Results 1 to 10 of about 1,465,890 (271)

A strong construction of S-box using Mandelbrot set an image encryption scheme [PDF]

open access: yesPeerJ Computer Science, 2022
The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box.
Mazzamal Aslam   +6 more
doaj   +3 more sources

Highly dispersive substitution box (S‐box) design using chaos

open access: yesETRI Journal, 2020
Highly dispersive S‐boxes are desirable in cryptosystems as nonlinear confusion sub‐layers for resisting modern attacks. For a near optimal cryptosystem resistant to modern cryptanalysis, a highly nonlinear and low differential probability (DP) value is ...
Zaid Bin Faheem   +4 more
doaj   +2 more sources

A Novel S-Box Design Algorithm Based on a New Compound Chaotic System [PDF]

open access: yesEntropy, 2019
Substitution-boxes (S-Boxes) are important non-linear components in block cryptosystem, which play an important role in the security of cryptosystems. Constructing S-Boxes with a strong cryptographic feature is an important step in designing block cipher
Qing Lu, Congxu Zhu, Guojun Wang
doaj   +2 more sources

A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map [PDF]

open access: yesPeerJ Computer Science, 2022
Cryptography deals with designing practical mathematical algorithms having the two primitive elements of confusion and diffusion. The security of encrypted data is highly dependent on these two primitive elements and a key.
Asim Ali   +3 more
doaj   +3 more sources

Unveiling a novel S-Box strategy: The dynamic 3D scrambling approach. [PDF]

open access: yesPLoS ONE
A close study about the varied anatomies of the S-Box algorithms published in the literature indicates that no attempt has been made using the notion of 3D.
Nayeem Ahmad Khan   +7 more
doaj   +2 more sources

New S-Box Design for Image Encryption Based on Multi-Chaotic System [PDF]

open access: yesEngineering and Technology Journal, 2023
Image encryption is a crucial area for researchers in information security, which protects digital images from unauthorized access. This paper proposes a novel image encryption scheme based on the multi-chaotic system.
Azhaar Abdallah, Alaa Farhan
doaj   +1 more source

A New S-Box Design by Applying Bat Algorithm Based Technique [PDF]

open access: yesJournal of Information Technology Management, 2023
Substitution-boxes (S-boxes) are very important nonlinear components used for achieving strong confusion for enhancing cryptographic security in most of the block ciphers.
Maiya Din   +3 more
doaj   +1 more source

Development and Analysis of Symmetric Encryption Algorithm Qamal Based on a Substitution-permutation Network [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
This paper represents a developed cryptographic information protection algorithm based on a substitutionpermutation network. We describe the cryptographic transformations used in the developed algorithm.
Rustem G. Biyashev   +5 more
doaj   +1 more source

A scheme of the reconfigurable S-box based on Hierarchy LUT

open access: yesDianzi Jishu Yingyong, 2023
The S-box based on LUT is widely used in the reconfigurable block cipher. It is not efficient in area for the expended resources. In this paper, the Hierarchy LUT architecture based on 4R/1W memory unit is proposed to compose the reconfigurable S-box ...
Fang Zhen, Zhao Wei, Liu Yong
doaj   +1 more source

A Method to Determine the Most Suitable Initial Conditions of Chaotic Map in Statistical Randomness Applications

open access: yesIEEE Access, 2021
The processes and systems in the real world actually contain order and symmetry. Understanding these order and symmetrical behavior has been a common effort of scientists.
Mehmet Sahin Acikkapi, Fatih Ozkaynak
doaj   +1 more source

Home - About - Disclaimer - Privacy