Results 21 to 30 of about 1,465,890 (271)

The influence of S-boxes on the arrival of the cipher to the state of random substitution

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The subject of this study is the process of developing block symmetric ciphers with improved cryptographic stability indicators for solving the problems of information protection in information and communication systems.
Iryna Lysytska   +3 more
doaj   +1 more source

Design of Dynamic S-box Based on Anti-degradation Chaotic System and Elementary Cellular Automata [PDF]

open access: yesJisuanji kexue, 2023
S-box is the basic non-linear module of most block cipher algorithms,which can meet the obfuscation and proliferation requirements of block cipher algorithms.In order to improve the safety of chaotic S-boxes,this paper uses an anti-degenerative chaotic ...
ZHAO Geng, GAO Shirui, MA Yingjie, DONG Youheng
doaj   +1 more source

DES S-box generator [PDF]

open access: yesCryptologia, 2016
In this article, the authors present an efficient S-box generator respecting all criteria and more. Coppersmith’s design criteria served as a basis, but were strengthened for better resistance to linear cryptanalysis. While other researchers have already proposed S-box generators for DES satisfying either non-linearity or good diffusion, our generator ...
De Meyer, Lauren, Vaudenay, Serge
openaire   +2 more sources

Efficient and Secure Chaotic S-Box for Wireless Sensor Network [PDF]

open access: yes, 2014
International audienceInformation security using chaotic dynamics is a novel topic in the wireless sensor network (WSN) research field. After surveying analog and digital chaotic security systems, we give a state of the art of chaotic S-Box design.
Alvarez   +23 more
core   +4 more sources

A block encryption algorithm based on exponentiation transform

open access: yesCogent Engineering, 2020
This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box obtaining.
Nursulu Kapalova   +3 more
doaj   +1 more source

Example of internal function for Sponge scheme built on the basis of the generalized AES design methodology

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2021
The purpose of this article is to construct an internal function underlying the “Sponge” scheme for constructing  cryptographic  hash  functions.  An  internal  function in  the  “Sponge”  scheme  is  a  fixed-length transformation  or  permutation  that 
R. M. Ospanov   +3 more
doaj   +1 more source

S-box, SET, Match: A Toolbox for S-box Analysis [PDF]

open access: yes, 2014
Boolean functions and substitution boxes (S-boxes) represent the only nonlinear part in many algorithms and therefore play the crucial role in their security. Despite the fact that some algorithms today reuse theoretically secure and carefully constructed S-boxes, there is a clear need for a tool that can analyze security properties of S-boxes and ...
Picek, S.   +4 more
openaire   +5 more sources

Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads

open access: yes, 2020
We propose an image encryption scheme based on quasi-resonant Rossby/drift wave triads (related to elliptic surfaces) and Mordell elliptic curves (MECs).
Bustamante, Miguel D.   +2 more
core   +1 more source

An algorithm for constructing S-boxes for block symmetric encryption

open access: yesUniversal Journal of Mathematics and Applications, 2018
This article presents an algorithm for the generation of S-boxes with the maximum algebraic immunity and high nonlinearity. The algorithm is founded method of the permutation of output element of S-box. On basis of the proposed method, $S(8\times 8)$-box
Alijon Bozorbayevicha Sattarov   +1 more
doaj   +1 more source

A Review of Block Cipher’s S-Boxes Tests Criteria [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2019
The Symmetric Block cipher is a considerable encryption algorithm because of its straightforwardness, rapidity and strength and this cryptographic algorithm is employed in carrying out the encryption and decryption for most current security applications.
Auday H. Saeed AL-Wattar
doaj   +1 more source

Home - About - Disclaimer - Privacy