A novel method of S-box design based on discrete chaotic map

D Lambić - Nonlinear dynamics, 2017 - Springer
A new method for obtaining random bijective S-boxes based on discrete chaotic map is
presented. The proposed method uses a discrete chaotic map based on the composition of …

Construction of an S-box based on chaotic and bent functions

Z Jiang, Q Ding - Symmetry, 2021 - mdpi.com
An S-box is the most important part of a symmetric encryption algorithm. Various schemes
are put forward by using chaos theory. In this paper, a construction method of S-boxes with …

Construction of non-linear component of block cipher by means of chaotic dynamical system and symmetric group

A Javeed, T Shah, A Ullah - Wireless Personal Communications, 2020 - Springer
The interesting features of chaos theory are utilized now a day's in information security. The
simplest chaotic dynamical system is the double pendulum. Here in this article, two double …

Automated chaos-driven S-box generation and analysis tool for enhanced cryptographic resilience

Y Aydın, F Özkaynak - IEEE Access, 2023 - ieeexplore.ieee.org
In a rapidly advancing world of technology, information security studies have become the
backbone of the digital age, and steps in this area are critical. In this context, cryptography …

Generation of AES key dependent S-boxes using RC4 algorithm

I Abd-ElGhafar, A Rohiem, A Diaa… - … Sciences and Aviation …, 2009 - asat.journals.ekb.eg
The increase use of computer and communication system by industry and organizations has
increased the risk of theft of proprietary information. Although these threats require a variety …

Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes

MA Yousaf, H Alolaiyan, M Ahmad, M Dilbar… - IEEE …, 2020 - ieeexplore.ieee.org
This paper proposes to present a novel group theoretic approach of improvising the
cryptographic features of substitution-boxes. The approach employs a proposed finite …

[PDF][PDF] Some analysis of S-box based on residue of prime number

I Hussain, T Shah, H Mahmood, MA Gondal… - Proc Pak Acad Sci, 2011 - paspk.org
In this article, we will analyze substitution box (S-box) based on residue of prime number for
different analysis such as graphical and analytical strict avalanche criterion (SAC), bit …

Multi-objective evolution of strong S-boxes using non-dominated sorting genetic algorithm-II and chaos for secure telemedicine

M Ahmad, R Alkanhel, W El-Shafai, AD Algarni… - IEEE …, 2022 - ieeexplore.ieee.org
There exist several performance criteria for cryptographically-strong substitution boxes (S-
boxes), which are often conflicting with each other. Constructing S-boxes that satisfy multiple …

A group theoretic approach to construct cryptographically strong substitution boxes

I Hussain, T Shah, MA Gondal, WA Khan… - Neural Computing and …, 2013 - Springer
In this paper, we present a method to construct a substitution box used in encryption
applications. The proposed algorithm for the construction of substitution box relies on the …

Designing secure substitution boxes based on permutation of symmetric group

A Anees, YPP Chen - Neural Computing and Applications, 2020 - Springer
The strength of cryptosystems heavily relies on the substitution boxes. Cryptosystems with
weak substitution boxes cannot resist algebraic attacks, linear and differential cryptanalysis …