Heuristic Approach for Nonlinear n × n (3 ≤ n ≤ 7) Substitution-Boxes

M Ahmad, M Alauddin, HD AlSharari - Data Engineering and Intelligent …, 2018 - Springer
Substitution boxes are meant to enact nonlinear transformations of n-bit input streams to n-
bit output streams. A highly nonlinear essence of them is imperative to induce obligatory …

A group theoretic construction of large number of AES-like substitution-boxes

A Razaq, M Ahmad, A Yousaf, M Alawida… - Wireless Personal …, 2022 - Springer
Modern block ciphers have been used to design security schemes to fulfil the security
requirements in different areas of applications. The substitution boxes, significant …

Grey wolf optimizer and discrete chaotic map for substitution boxes design and optimization

AI Lawah, AA Ibrahim, SQ Salih, HS Alhadawi… - IEEE …, 2023 - ieeexplore.ieee.org
A metaheuristic approach based on the nature-inspired and well-known Grey Wolf
Optimization algorithm (GWO) was employed in this study to design an approach for …

Chaotic S‐Box: Intertwining Logistic Map and Bacterial Foraging Optimization

Y Tian, Z Lu - Mathematical Problems in Engineering, 2017 - Wiley Online Library
As the unique nonlinear component of block ciphers, Substitution box (S‐box) directly affects
the safety of a cryptographic system. It is important and difficult to design strong S‐box that …

A novel image encryption based on rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes

LS Khan, MM Hazzazi, M Khan, SS Jamal - Chinese Journal of Physics, 2021 - Elsevier
Symmetric encryption is appraised as one of the key ways in which end-to-end data transfer
security is guaranteed. To inject confusion in the substitution phase of the modern block …

[HTML][HTML] A method for generation of substitution box based on random selection

F Artuğer, F Özkaynak - Egyptian Informatics Journal, 2022 - Elsevier
Two basic requirements must be met to encrypt data. These requirements are confusion and
diffusion properties. In particular, block cipher algorithms are based on a cryptographic …

A simple and efficient key-dependent S-box design using fisher-yates shuffle technique

M Ahmad, PM Khan, MZ Ansari - … SNDS 2014, Trivandrum, India, March 13 …, 2014 - Springer
The substitution boxes are the only components in most of symmetric encryption systems
that induce nonlinearity to provide efficacious data confusion. The cryptographic potency of …

[HTML][HTML] A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map

A Ali, MA Khan, RK Ayyasamy, M Wasif - PeerJ Computer Science, 2022 - peerj.com
Cryptography deals with designing practical mathematical algorithms having the two
primitive elements of confusion and diffusion. The security of encrypted data is highly …

RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms

W Zhang, Z Bao, D Lin, V Rijmen, B Yang… - Cryptology ePrint …, 2014 - eprint.iacr.org
In this paper, we propose a new lightweight block cipher named RECTANGLE. The main
idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit …

A novel finite rings based algebraic scheme of evolving secure S-boxes for images encryption

A Razaq, Iqra, M Ahmad, MA Yousaf… - Multimedia Tools and …, 2021 - Springer
Substitution-boxes have significant role in block ciphers as they are the only component
which offers nonlinearity in the anticipated symmetric encryption systems. This paper …