A Study of Fibonacci Number in S-box Block Cipher

  • Kamsiah binti Mohamed Faculty of Communication, Visual Art and Computing, Universiti Selangor
  • Fakariah Hani Hj. Mohd Ali
  • Suriyani Ariffin
  • Mohd Nazran Mohammed Pauzi
Keywords: decryption, encryption, Fibonacci, golden ratio, substitution box

Abstract

Substitution box (S-box) plays an important role in block cipher to protect data from any threats. The need for secure cipher is ever-increasing to protect data in several ways to provide confidentiality, integrity and authentication. The data is encrypted to prevent unauthorized users from accessing the information. However, as stated in the National Strategy ICT Roadmap, security is one of the pressing needs and critical infrastructure in Malaysia. In addition, within the advancement of technology the design of cryptographic algorithm in block cipher is often enhanced to ensure that the information is secure. Therefore, this paper proposed the new S-box using the concept of Fibonacci number in nature to improve the security of block cipher algorithm. Result showed that the new proposed S-box using the Fibonacci number possessed good cryptographic properties.

References

Agarwal, P., Agarwal, N., & Saxena, R. (2015). Data Encryption through Fibonacci sequence and Unicode Characters. MIT International Journal of Computer Science and Information Technology, 5(2), pp.79-82.
Ahamad, V. M., Siddiqui, U.M., Masroor, M., & Fatima, U. (2018). An Improved Playfair Encryption Technique Using Fibonacci Series Generated Secret Key. International Journal of Engineering & Technology, 7(4.5), pp. 347-351. doi: http://dx.doi.org/10.14419/ijet.v7i4.5.20104
Ashrafian, H., & Athanasiou, T. (2011). Fibonacci series and coronary anatomy. Heart, Lung and Circulation, 20(7), pp.483-484.
Elfard, S. S. (2013) Cryptography Based on the Linear Fibonacci Forms. University Bulletin – Issue no.15 – Vol . 2.
Gonsalves ,G. M., Bhat, G.N., & Tangod, K., K. (2017). Performance Analysis of Secured Communication with Cryptography Using Fibonacci Series. International Journal of Innovations in Engineering Research and Technology [IJIERT].Volume 4, Issue 6.
Hamilton, R. & Dunsmuir, R.A. (2002) Radiographic Assessment of The Relative Lengths of The Bones of The Fingers of The Human Hand. J Hand Surg Br.27, pp. 546-548.
Hutchison, A. L., & Hutchison, R. L. (2010). Fibonacci, Littler, And The Hand: A Brief Review. Hand, 5(4), pp. 364-368.
Khadri, S. K. A., Samanta, D., & Paul, M. (2014). Approach of Message Communication Using Fibonacci Series: In Cryptology. Lecture Notes on Information Theory Vol, 2(2).
Littler, J.W. (1973). On The Adaptability of Man’s Hand (With Reference To The Equiangular Curve). Hand. 5, pp.187-191.
Mohamed, M. H., Mahdy, Y. B., & Shaban, W. A. E. W. (2015). Confidential Algorithm for Golden Cryptography Using Haar Wavelet. arXiv preprint arXiv:1501.03617.
Paul, M., & Mandal, J. K. (2013). A Novel Symmetric Key Cryptographic Technique At Bit Level Based On Spiral Matrix Concept. arXiv preprint arXiv:1305.0807
Perez, J. C. (2015). Deciphering Hidden DNA Meta-Codes-The Great Unification & Master Code of Biology. Journal of Glycomics & Lipidomics, 5(2), 1.
Persaud, D., & O'Leary, J. P. (2015). Fibonacci Series, Golden Proportions, and the Human Biology.
Pomeraz, V. (1970). Leonardo of Pisa. James Joyce Quarterly, 7(2), pp.148-150.
Prajapat, S., Jain, A., & Thakur, R. S. (2012). A Novel Approach For Information Security With Automatic Variable Key Using Fibonacci Q-Matrix. IJCCT, 3(3), pp.54-57.
Quazi, Q. A., Maddikar, Y. P., & Tangod, K. K. (2017). A Survey on Secure E-mailing System with Cryptography Using Fibonacci Series. International Journal of Innovative Research in Computer and Communication Engineering. Vol. 5, Issue 5.
Raphael, A. J., & Sundaram, V. (2012). Secured communication through fibonacci numbers and unicode symbols. International Journal of Scientific & Engineering Research, 3(4), 2229-5518.
Robertson, D. S. (2001). Cellular Configuration Of DNA And Cell Division. Medical Hypotheses, 57(3), pp. 344-353.
Yeates A. C. (2013). Application of Linear Sequences to Cryptography. Honors Theses. Paper 191.
Yetkin, G., Sivri, N., Yalta, K., & Yetkin, E. (2013). Golden Ratio Is Beating in Our Heart. International journal of cardiology, 168(5), pp. 4926-4927.
Published
2020-01-24
How to Cite
Mohamed, K., Hj. Mohd Ali, F. H., Ariffin, S., & Mohammed Pauzi, M. N. (2020). A Study of Fibonacci Number in S-box Block Cipher. Selangor Science & Technology Review (SeSTeR), 3(1), 49-58. Retrieved from http://sester.journals.unisel.edu.my/ojs/index.php/sester/article/view/133
Section
Articles in English