S-box optimisation using heuristic methods

Herman Isa, Norziana Jamil, Muhammad Reza Z'Aba

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Isa et al. (2013, 2016) proposed two heuristic algorithms (redundancy removal and bee waggle dance) to construct cryptographically strong substitution boxes (S-boxes). The resulting S-boxes produced by these algorithms are suitable for cryptographic use. Inspired by their work, this paper explores a new method to optimise an S-box by integrating these two algorithms. Our experiments show that at least three cryptographically strong S-boxes can be produced by the new method. The results also improves upon a previous construction by Mamadolimov et al. (2013) which utilises the redundancy removal algorithm.

Original languageEnglish
Title of host publicationProceedings of the 5th International Cryptology and Information Security Conference 2016, CRYPTOLOGY 2016
EditorsHeng Swee Huay, Mohamad Rushdan Md. Said, Muhammad Rezal Kamel Ariffin, Moesfa Soeheila Mohamad, Amir Hamzah Abd Ghafar, Goi Bok Min, Hailiza Kamarulhaili
PublisherInstitute for Mathematical Research (INSPEM)
Pages120-128
Number of pages9
ISBN (Electronic)9789834406950
Publication statusPublished - 01 Jan 2016
Event5th International Cryptology and Information Security Conference 2016, CRYPTOLOGY 2016 - Kota Kinabalu, Sabah, Malaysia
Duration: 31 May 201602 Jun 2016

Publication series

NameProceedings of the 5th International Cryptology and Information Security Conference 2016, CRYPTOLOGY 2016

Other

Other5th International Cryptology and Information Security Conference 2016, CRYPTOLOGY 2016
CountryMalaysia
CityKota Kinabalu, Sabah
Period31/05/1602/06/16

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Information Systems
  • Electrical and Electronic Engineering

Cite this

Isa, H., Jamil, N., & Z'Aba, M. R. (2016). S-box optimisation using heuristic methods. In H. S. Huay, M. R. M. Said, M. R. K. Ariffin, M. S. Mohamad, A. H. A. Ghafar, G. B. Min, & H. Kamarulhaili (Eds.), Proceedings of the 5th International Cryptology and Information Security Conference 2016, CRYPTOLOGY 2016 (pp. 120-128). (Proceedings of the 5th International Cryptology and Information Security Conference 2016, CRYPTOLOGY 2016). Institute for Mathematical Research (INSPEM).