Security of present s-box

Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role to secure RFID’s tag. One of the common...

Full description

Saved in:
Bibliographic Details
Main Authors: Taha, Imad, Salim, Sufyan
Format: Conference or Workshop Item
Language:English
Published: 2012
Subjects:
Online Access:http://irep.iium.edu.my/28028/4/ieee-imad-sf.pdf
http://irep.iium.edu.my/28028/
http://www.acsat.co.uk
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.28028
record_format dspace
spelling my.iium.irep.280282013-07-02T07:29:37Z http://irep.iium.edu.my/28028/ Security of present s-box Taha, Imad Salim, Sufyan QA75 Electronic computers. Computer science Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role to secure RFID’s tag. One of the common lightweight block ciphers is PRESENT. In this paper, we attended both conditions of PRESENT substitution box S-box and those conditions of 4-bit S-box. They were studied and analyzed thoroughly in relation with linear and differential cryptanalysis. The results show that there is conflict in one of the conditions of PRESENT S-box. 2012-11-28 Conference or Workshop Item REM application/pdf en http://irep.iium.edu.my/28028/4/ieee-imad-sf.pdf Taha, Imad and Salim, Sufyan (2012) Security of present s-box. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses- KL. http://www.acsat.co.uk
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Taha, Imad
Salim, Sufyan
Security of present s-box
description Resource efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID (Radio-Frequency IDentification) tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role to secure RFID’s tag. One of the common lightweight block ciphers is PRESENT. In this paper, we attended both conditions of PRESENT substitution box S-box and those conditions of 4-bit S-box. They were studied and analyzed thoroughly in relation with linear and differential cryptanalysis. The results show that there is conflict in one of the conditions of PRESENT S-box.
format Conference or Workshop Item
author Taha, Imad
Salim, Sufyan
author_facet Taha, Imad
Salim, Sufyan
author_sort Taha, Imad
title Security of present s-box
title_short Security of present s-box
title_full Security of present s-box
title_fullStr Security of present s-box
title_full_unstemmed Security of present s-box
title_sort security of present s-box
publishDate 2012
url http://irep.iium.edu.my/28028/4/ieee-imad-sf.pdf
http://irep.iium.edu.my/28028/
http://www.acsat.co.uk
_version_ 1643609437101883392
score 13.154949