Results 1 to 10 of about 480,128 (291)

A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map [PDF]

open access: yesPeerJ Computer Science, 2022
Cryptography deals with designing practical mathematical algorithms having the two primitive elements of confusion and diffusion. The security of encrypted data is highly dependent on these two primitive elements and a key.
Asim Ali   +3 more
doaj   +5 more sources

Highly dispersive substitution box (S‐box) design using chaos [PDF]

open access: yesETRI Journal, 2020
Highly dispersive S‐boxes are desirable in cryptosystems as nonlinear confusion sub‐layers for resisting modern attacks. For a near optimal cryptosystem resistant to modern cryptanalysis, a highly nonlinear and low differential probability (DP) value is ...
Zaid Bin Faheem   +4 more
doaj   +2 more sources

Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging [PDF]

open access: yesScientific Reports, 2021
Block cipher has been a standout amongst the most reliable option by which data security is accomplished. Block cipher strength against various attacks relies on substitution boxes.
Muhammad Fahad Khan   +3 more
doaj   +2 more sources

Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads

open access: yesEntropy, 2020
We propose an image encryption scheme based on quasi-resonant Rossby/drift wave triads (related to elliptic surfaces) and Mordell elliptic curves (MECs).
Ikram Ullah   +2 more
doaj   +3 more sources

Side-Channel Analysis of Chaos-Based Substitution Box Structures [PDF]

open access: yesIEEE Access, 2019
There is a theoretically strong relationship between chaos and cryptology. In practice, one of the most successful applications of this relationship is chaos-based s-box structures.
Mehmet Sahin Acikkapi   +2 more
doaj   +2 more sources

A design of multiple color image encryption scheme based on finite algebraic structures [PDF]

open access: yesScientific Reports
This article introduces an innovative method for constructing substitution and permutation boxes and their application in image encryption. In encryption, the essential component that creates confusion is the substitution box(S-box).
Tanveer Qayyum   +3 more
doaj   +2 more sources

CONSTRUCTION OF SUBSTITUTION BOX (S-BOX) BASED ON IRREDUCIBLE POLYNOMIALS ON GF(2^8)

open access: yesBarekeng
In the field of modern encryption algorithms, the creation of S-Box is an essential element that plays an important role in maintaining data security in various industries.
Faldy Tita   +2 more
doaj   +2 more sources

A secure key dependent dynamic substitution method for symmetric cryptosystems [PDF]

open access: yesPeerJ Computer Science, 2021
The biggest challenge for symmetric cryptosystems is to replace their static substitution with dynamic substitution, because static substitution S-boxes make the symmetric block ciphers more vulnerable to attacks.
Aisha Ejaz   +4 more
doaj   +2 more sources

A method for generation of substitution box based on random selection

open access: yesEgyptian Informatics Journal, 2022
Two basic requirements must be met to encrypt data. These requirements are confusion and diffusion properties. In particular, block cipher algorithms are based on a cryptographic component known as substitution-box to provide the need for confusion ...
Fırat Artuğer, Fatih Özkaynak
doaj   +1 more source

Pareto-optimal hardware for substitution boxes [PDF]

open access: yesInternational Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, 2005
En este trabajo, proponemos una metodología basada en la programación genética para generar automáticamente diseños de hardware de cajas de sustitución necesarias para muchos criptosistemas como el sistema de cifrado DES. Nuestro objetivo es desarrollar especificaciones de hardware mínimas, que minimicen tanto el espacio (es decir, el número de puerta ...
Nadia Nedjah, Luiza de Macedo Mourelle
openaire   +2 more sources

Home - About - Disclaimer - Privacy