Local Shannon entropy measure with statistical tests for image randomness

Y Wu, Y Zhou, G Saveriades, S Agaian, JP Noonan… - Information …, 2013 - Elsevier
In this paper we propose a new image randomness measure using Shannon entropy over
local image blocks. The proposed local Shannon entropy measure overcomes several …

Exploiting diversity in android tls implementations for mobile app traffic classification

S Sengupta, N Ganguly, P De… - The World Wide Web …, 2019 - dl.acm.org
Network traffic classification is an important tool for network administrators in enabling
monitoring and service provisioning. Traditional techniques employed in classifying traffic do …

Shannon entropy based randomness measurement and test for image encryption

Y Wu, JP Noonan, SO Agaian - arXiv preprint arXiv:1103.5520, 2011 - arxiv.org
The quality of image encryption is commonly measured by the Shannon entropy over the
ciphertext image. However, this measurement does not consider to the randomness of local …

[HTML][HTML] Periodic template tests: A family of statistical randomness tests for a collection of binary sequences

F Sulak, A Doğanaksoy, M Uğuz, O Koçak - Discrete Applied Mathematics, 2019 - Elsevier
In this work, we classify all templates according to their periods and for each template we
evaluate the exact probabilities using generating functions. Afterwards, we propose a new …

New statistical randomness tests based on length of runs

A Doğanaksoy, F Sulak, M Uğuz… - Mathematical …, 2015 - Wiley Online Library
Random sequences and random numbers constitute a necessary part of cryptography.
Many cryptographic protocols depend on random values. Randomness is measured by …

[PDF][PDF] A new DNA-based S-box

AH Al-Wattar, R Mahmod, ZA Zukarnain… - Int. J. Eng …, 2015 - researchgate.net
Recently, many scholars have tried to design new security methods inspired by biological
techniques, as DNA, Some of which are in the domains of cryptography and steganography …

[PDF][PDF] A novel approach for enhancing security of advance encryption standard using private XOR table and 3D chaotic regarding to software quality factor

AI Salih, A Alabaichi, AS Abbas - … Express Letters Part B: Applications, An …, 2019 - icicelb.org
The Internet is a medium with low security, so there is a real need for measures to guarantee
data integrity and privacy in the networks and associated computer systems. Cryptography …

[PDF][PDF] A new DNA based approach of generating key dependent MixColumns transformation

AH Al-Wattar, R Mahmod, ZA Zukarnain… - International Journal of …, 2015 - academia.edu
The use of key-dependent MixColumns can be regarded as one of the applied techniques
for changing the quality of a cryptographic algorithm. This article explains one approach for …

[PDF][PDF] Generating a new S-Box inspired by biological DNA

AHS Al-Wattar, R Mahmod, ZA Zukarnain… - International Journal of …, 2015 - researchgate.net
Many scholars have attempted to use new methods inspired by DNA bio-techniques in the
domains of cryptography and steganography. In this article, a new S-Box was designed …

Testing the randomness of cryptographic function mappings

A Kaminsky - Cryptology ePrint Archive, 2019 - eprint.iacr.org
A cryptographic function with a fixed-length output, such as a block cipher, hash function, or
message authentication code (MAC), should behave as a random mapping. The mapping's …