{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:59:40Z","timestamp":1777705180653,"version":"3.51.4"},"reference-count":25,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2024,4,18]]},"abstract":"<jats:p>The XOR operator is a simple yet crucial computation in computer science, especially in cryptography. In symmetric cryptographic schemes, particularly in block ciphers, the AddRoundKey transformation is commonly used to XOR an internal state with a round key. One method to enhance the security of block ciphers is to diversify this transformation. In this paper, we propose some straightforward yet highly effective techniques for generating t-bit random XOR tables. One approach is based on the Hadamard matrix, while another draws inspiration from the popular intellectual game Sudoku. Additionally, we introduce algorithms to animate the XOR transformation for generalized block ciphers. Specifically, we apply our findings to the AES encryption standard to present the key-dependent AES algorithm. Furthermore, we conduct a security analysis and assess the randomness of the proposed key-dependent AES algorithm using NIST SP 800-22, Shannon entropy based on the ENT tool, and min-entropy based on NIST SP 800-90B. Thanks to the key-dependent random XOR tables, the key-dependent AES algorithm have become much more secure than AES, and they also achieve better results in some statistical standards than AES.<\/jats:p>","DOI":"10.3233\/jifs-236998","type":"journal-article","created":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T13:19:09Z","timestamp":1707225549000},"page":"7805-7821","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing block cipher security with key-dependent random XOR tables generated via hadamard matrices and Sudoku game"],"prefix":"10.1177","volume":"46","author":[{"given":"Dinh Linh","family":"Hoang","sequence":"first","affiliation":[{"name":"Institute of Cryptographic Science and Technology, Lang Ha, Dong Da, Hanoi, Vietnam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tran Thi","family":"Luong","sequence":"additional","affiliation":[{"name":"Academy of Cryptography Techniques, Tan Trieu, Thanh Tri, Hanoi, Vietnam"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-236998_ref1","doi-asserted-by":"publisher","first-page":"20191","DOI":"10.1109\/ACCESS.2021.3051556","article-title":"A polymorphic advanced encryption standard\u2013a novel approach","volume":"9","author":"Altigani","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-236998_ref2","doi-asserted-by":"crossref","first-page":"e587","DOI":"10.7717\/peerj-cs.587","article-title":"A secure key dependent dynamic substitution method for symmetric cryptosystems","volume":"7","author":"Ejaz","year":"2021","journal-title":"PeerJ Computer Science"},{"key":"10.3233\/JIFS-236998_ref3","doi-asserted-by":"crossref","first-page":"93","DOI":"10.5121\/ijcnc.2015.7208","article-title":"A new DNAbased approach of generating key dependent MixColumnstransformation,","volume":"7","author":"Al-Wattar","year":"2015","journal-title":"International Journal of Computer Networks &Communications (IJCNC)"},{"key":"10.3233\/JIFS-236998_ref5","doi-asserted-by":"publisher","first-page":"823","DOI":"10.24507\/icicelb.10.09.823","article-title":"A novel approach for enhancing security of advance encryption standard using private XOR table and 3D chaotic regarding to software quality factor,","volume":"10","author":"Salih","year":"2019","journal-title":"ICIC Express Letters Part B: Applications, An International Journal of Research and Surveys"},{"key":"10.3233\/JIFS-236998_ref6","doi-asserted-by":"crossref","first-page":"1574","DOI":"10.11591\/ijeecs.v19.i3.pp1574-1581","article-title":"Enhancing advance encryption standard security based on dual dynamic XOR table and mixcolumns transformation","volume":"19","author":"Salih","year":"2020","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"key":"10.3233\/JIFS-236998_ref7","doi-asserted-by":"crossref","first-page":"103969","DOI":"10.1016\/j.dsp.2023.103969","article-title":"FPGA modeling of a novel fully-synthesizable and secure TRNG based on key-dependent s-box","volume":"136","author":"Garipcan","year":"2023","journal-title":"Digital Signal Processing"},{"key":"10.3233\/JIFS-236998_ref8","doi-asserted-by":"crossref","first-page":"103065","DOI":"10.1016\/j.jisa.2021.103065","article-title":"A novel method to generate key-dependent s-boxes with identical algebraic properties","volume":"64","author":"Al-Dweik","year":"2022","journal-title":"Journal of Information Security and Applications"},{"key":"10.3233\/JIFS-236998_ref10","first-page":"23","article-title":"Twofish: A 128-bit block cipher,","volume":"15","author":"Schneier","year":"1998","journal-title":"NIST AES Proposal"},{"key":"10.3233\/JIFS-236998_ref11","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication,","volume":"27","author":"Shannon","year":"1948","journal-title":"The Bell System Technical Journal"},{"key":"10.3233\/JIFS-236998_ref13","doi-asserted-by":"crossref","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","article-title":"Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption,","volume":"82","author":"Liu","year":"2023","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/JIFS-236998_ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF02254789","article-title":"The