Results 241 to 250 of about 480,128 (291)
Some of the next articles are maybe not open access.

Alternative substitutional box structures for DES

2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018
The DES algorithm is an important encryption protocol that has influenced many cryptology studies. It is still used today in many practical applications such as electronic passport. But it is an important problem that the design parameters of substitution boxes of this algorithm are unknown.
Fatih Ozkaynak, Mukhlis I. Muhamad
openaire   +1 more source

Designing substitution boxes for secure ciphers

International Journal of Innovative Computing and Applications, 2007
In cryptography, a Substitution box (S-box) constitutes a cornerstone component of symmetric key algorithms. In block ciphers, they are typically used to obscure the relationship between the plaintext and the ciphertext. It is well-known that the more linear and the less auto-correlated the S-box is, the more resilient the cryptosystem that uses them ...
Nadia Nedjah, Luiza de Macedo Mourelle
openaire   +1 more source

Designing chaos based strong substitution box

2015 Eighth International Conference on Contemporary Computing (IC3), 2015
Substitution boxes are the indispensable part of block ciphering techniques such as AES, DES, IDEA, etc. It is important to design effective S-boxes in an efficient way. In this paper, a method to generate effective S-boxes is proposed. A new technique is suggested to produce the input S-boxes candidates.
Musheer Ahmad   +4 more
openaire   +1 more source

DYNAMIC SUBSTITUTION BOXES OF SYMMETRIC BLOCK ENCRYPTION ALGORITHMS

Bulletin Series of Physics & Mathematical Sciences, 2021
The paper deals with nonlinear transformations of well-known symmetric block algorithms such as AES, Kuznyechik, SM4, BelT, and Kalyna. A brief description of the substitution boxes for these algorithms is given. The properties of nonlinearity of the described substitution boxes are investigated with the calculation of the corresponding values.
N.A. Kapalova, A. Haumen
openaire   +1 more source

ABC Optimization Based Construction of Strong Substitution-Boxes

Wireless Personal Communications, 2018
Most of the block ciphers contain substitution-boxes as their cornerstone primitive to add requisite nonlinearity. S-boxes are responsible to ensure strong confusion and resistance to linear and differential assaults. The security of such ciphers relies on the strength of S-boxes deployed during substitution stage.
Musheer Ahmad   +2 more
openaire   +1 more source

Implementation White Box Cryptography in Substitution-Permutation network

2020 9th Mediterranean Conference on Embedded Computing (MECO), 2020
Advances in technology have led not only to increased security and privacy but also to new channels of information leakage. New leak channels have resulted in the emergence of increased relevance of various types of attacks. One such attacks are Side-Channel Attacks, i.e. attacks aimed to find vulnerabilities in the practical component of the algorithm.
Alla Levina, Ivan Kamnev, Igor Zikratov
openaire   +1 more source

Hardware Software Codesign for a Hybrid Substitution Box

2017 30th International Conference on VLSI Design and 2017 16th International Conference on Embedded Systems (VLSID), 2017
S-Box (Substitution-Box) is an important part of cryptographic algorithms such as AES, DES, Blowfish etc. This paper focuses on an efficient FPGA-based, reconfigurable AES S-Box design. This is the first S-Box architecture which uses hybrid search method (Z-TCAM), which enables to use the same design for encryption and decryption.
K. B. Anuroop, Anu James, M. Neema
openaire   +1 more source

True-chaotic substitution box based on Boolean functions

The European Physical Journal Plus, 2020
With the exponential increase in communication sector, the risk of information management also increases. Although there is enormous input from the cybersecurity perspective, still a lot must be done. The substitution box is the most vital component in symmetric encryption algorithms, and various proposals have been presented using chaos. Unfortunately,
openaire   +1 more source

Home - About - Disclaimer - Privacy