An S-box is the most important part of a symmetric encryption algorithm. Various schemes are put forward by using chaos theory. In this paper, a construction method of S-boxes with …
The interesting features of chaos theory are utilized now a day's in information security. The simplest chaotic dynamical system is the double pendulum. Here in this article, two double …
In a rapidly advancing world of technology, information security studies have become the backbone of the digital age, and steps in this area are critical. In this context, cryptography …
I Abd-ElGhafar, A Rohiem, A Diaa… - … Sciences and Aviation …, 2009 - asat.journals.ekb.eg
The increase use of computer and communication system by industry and organizations has increased the risk of theft of proprietary information. Although these threats require a variety …
MA Yousaf, H Alolaiyan, M Ahmad, M Dilbar… - IEEE …, 2020 - ieeexplore.ieee.org
This paper proposes to present a novel group theoretic approach of improvising the cryptographic features of substitution-boxes. The approach employs a proposed finite …
In this article, we will analyze substitution box (S-box) based on residue of prime number for different analysis such as graphical and analytical strict avalanche criterion (SAC), bit …
There exist several performance criteria for cryptographically-strong substitution boxes (S- boxes), which are often conflicting with each other. Constructing S-boxes that satisfy multiple …
In this paper, we present a method to construct a substitution box used in encryption applications. The proposed algorithm for the construction of substitution box relies on the …
A Anees, YPP Chen - Neural Computing and Applications, 2020 - Springer
The strength of cryptosystems heavily relies on the substitution boxes. Cryptosystems with weak substitution boxes cannot resist algebraic attacks, linear and differential cryptanalysis …