[PDF][PDF] Elevating Network Security: A Novel S-Box Algorithm for Robust Data Encryption

MA JARALLAH ALQAHTANI, GA ALI, N IQBAL… - 2023 - researchgate.net
In an era characterized by ever-increasing data exchange across different networks, the
importance of robust network security measures cannot be overemphasized. Cryptographic …

Elevating Network Security: A Novel S-Box Algorithm for Robust Data Encryption

J Alqahtani, M Akram, GA Ali, N Iqbal, A Alqahtani… - IEEE …, 2023 - ieeexplore.ieee.org
In an era characterized by ever-increasing data exchange across different networks, the
importance of robust network security measures cannot be overemphasized. Cryptographic …

Automated Chaos-Driven S-Box Generation and Analysis Tool for Enhanced Cryptographic Resilience

Y Aydın, F Özkaynak - IEEE Access, 2023 - ieeexplore.ieee.org
In a rapidly advancing world of technology, information security studies have become the
backbone of the digital age, and steps in this area are critical. In this context, cryptography …

[HTML][HTML] Chaos Meets Cryptography: Developing an S-Box Design with the Rössler Attractor

E Corona-Bermúdez, JC Chimal-Eguía… - Mathematics, 2023 - mdpi.com
The volume of data transmitted over networks has significantly increased in recent years. For
that reason, safeguarding the privacy, authenticity, and confidentiality of specific data is …

Innovative Transformation of S-Box Through Chaotic Map Using a Pragmatic Approach

AS Qazi, AH Zahid, A Baz, F Arslan, M Ali, J Ali - IEEE Access, 2024 - ieeexplore.ieee.org
In present-day data communication, the imperative to safeguard information and shield it
from a multitude of potential threats and attacks has gained significant prominence. One of …

[PDF][PDF] Ensemble of blowfish with chaos based s box design for text and image encryption

J Chandrasekaran, B Subramanyan… - International Journal of …, 2011 - academia.edu
The rapid and extensive usage of Internet in the present decade has put forth information
security as an utmost concern. Most of the commercial transactions taking place over the …

[PDF][PDF] Logistic and Circle Maps for Robust S-Box Construction in Cryptography

Y Aydin, F Ozkaynak - 2023 - researchgate.net
Cryptology, a pivotal discipline in ensuring information security and communication
confidentiality, relies on symmetric cryptology, where the same key is employed for both …

Dynamic S-BOX using Chaotic Map for VPN Data Security

K Ishaq, KA Hassan, YT Bhatti - arXiv preprint arXiv:2310.05940, 2023 - arxiv.org
A dynamic SBox using a chaotic map is a cryptography technique that changes the SBox
during encryption based on iterations of a chaotic map, adding an extra layer of confusion …

[PDF][PDF] Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking.

AH Zahid, MJ Arshad, M Ahmad… - … , Materials & Continua, 2023 - researchgate.net
A substitution box (S-Box) is a crucial component of contemporary cryptosystems that
provide data protection in block ciphers. At the moment, chaotic maps are being created and …

Generating Multi-Dimensional Chaotic Sequences and Application in True Random S-Boxes Design

J Hu - 2024 4th International Conference on Neural Networks …, 2024 - ieeexplore.ieee.org
This paper introduces an innovative approach for generating true random multi-dimensional
chaotic sequences employing physical unclonable functions (PUFs) and applies them to …