An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges
The expansion of worldwide networking has created new possibilities for management,
development, and presentation in the form of digital data. The uncomplicated accessibility to …
development, and presentation in the form of digital data. The uncomplicated accessibility to …
Cryptanalysis and constructing S-box based on chaotic map and backtracking
H Liu, A Kadir, C Xu - Applied Mathematics and Computation, 2020 - Elsevier
In recent years, a large number of S-Box design schemes have been proposed. However,
after detection we found that most of them contain fixed point or reverse fixed point, which …
after detection we found that most of them contain fixed point or reverse fixed point, which …
A novel construction of efficient substitution-boxes using cubic fractional transformation
A symmetric block cipher employing a substitution–permutation duo is an effective technique
for the provision of information security. For substitution, modern block ciphers use one or …
for the provision of information security. For substitution, modern block ciphers use one or …
An innovative design of substitution-boxes using cubic polynomial mapping
In this paper, we propose to present a novel technique for designing cryptographically
strong substitution-boxes using cubic polynomial mapping. The proposed cubic polynomial …
strong substitution-boxes using cubic polynomial mapping. The proposed cubic polynomial …
A novel construction of substitution box using a combination of chaotic maps with improved chaotic range
The influential application of substitution boxes in secure communication and multimedia
security attracted researchers to construct more robust substitution boxes. The advantage of …
security attracted researchers to construct more robust substitution boxes. The advantage of …
Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices
MSM Malik, MA Ali, MA Khan… - IEEE …, 2020 - ieeexplore.ieee.org
This work reports a novel chaos-based affine transformation generation method, which is
based on rotational matrices to design strong key-based S-boxes. Chaotic logistic map's …
based on rotational matrices to design strong key-based S-boxes. Chaotic logistic map's …
Intelligent security algorithm for UNICODE data privacy and security in IOT
B Maram, JM Gnanasekar, G Manogaran… - … Oriented Computing and …, 2019 - Springer
Abstract Information security algorithms provide praxis for security to the different forms of
data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video …
data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video …
A novel S-box dynamic design based on nonlinear-transform of 1D chaotic maps
W Yan, Q Ding - Electronics, 2021 - mdpi.com
In this paper, a method to enhance the dynamic characteristics of one-dimension (1D)
chaotic maps is first presented. Linear combinations and nonlinear transform based on …
chaotic maps is first presented. Linear combinations and nonlinear transform based on …
Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes
This paper proposes to present a novel group theoretic approach of improvising the
cryptographic features of substitution-boxes. The approach employs a proposed finite …
cryptographic features of substitution-boxes. The approach employs a proposed finite …
A novel scheme for designing secure substitution boxes (S-boxes) based on Mobius group and finite field
B Arshad, N Siddiqui, Z Hussain… - Wireless Personal …, 2022 - Springer
Data encryption with substitution-box (S-box) is now widely regarded as the most secure
method of communicating in order to prevent unauthorized access to sensitive and …
method of communicating in order to prevent unauthorized access to sensitive and …