Chaos and cellular automata-based substitution box and its application in cryptography

A Shafique, KH Khan, MM Hazzazi, I Bahkali, Z Bassfar… - Mathematics, 2023 - mdpi.com
Substitution boxes are the key factor in symmetric-key cryptosystems that determines their
ability to resist various cryptanalytic attacks. Creating strong substitution boxes that have …

Fast Novel Efficient S‐Boxes with Expanded DNA Codes

AT Maolood, AK Farhan, WI El-Sobky… - Security and …, 2023 - Wiley Online Library
IoT is one of the most popular technologies in recent years due to the interconnection of
various infrastructures, physical devices, and software. To guarantee the security of Internet …

A strong hybrid S-Box scheme based on chaos, 2D cellular automata and algebraic structure

A Haque, TA Abdulhussein, M Ahmad, MW Falah… - IEEE …, 2022 - ieeexplore.ieee.org
Substitution-boxes are the main deciding components in symmetric-key cryptosystems for
resisting many cryptanalytic attacks. It has been a challenging task for the designers to …

A novel algorithm based on DNA coding for substitution box generation problem

F Artuğer - Neural Computing and Applications, 2024 - Springer
Substitution boxes are very important for cryptographic structures. But getting an 8-bit strong
s-box is a difficult problem. To address this problem, a new approach is proposed in this …

Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps with Induced DNA Sequences

SM SeragEldin, AAA El-Latif, SA Chelloug… - IEEE …, 2023 - ieeexplore.ieee.org
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main
aim of this paper is how to increase the security level of the blockchain based on the …

Keyless lightweight encipher using homomorphic and binomial coefficients for smart computing applications

SA Sultana, R Ch, RP Malleswari - 2023 2nd International …, 2023 - ieeexplore.ieee.org
Globally, advanced technologies play a vital role to offer services to the user. But the major
issue raised here is that the data utilization rate increasing day by day which causes attacks …

Multichannel image encryption using dynamic substitution and JSMP map

EP Elias, A Santhanavijayan - Optik, 2023 - Elsevier
The confidentiality of images is crucial in medical, military, satellite, and IoT fields.
Encipherment ensures confidentiality, relying on strong Substitution boxes (S-boxes) and …

[HTML][HTML] A Novel Eighth-Order Hyperchaotic System and Its Application in Image Encryption

H Qiu, X Zhang, H Yue, J Liu - Mathematics, 2023 - mdpi.com
With the advancement in information and communication technologies (ICTs), the
widespread dissemination and sharing of digital images has raised concerns regarding …

Famous Digital Signatures Used In Smart Contracts

H Saeed, MA Elsisi, TO Diab… - 2023 International …, 2023 - ieeexplore.ieee.org
This paper introduces the process of digital signatures and their importance in smart
contracts. There are a lot of digital signature algorithms. Some of these algorithms, such as …

Fuzzy Logic-Based Substitution-Box for Robust Medical Image Encryption in Telemedicine

A Razaq, LA Maghrabi, M Ahmad, F Aslam… - IEEE Access, 2024 - ieeexplore.ieee.org
Due to privacy and sensitivity of the medical images, the creation of strong medical image
encryption schemes has gained the attention of cryptographers. In this study, a robust …