Results 11 to 20 of about 480,128 (291)

A Review of Block Cipher’s S-Boxes Tests Criteria [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2019
The Symmetric Block cipher is a considerable encryption algorithm because of its straightforwardness, rapidity and strength and this cryptographic algorithm is employed in carrying out the encryption and decryption for most current security applications.
Auday H. Saeed AL-Wattar
doaj   +1 more source

Stochastic Fractal Search Algorithm Improved with Opposition-Based Learning for Solving the Substitution Box Design Problem

open access: yesMathematics, 2022
The main component of a cryptographic system that allows us to ensure its strength against attacks, is the substitution box. The strength of this component can be validated by various metrics, one of them being the nonlinearity.
Francisco Gonzalez   +2 more
doaj   +1 more source

Human Behaviour Based Optimization Supported With Self-Organizing Maps for Solving the S-Box Design Problem

open access: yesIEEE Access, 2021
The cryptanalytic resistance of modern block and stream encryption systems mainly depends on the substitution box (S-box). In this context, the problem is thus to create an S-box with higher value of nonlinearity because this property can provide some ...
Ricardo Soto   +3 more
doaj   +1 more source

A strong construction of S-box using Mandelbrot set an image encryption scheme [PDF]

open access: yesPeerJ Computer Science, 2022
The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box.
Mazzamal Aslam   +6 more
doaj   +2 more sources

Mom-and-Pop Meet Big Box: Complements or Substitutes? [PDF]

open access: yesSSRN Electronic Journal, 2009
Abstract In part due to the popular perception that Big-Boxes displace smaller, often family owned (a.k.a. Mom-and-Pop) retail establishments, several empirical studies have examined the evidence on how Big-Boxes’ impact local retail employment but no clear consensus has emerged.
John Haltiwanger   +2 more
openaire   +2 more sources

Image Watermarking Scheme Using LSB and Image Gradient

open access: yesApplied Sciences, 2022
In the modern age, watermarking techniques are mandatory to secure digital communication over the internet. For an optimal technique, a high signal-to-noise ratio and normalized correctional is required. In this paper, a digital watermarking technique is
Zaid Bin Faheem   +6 more
doaj   +1 more source

A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher

open access: yesIEEE Access, 2020
In the symmetric key cryptography, the purpose of the substitution box is to generate confusion and hence improve the security of the whole cryptosystem.
Sadam Hussain   +3 more
doaj   +1 more source

Image Watermarking Using Least Significant Bit and Canny Edge Detection

open access: yesSensors, 2023
With the advancement in information technology, digital data stealing and duplication have become easier. Over a trillion bytes of data are generated and shared on social media through the internet in a single day, and the authenticity of digital data is
Zaid Bin Faheem   +6 more
doaj   +1 more source

Pitfalls in Designing Substitution Boxes [PDF]

open access: yes, 2007
Two significant recent advances in cryptanalysis, namely the differential attack put forward by Biham and Shamir [3] and the linear attack by Matsui [7, 8], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the
Seberry, Jennifer   +2 more
openaire   +1 more source

Improved Twofish Algorithm: A Digital Image Enciphering Application

open access: yesIEEE Access, 2021
With the growth of networks, the Internet of Things (IoT) and new cyber attacks pose threats to privacy and security, secure communication is therefore becoming one of the most crucial concerns.
Tanveer ul Haq   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy