Desain S-Box Fleksibel: Regenerasi Konstanta dan Koefisien Fungsi Linier Berbasis CSPRNG Chaos

Bambang Susanto, Alz Danny Wowor, Vania Beatrice Liwandouw


The substitution process in block ciphers usually uses static s-boxes, where the value of each s-box entry is always fixed and the functions are one-to-one. Visually, the dataset pattern in the input is also seen in the output. This will make it easier for cryptanalysts to look at patterns and can predict behavior based on the input. This study designs a flexible s-box where each entry contains a linear function, with constants and coefficients generated by CSPRNG chaos from the key input. The strength of a flexible s-box can be seen when changing key inputs (although 1 bit different) will produce different s-boxes. In addition, the same input dataset values will produce different outputs, so flexible s-boxes are one-to-many. Statistical tests show that the average correlation is in a low category. Tests on the cipher block also fulfill the Shannon Principle. The principle of Iterated Cipher with n-round is filled with n > 5 and 46n random numbers. The Avalanche Effect test on the algorithm gives better results than Twofish even though it is still below the DES.


S-box fleksibel; blok cipher; CSPRNG chaos; fungsi linier

Full Text:



J. Cui, L. Huang, H. Zhong, C. Chang, dan W. Yang, “An Improved AES S-Box and Its Performance Analysis,” International Journal of Innovative Computing, Information and Control, Vol.7, No. 5(A), hal. 2291-2302, 2011.

K. Prasadh, K. Ramar, dan R. Gnanajeyaraman, “Public Key Cryptosystems Based on Chaotic Chebyshev Polynomials,” Journal of Engineering and Technology Research, Vol. 1, No. 7, hal. 122-128, 2009.

A. Ramadhanus adn F. Firdaus, “Blackfish: Block Cipher dengan Key-Dependent S-Box dan P-Box,” Program Studi Teknik Informatika, STEI ITB, Laporan Akhir, Bandung, 2013.

P. Irfan dan Y. Prayudi, “Penggabungan Algoritma Chaos dan Rivers Shamir Adleman (RSA) untuk Peningkatan Keamanan Citra,” Seminar Nasional Aplikasi Teknologi Informasi, 2015, hal. D5– D10.

V.B. Liwandouw dan A.D. Wowor, “Kombinasi Algoritma Rubik, CSPRNG Chaos dan S-Box Fungsi Linier dalam Perancangan Kriptografi Block Cipher,” Seminar Nasional Sistem Informasi Indonesia, 2015, hal. 207–214.

E.Y..I. Kurniawan, “Penerapan Teori Chaos pada Kriptografi Menggunakan Algoritma Stream Cipher dan Electronic Code Book (ECB) untuk Keamanan Pesan Teks,” Skripsi, Universitas Dian Nuswantoro, Semarang, Indonesia, 2014.

R. Munir, Kriptografi. Bandung, Indonesia: Informatika, 2006.

V.B. Liwandouw dan A.D. Wowor, “Desain Algoritma Berbasis Kubus Rubik dalam Perancangan Kriptografi Simetris,” Seminar Teknik Informatika & Sistem Informasi, 2015, hal. 42–47.

R. Sadikin, Kriptografi untuk Keamanan Jaringan, Yogyakarta Indonesia: Penerbit Andi, 2012.

D.C. Montgomerry dan G.C. Runger, Aplied Statistics ad Probabality for Engineers, New Jersey, USA: John Wiley & Sons, 2014.

S. Ramanujam dan M. Karuppiah, “Designing an Algorithm with High Avalanche Effect,” International Journal of Computer Science and Network Security, Vol. 11, No. 1, hal. 106-111, Jan. 2011.



  • There are currently no refbacks.

Copyright (c) 2019 Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI)

JNTETI (Jurnal Nasional Teknik Elektro dan Teknologi Informasi)

Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik Universitas Gadjah Mada
Jl. Grafika No 2. Kampus UGM Yogyakarta 55281
+62 274 552305