Results 11 to 20 of about 482,791 (290)

A Novel Cryptographic Substitution Box Design Using Gaussian Distribution

open access: yesIEEE Access, 2019
In this paper, a novel method is being proposed to construct a substitution box or Boolean function for block ciphers using Gaussian distribution and linear fractional transform.
Muhammad Fahad Khan   +2 more
doaj   +3 more sources

An efficient construction of key-dependent substitution box based on chaotic sine map

open access: yesInternational Journal of Distributed Sensor Networks, 2019
A substitution box is a core component of the popular symmetric-key algorithms. However, the major problem of the conventional substitution boxes is the statistic behavior, which is employed as a fixed-size lookup table.
Muhammad Usama   +3 more
doaj   +2 more sources

A Review of Block Cipher’s S-Boxes Tests Criteria [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2019
The Symmetric Block cipher is a considerable encryption algorithm because of its straightforwardness, rapidity and strength and this cryptographic algorithm is employed in carrying out the encryption and decryption for most current security applications.
Auday H. Saeed AL-Wattar
doaj   +1 more source

Stochastic Fractal Search Algorithm Improved with Opposition-Based Learning for Solving the Substitution Box Design Problem

open access: yesMathematics, 2022
The main component of a cryptographic system that allows us to ensure its strength against attacks, is the substitution box. The strength of this component can be validated by various metrics, one of them being the nonlinearity.
Francisco Gonzalez   +2 more
doaj   +1 more source

Mom-and-Pop Meet Big Box: Complements or Substitutes? [PDF]

open access: yesSSRN Electronic Journal, 2009
Abstract In part due to the popular perception that Big-Boxes displace smaller, often family owned (a.k.a. Mom-and-Pop) retail establishments, several empirical studies have examined the evidence on how Big-Boxes’ impact local retail employment but no clear consensus has emerged.
John Haltiwanger   +2 more
openaire   +2 more sources

Human Behaviour Based Optimization Supported With Self-Organizing Maps for Solving the S-Box Design Problem

open access: yesIEEE Access, 2021
The cryptanalytic resistance of modern block and stream encryption systems mainly depends on the substitution box (S-box). In this context, the problem is thus to create an S-box with higher value of nonlinearity because this property can provide some ...
Ricardo Soto   +3 more
doaj   +1 more source

A strong construction of S-box using Mandelbrot set an image encryption scheme [PDF]

open access: yesPeerJ Computer Science, 2022
The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box.
Mazzamal Aslam   +6 more
doaj   +2 more sources

Image Watermarking Scheme Using LSB and Image Gradient

open access: yesApplied Sciences, 2022
In the modern age, watermarking techniques are mandatory to secure digital communication over the internet. For an optimal technique, a high signal-to-noise ratio and normalized correctional is required. In this paper, a digital watermarking technique is
Zaid Bin Faheem   +6 more
doaj   +1 more source

Pitfalls in Designing Substitution Boxes [PDF]

open access: yes, 2007
Two significant recent advances in cryptanalysis, namely the differential attack put forward by Biham and Shamir [3] and the linear attack by Matsui [7, 8], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the
Seberry, Jennifer   +2 more
openaire   +1 more source

A Power Associative Loop Structure for the Construction of Non-Linear Components of Block Cipher

open access: yesIEEE Access, 2020
In the symmetric key cryptography, the purpose of the substitution box is to generate confusion and hence improve the security of the whole cryptosystem.
Sadam Hussain   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy