{"title":"Proposal new s-box depending on DNA computing and mathematical operations","authors":"F. Kadhim, G. H. Abdul Majeed, Rasha S. Ali","doi":"10.1109/AIC-MITCSA.2016.7759926","DOIUrl":null,"url":null,"abstract":"Today, information has become an important resource and so is its security. Many scientists attempted to use new methods inspired from DNA bio-techniques in the field of cryptography and steganography. The idea of using DNA cryptography has been specified as possible technology that gets a new hope for unbreakable algorithms as traditional cryptographic systems are now vulnerable to certain attacks. S-boxes (Substitution boxes) are keystones of modern symmetric cryptosystems (block ciphers and stream ciphers). In this research a new s-box creation scheme was proposed based on encoding into DNA codon, XOR operation and some mathematical operations. The results of the tests showed that the proposed method was effectively passed the S-Box tests criteria of such as balanced, completeness, avalanche criterion and strict avalanche criterion. The results showed that the proposed method provides secure S-box, which is 255 differences was found when changing only 1 bit of key, thus approximately %99 the S-Box was changed. In this method the secret key and the server name are used as example for generating new values of S-box two keys was used to strengthen the security of the created S-Box. Also, one key can be used to generate the S-Box values because of another key was generated by using the proposed method and it is equal to 0. The s-box inverse was also generated depending on the same strings that are used in generating the s-box. The generation time measured in milliseconds. The proposed method does not include several stages such as genetic algorithms. So the proposed method faster than genetic algorithms to the fact that genetic algorithm passed through several stages to find the best solution.","PeriodicalId":315179,"journal":{"name":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AIC-MITCSA.2016.7759926","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 29
Abstract
Today, information has become an important resource and so is its security. Many scientists attempted to use new methods inspired from DNA bio-techniques in the field of cryptography and steganography. The idea of using DNA cryptography has been specified as possible technology that gets a new hope for unbreakable algorithms as traditional cryptographic systems are now vulnerable to certain attacks. S-boxes (Substitution boxes) are keystones of modern symmetric cryptosystems (block ciphers and stream ciphers). In this research a new s-box creation scheme was proposed based on encoding into DNA codon, XOR operation and some mathematical operations. The results of the tests showed that the proposed method was effectively passed the S-Box tests criteria of such as balanced, completeness, avalanche criterion and strict avalanche criterion. The results showed that the proposed method provides secure S-box, which is 255 differences was found when changing only 1 bit of key, thus approximately %99 the S-Box was changed. In this method the secret key and the server name are used as example for generating new values of S-box two keys was used to strengthen the security of the created S-Box. Also, one key can be used to generate the S-Box values because of another key was generated by using the proposed method and it is equal to 0. The s-box inverse was also generated depending on the same strings that are used in generating the s-box. The generation time measured in milliseconds. The proposed method does not include several stages such as genetic algorithms. So the proposed method faster than genetic algorithms to the fact that genetic algorithm passed through several stages to find the best solution.