soeheila Mohamad, Amir Hamzah Abd Ghafar, Goi Bok Min, Hailiza Kamarulhaili
PublisherInstitute for Mathematical Research (INSPEM)
Pages120-128
Number of pages9
ISBN (Electronic)9789834406950
Publication statusPublished - 2016
Externally publishedYes
Event5th International Cryptology and Information Security Conference 2016, CRYPTOLOGY 2016 - Kota Kinabalu, Sabah, Malaysia
Duration: May 31 2016Jun 2 2016

Publication series

NameProceedings of the 5th International Cryptology and Information Security Conference 2016, CRYPTOLOGY 2016

Conference

Conference5th International Cryptology and Information Security Conference 2016, CRYPTOLOGY 2016
Country/TerritoryMalaysia
CityKota Kinabalu, Sabah
Period5/31/166/2/16

Keywords

  • Bee waggle dance algorithm
  • Heuristic
  • Nonlinearity
  • Redundancy removal algorithm
  • S-box

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'S-box optimisation using heuristic methods'. Together they form a unique fingerprint.

Cite this