Cryptography, SPN algorithm and a simulation on S-Boxes

DSpace Repository

Show simple item record

dc.contributor.author Blerina Celiku; Department of Natyral Sciences, Fan.S.Noli University
dc.contributor.author Dhori Beta; Department of Natyral Sciences, Fan.S.Noli University
dc.contributor.author Erma Pema; Department of Natyral Sciences, Fan.S.Noli University
dc.date 2013-06-17 09:22:27
dc.date.accessioned 2013-07-15T11:51:56Z
dc.date.accessioned 2015-11-23T16:00:21Z
dc.date.available 2013-07-15T11:51:56Z
dc.date.available 2015-11-23T16:00:21Z
dc.date.issued 2013-07-15
dc.identifier http://ecs.epoka.edu.al/index.php/iscim/iscim2011/paper/view/695
dc.identifier.uri http://dspace.epoka.edu.al/handle/1/710
dc.description.abstract It is impossible to imagine ourselves not involved in this tremendously increasingtechnology nowadays. In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of thecomputer network and resources that are network-accessible. Network security is acomplicated subject, historically only discussed by well-trained and experienced experts. However, as more and more we become "wired", all of us need tounderstand the basics of security in a networked world. In this research paper wetreat shortly the network concepts such as authentication and anti-virus softs and management of security which is different for all kinds of networks. So a small home or a workplace would only require basic security while large businesses will require high maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming. The term network security and information security are often used interchangeably. Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption. Some history of cryptography is included, as well as an introduction that begins with Caesar Cipherand other used simple cryptosystems such as Shift, Substitution, Affine, Vigenere,Hill, Permutation, and Autokey Ciphers and the classification of modern cryptographic algorithms. In next session will be discussed S-Boxes as the most important part of SPN (Substitution-Permutation Network) that is a mixed transformation of bits in a number of rounds. What is more important is the non linearity of the s-box within a cryptosystem. That means that the function between the input bits and output bits must be non-linear. This gives the strengthness of analgorithm against attacks. The question is; how can this be achieved? There are several criterias that an s-box must satisfy to be non-linear. These will be described in an example then we go on with a software that examines the properties of the sbox.As a result will be defined if the s-box is appropriate to be used or not. What usreally matters is that what must be secret has to be a secret!
dc.format application/pdf
dc.language en
dc.publisher International Symposium on Computing in Informatics and Mathematics
dc.source International Symposium on Computing in Informatics and Mathematics; 1st International Symposium on Computing in Informatics and Mathematics
dc.subject Information security; Network; Cryptography; Cipher; S-Box
dc.title Cryptography, SPN algorithm and a simulation on S-Boxes
dc.type Peer-reviewed Paper


Files in this item

This item appears in the following Collection(s)

  • ISCIM 2011
    1st International Symposium on Computing in Informatics and Mathematics

Show simple item record

Search DSpace


Browse

My Account