A Study of Fibonacci Number in S-box Block Cipher
Substitution box (S-box) plays an important role in block cipher to protect data from any threats. The need for secure cipher is ever-increasing to protect data in several ways to provide confidentiality, integrity and authentication. The data is encrypted to prevent unauthorized users from accessing the information. However, as stated in the National Strategy ICT Roadmap, security is one of the pressing needs and critical infrastructure in Malaysia. In addition, within the advancement of technology the design of cryptographic algorithm in block cipher is often enhanced to ensure that the information is secure. Therefore, this paper proposed the new S-box using the concept of Fibonacci number in nature to improve the security of block cipher algorithm. Result showed that the new proposed S-box using the Fibonacci number possessed good cryptographic properties.
Ahamad, V. M., Siddiqui, U.M., Masroor, M., & Fatima, U. (2018). An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key. International Journal of Engineering & Technology, 7(4.5), pp. 347-351. doi: http://dx.doi.org/10.14419/ijet.v7i4.5.20104
Ashrafian, H., & Athanasiou, T. (2011). Fibonacci series and coronary anatomy. Heart, Lung and Circulation, 20(7), pp.483-484.
Elfard, S. S. (2013) Cryptography Based on the Linear Fibonacci Forms. University Bulletin – Issue no.15 – Vol . 2.
Gonsalves ,G. M., Bhat, G.N., & Tangod, K., K. (2017). Performance Analysis of Secured Communication with Cryptography Using Fibonacci Series. International Journal of Innovations in Engineering Research and Technology [IJIERT].Volume 4, Issue 6.
Hamilton, R. & Dunsmuir, R.A. (2002) Radiographic Assessment of The Relative Lengths of The Bones of The Fingers of The Human Hand. J Hand Surg Br.27, pp. 546-548.
Hutchison, A. L., & Hutchison, R. L. (2010). Fibonacci, Littler, And The Hand: A Brief Review. Hand, 5(4), pp. 364-368.
Khadri, S. K. A., Samanta, D., & Paul, M. (2014). Approach of Message Communication Using Fibonacci Series: In Cryptology. Lecture Notes on Information Theory Vol, 2(2).
Littler, J.W. (1973). On The Adaptability of Man’s Hand (With Reference To The Equiangular Curve). Hand. 5, pp.187-191.
Mohamed, M. H., Mahdy, Y. B., & Shaban, W. A. E. W. (2015). Confidential Algorithm for Golden Cryptography Using Haar Wavelet. arXiv preprint arXiv:1501.03617.
Paul, M., & Mandal, J. K. (2013). A Novel Symmetric Key Cryptographic Technique At Bit Level Based On Spiral Matrix Concept. arXiv preprint arXiv:1305.0807
Perez, J. C. (2015). Deciphering Hidden DNA Meta-Codes-The Great Unification & Master Code of Biology. Journal of Glycomics & Lipidomics, 5(2), 1.
Persaud, D., & O'Leary, J. P. (2015). Fibonacci Series, Golden Proportions, and the Human Biology.
Pomeraz, V. (1970). Leonardo of Pisa. James Joyce Quarterly, 7(2), pp.148-150.
Prajapat, S., Jain, A., & Thakur, R. S. (2012). A Novel Approach For Information Security With Automatic Variable Key Using Fibonacci Q-Matrix. IJCCT, 3(3), pp.54-57.
Quazi, Q. A., Maddikar, Y. P., & Tangod, K. K. (2017). A Survey on Secure E-mailing System with Cryptography Using Fibonacci Series. International Journal of Innovative Research in Computer and Communication Engineering. Vol. 5, Issue 5.
Raphael, A. J., & Sundaram, V. (2012). Secured communication through fibonacci numbers and unicode symbols. International Journal of Scientific & Engineering Research, 3(4), 2229-5518.
Robertson, D. S. (2001). Cellular Configuration Of DNA And Cell Division. Medical Hypotheses, 57(3), pp. 344-353.
Yeates A. C. (2013). Application of Linear Sequences to Cryptography. Honors Theses. Paper 191.
Yetkin, G., Sivri, N., Yalta, K., & Yetkin, E. (2013). Golden Ratio Is Beating in Our Heart. International journal of cardiology, 168(5), pp. 4926-4927.
All materials contained within this journal are protected by Intellectual Property Corporation of Malaysia, Copyright Act 1987 and may not be reproduced, distributed, transmitted, displayed, published, or
broadcast without the prior, express written permission of Centre for Graduate Studies, Universiti Selangor, Malaysia. You may not alter or remove any copyright or other notice from copies of this content.