Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/14445
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAgarwal, Anupam-
dc.date.accessioned2019-05-22T09:49:28Z-
dc.date.available2019-05-22T09:49:28Z-
dc.date.issued2016-
dc.identifier.urihttp://hdl.handle.net/123456789/14445-
dc.description.abstractThis report represents an investigation about Substitution Box (S-Box) used in cryptography system. S-Box is one of prime part of cryptographic algorithm. Various properties of Substitution Box makes cryptographic algorithm susceptible to attacks. Will first study attacker strategy with possible attacks on cryptographic system and then about S-Box design principles. The goal of any assaulter is to find the key by an effective technique (finds properties which distinguished cipher text from random text). Then we will study about the methods by which the cryptographic algorithm is supposed to be compromised. S-Box should produce output which is comparable to any random generator. Here in order to measure the deviation of Substitution box from a randomly generated permutation, I have generated large number of random permutations and then measured it with the distribution of used terms in every vectors, analysis them with respect to actual figures fetched from AES Substitution box.en_US
dc.description.sponsorshipIndian Institute of Technology, Roorkee.en_US
dc.language.isoenen_US
dc.publisherDepartment of Computer Science and Engineering,IITR.en_US
dc.subjectSubstitution Box (S-Box)en_US
dc.subjectCryptography Systemen_US
dc.subjectAdvanced Encryption Standard (AES)en_US
dc.subjectExploiting Cryptography Algorithmen_US
dc.titleHEURISTIC ANALYSIS OF SUBSTITUTION BOXen_US
dc.typeOtheren_US
Appears in Collections:DOCTORAL THESES (E & C)

Files in This Item:
File Description SizeFormat 
G26019-anupam_D.pdf1.8 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.