What is it about?
In this paper, we propose some straightforward yet highly effective techniques for generating t-bit random XOR tables. One approach is based on the Hadamard matrix, while another draws inspiration from the popular intellectual game Sudoku. Additionally, we introduce algorithms to animate the XOR transformation for generalized block ciphers. Specifically, we apply our findings to the AES encryption standard to present the key-dependent AES algorithm. Furthermore, we conduct a security analysis and assess the randomness of the proposed key-dependent AES algorithm using NIST SP 800-22, Shannon entropy based on the ENT tool, and min-entropy based on NIST SP 800-90B.
Featured Image
Why is it important?
Thanks to the key-dependent random XOR tables, the key-dependent AES algorithm have become much more secure than AES, and they also achieve better results in some statistical standards than AES.
Perspectives
Read the Original
This page is a summary of: Enhancing block cipher security with key-dependent random XOR tables generated via hadamard matrices and Sudoku game, Journal of Intelligent & Fuzzy Systems, April 2024, IOS Press,
DOI: 10.3233/jifs-236998.
You can read the full text:
Contributors
The following have contributed to this page