Results 21 to 30 of about 1,465,890 (271)
The influence of S-boxes on the arrival of the cipher to the state of random substitution
The subject of this study is the process of developing block symmetric ciphers with improved cryptographic stability indicators for solving the problems of information protection in information and communication systems.
Iryna Lysytska +3 more
doaj +1 more source
Design of Dynamic S-box Based on Anti-degradation Chaotic System and Elementary Cellular Automata [PDF]
S-box is the basic non-linear module of most block cipher algorithms,which can meet the obfuscation and proliferation requirements of block cipher algorithms.In order to improve the safety of chaotic S-boxes,this paper uses an anti-degenerative chaotic ...
ZHAO Geng, GAO Shirui, MA Yingjie, DONG Youheng
doaj +1 more source
In this article, the authors present an efficient S-box generator respecting all criteria and more. Coppersmith’s design criteria served as a basis, but were strengthened for better resistance to linear cryptanalysis. While other researchers have already proposed S-box generators for DES satisfying either non-linearity or good diffusion, our generator ...
De Meyer, Lauren, Vaudenay, Serge
openaire +2 more sources
Efficient and Secure Chaotic S-Box for Wireless Sensor Network [PDF]
International audienceInformation security using chaotic dynamics is a novel topic in the wireless sensor network (WSN) research field. After surveying analog and digital chaotic security systems, we give a state of the art of chaotic S-Box design.
Alvarez +23 more
core +4 more sources
A block encryption algorithm based on exponentiation transform
This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box obtaining.
Nursulu Kapalova +3 more
doaj +1 more source
The purpose of this article is to construct an internal function underlying the “Sponge” scheme for constructing cryptographic hash functions. An internal function in the “Sponge” scheme is a fixed-length transformation or permutation that
R. M. Ospanov +3 more
doaj +1 more source
S-box, SET, Match: A Toolbox for S-box Analysis [PDF]
Boolean functions and substitution boxes (S-boxes) represent the only nonlinear part in many algorithms and therefore play the crucial role in their security. Despite the fact that some algorithms today reuse theoretically secure and carefully constructed S-boxes, there is a clear need for a tool that can analyze security properties of S-boxes and ...
Picek, S. +4 more
openaire +5 more sources
Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads
We propose an image encryption scheme based on quasi-resonant Rossby/drift wave triads (related to elliptic surfaces) and Mordell elliptic curves (MECs).
Bustamante, Miguel D. +2 more
core +1 more source
An algorithm for constructing S-boxes for block symmetric encryption
This article presents an algorithm for the generation of S-boxes with the maximum algebraic immunity and high nonlinearity. The algorithm is founded method of the permutation of output element of S-box. On basis of the proposed method, $S(8\times 8)$-box
Alijon Bozorbayevicha Sattarov +1 more
doaj +1 more source
A Review of Block Cipher’s S-Boxes Tests Criteria [PDF]
The Symmetric Block cipher is a considerable encryption algorithm because of its straightforwardness, rapidity and strength and this cryptographic algorithm is employed in carrying out the encryption and decryption for most current security applications.
Auday H. Saeed AL-Wattar
doaj +1 more source