design of product ciphers resistant to differential and linear cryptanalysis,","volume":"9","author":"Heys","year":"1996","journal-title":"Journal of Cryptology"},{"key":"10.3233\/JIFS-236998_ref15","doi-asserted-by":"crossref","first-page":"103514","DOI":"10.1016\/j.jisa.2023.103514","article-title":"Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms,,","volume":"76","author":"Noura","year":"2023","journal-title":"Journal of Information Security and Applications"},{"key":"10.3233\/JIFS-236998_ref16","doi-asserted-by":"crossref","first-page":"012042","DOI":"10.1088\/1757-899X\/978\/1\/012042","article-title":"Generation and Evaluation of a New Time-Dependent Dynamic S-Box Algorithm for AES Block Cipher Cryptosystems,","author":"Assafli","year":"2020","journal-title":"In IOP Conference Series: Materials Science and Engineering"},{"key":"10.3233\/JIFS-236998_ref17","doi-asserted-by":"crossref","unstructured":"Daemen J. and Rijmen V. , The design of Rijndael, New York: Springer-verlag 2 (2002).","DOI":"10.1007\/978-3-662-04722-4"},{"key":"10.3233\/JIFS-236998_ref22","doi-asserted-by":"crossref","first-page":"2426","DOI":"10.1016\/j.ins.2009.03.002","article-title":"Some properties of Renyi entropy and Renyi entropy rate,","volume":"179","author":"Golshani","year":"2009","journal-title":"Information Science"},{"key":"10.3233\/JIFS-236998_ref23","doi-asserted-by":"crossref","first-page":"3925","DOI":"10.3233\/JIFS-190137","article-title":"BCH Codes with computational approach and itsapplications in image encryption,","volume":"37","author":"Asif","year":"2019","journal-title":"Journal of Intelligent &Fuzzy Systems"},{"key":"10.3233\/JIFS-236998_ref24","doi-asserted-by":"crossref","first-page":"32708","DOI":"10.1109\/ACCESS.2023.3262924","article-title":"On the Construction of New Lightweight Involutory MDSMatrices in Generalized Subfield Form,","volume":"11","author":"Pehlivanoglu","year":"2023","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-236998_ref25","doi-asserted-by":"crossref","first-page":"2325","DOI":"10.3233\/JIFS-211176","article-title":"Newcombination of simple additive and entropy weighting criteria forthe selection of best substitution box,","volume":"41","author":"Khan","year":"2021","journal-title":"Journal of Intelligent& Fuzzy Systems"},{"key":"10.3233\/JIFS-236998_ref27","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1504\/IJACT.2020.107164","article-title":"Dynamic MDS diffusion layers with efficient software implementation,","volume":"4","author":"Shamsabad","year":"2020","journal-title":"International Journal of Applied Cryptography"},{"key":"10.3233\/JIFS-236998_ref29","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/s10623-011-9578-x","article-title":"On construction of involutory MDS matrices from Vandermonde Matrices in GF (2 q)","volume":"64","author":"Sajadieh","year":"2012","journal-title":"Designs, Codes and Cryptography"},{"key":"10.3233\/JIFS-236998_ref31","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1023\/A:1019991004496","article-title":"Key-dependent S-boxes and differential cryptanalysis,","volume":"27","author":"Murphy","year":"2002","journal-title":"Designs, Codes and Cryptography"},{"key":"10.3233\/JIFS-236998_ref32","doi-asserted-by":"crossref","first-page":"3003","DOI":"10.1007\/s11277-020-07514-9","article-title":"Towards the design of a stronger AES: AES with key dependent shift rows (KDSR),","volume":"114","author":"Srisakthi","year":"2020","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-236998_ref33","doi-asserted-by":"crossref","first-page":"102279","DOI":"10.1016\/j.ffa.2023.102279","article-title":"A note on semi-orthogonal (G-matrix) and semi-involutory MDS matrices.","volume":"92","author":"Chatterjee","year":"2023","journal-title":"Finite Fields and Their Applications"},{"key":"10.3233\/JIFS-236998_ref34","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1007\/s41870-020-00465-1","article-title":"A novel method of improvement in advanced encryption standard algorithm with dynamic shift rows, sub byte and mixcolumn operations for the secure communication,","volume":"12","author":"Manoj Kumar","year":"2020","journal-title":"International Journal of Information Technology"},{"key":"10.3233\/JIFS-236998_ref37","doi-asserted-by":"crossref","first-page":"18117","DOI":"10.1007\/s11042-017-4562-8","article-title":"A white-box AES-like implementation based on key-dependent substitution-linear transformations","volume":"77","author":"Xu","year":"2018","journal-title":"Multimedia Tools and Applications"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-236998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:43:07Z","timestamp":1777455787000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-236998"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,18]]},"references-count":25,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/jifs-236998","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,18]]}}}