Generating key-dependent involutory MDS matrices through permutations, direct exponentiation, and scalar multiplication
by Tran Thi Luong; Hoang Dinh Linh
International Journal of Information and Computer Security (IJICS), Vol. 23, No. 4, 2024

Abstract: Block ciphers are a crucial type of cryptographic algorithm being used to ensure information security for many applications today. However, there are numerous potential active attacks on block ciphers, so the research and design of dynamic block ciphers to advance the security of block ciphers is a matter of concern today. Maximum distance separable (MDS) matrices are a crucial component of many block ciphers. Involutory MDS matrices are primarily selected because using an involutory matrix allows for both encryption and decryption operations to be performed using the identical circuitry, resulting in an equal implementation cost for both processes. In this article, we propose algorithms to generate 4 × 4 and 8 × 8 Hadamard involutory MDS matrices based on column and row permutations. Next, we propose an algorithm to create key-dependent involutory MDS matrices based on column and row permutation, scalar multiplication, and direct exponentiation. Then, we experimentally strengthen the dynamic AES block cipher based on the proposed algorithm, conduct security analysis, and evaluate the NIST statistical criteria for AES and the dynamic AES algorithm. The outcomes of our research could potentially enhance the robustness of the AES block cipher against numerous contemporary powerful attacks.

Online publication date: Mon, 10-Jun-2024

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Computer Security (IJICS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com