Results 31 to 40 of about 1,465,890 (271)

A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application

open access: yesIEEE Access, 2022
In the modern block cipher, the substitution box (S-box) is a nonlinear constituent that plays a substantial role to create the confusion in ciphertext. S-boxes with low value of differential uniformity and high value of nonlinearity are considered more ...
Abid Mahboob   +6 more
doaj   +1 more source

S-Box Using AES Technique

open access: yesSSRN Electronic Journal, 2014
To design a substitution box (S-BOX) using both encryption and decryption. From that, the proposed system can achieve a higher throughput and higher energy efficiency. The S-BOX is designed by using Advanced Encryption Standard (AES). The AES is a symmetric key standard for encryption and decryption of blocks of data.
Christo Ananth, H. Anusuya Baby
openaire   +1 more source

A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes

open access: yesCryptography, 2019
The role of substitution boxes is very important in block ciphers. Substitution boxes are utilized to create confusion in the cryptosystem. However, to create both confusion and diffusion in any cryptosystem p-boxes and chaos base substitution boxes are ...
Yasir Naseer   +3 more
doaj   +1 more source

A Matrix PRNG with S-Box Output Filtering [PDF]

open access: yes, 2014
We describe a modification to a previously published pseudorandom number generator improving security while maintaining high performance. The proposed generator is based on the powers of a word-packed block upper triangular matrix and it is designed to ...
Alvarez, Rafael, Zamora, Antonio
core   +3 more sources

A New Chaotic S-Box Generation Method Using Parameter Optimization of One Dimensional Chaotic Maps

open access: yesIEEE Access, 2019
Chaotic systems have been used to generate the substitutional box structures. The existence of endless possibilities for the selection of the initial conditions and control parameters of the chaotic system has made it a necessity to use the optimization ...
Erkan Tanyildizi, Fatih Ozkaynak
doaj   +1 more source

NONLINEAR NYBERG CONSTRUCTION TRANSFORMS OVER ISOMORPHIC REPRESENTATIONS OF FIELDS GALOIS

open access: yesСистемный анализ и прикладная информатика, 2017
Further development of cryptographic algorithms based on the principles of many-valued logic requires more accurate research of non-binary cryptographic primitives – S-boxes.
A. V. Sokolov, O. N. Zhdanov
doaj   +1 more source

Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]

open access: yes, 2018
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov   +21 more
core   +2 more sources

Side-Channel Analysis of Chaos-Based Substitution Box Structures

open access: yesIEEE Access, 2019
There is a theoretically strong relationship between chaos and cryptology. In practice, one of the most successful applications of this relationship is chaos-based s-box structures.
Mehmet Sahin Acikkapi   +2 more
doaj   +1 more source

An Improved AES Cryptosystem Based Genetic Method on S-Box, With, 256 Key Sizes and 14-Rounds [PDF]

open access: yes, 2017
Cryptography methods are widely use in digital communication for secure data transaction. Cryptography methods have two categories symmetric and asymmetric. Both types of encrypting have their own importance and limitations.
Lilhore, U. K. (Umesh)   +1 more
core   +1 more source

A new cryptosystem based on an enhanced Vigenere cipher incorporating large SBoxes [PDF]

open access: yesE3S Web of Conferences
The present paper explains the development of an innovative cryptographic system designed to encrypt color images at the pixel level. This technique relies on a significant enhancement of the conventional Vigenere method, incorporating the implementation
Chemlal Abdelhakim   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy