An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges

A Waheed, F Subhan, MM Suud, M Alam… - Multimedia Tools and …, 2023 - Springer
The expansion of worldwide networking has created new possibilities for management,
development, and presentation in the form of digital data. The uncomplicated accessibility to …

Cryptanalysis and constructing S-box based on chaotic map and backtracking

H Liu, A Kadir, C Xu - Applied Mathematics and Computation, 2020 - Elsevier
In recent years, a large number of S-Box design schemes have been proposed. However,
after detection we found that most of them contain fixed point or reverse fixed point, which …

A novel construction of efficient substitution-boxes using cubic fractional transformation

AH Zahid, MJ Arshad, M Ahmad - Entropy, 2019 - mdpi.com
A symmetric block cipher employing a substitution–permutation duo is an effective technique
for the provision of information security. For substitution, modern block ciphers use one or …

An innovative design of substitution-boxes using cubic polynomial mapping

AH Zahid, MJ Arshad - Symmetry, 2019 - mdpi.com
In this paper, we propose to present a novel technique for designing cryptographically
strong substitution-boxes using cubic polynomial mapping. The proposed cubic polynomial …

A novel construction of substitution box using a combination of chaotic maps with improved chaotic range

A Ullah, SS Jamal, T Shah - Nonlinear Dynamics, 2017 - Springer
The influential application of substitution boxes in secure communication and multimedia
security attracted researchers to construct more robust substitution boxes. The advantage of …

Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices

MSM Malik, MA Ali, MA Khan… - IEEE …, 2020 - ieeexplore.ieee.org
This work reports a novel chaos-based affine transformation generation method, which is
based on rotational matrices to design strong key-based S-boxes. Chaotic logistic map's …

Intelligent security algorithm for UNICODE data privacy and security in IOT

B Maram, JM Gnanasekar, G Manogaran… - … Oriented Computing and …, 2019 - Springer
Abstract Information security algorithms provide praxis for security to the different forms of
data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video …

A novel S-box dynamic design based on nonlinear-transform of 1D chaotic maps

W Yan, Q Ding - Electronics, 2021 - mdpi.com
In this paper, a method to enhance the dynamic characteristics of one-dimension (1D)
chaotic maps is first presented. Linear combinations and nonlinear transform based on …

Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes

MA Yousaf, H Alolaiyan, M Ahmad, M Dilbar… - IEEE …, 2020 - ieeexplore.ieee.org
This paper proposes to present a novel group theoretic approach of improvising the
cryptographic features of substitution-boxes. The approach employs a proposed finite …

A novel scheme for designing secure substitution boxes (S-boxes) based on Mobius group and finite field

B Arshad, N Siddiqui, Z Hussain… - Wireless Personal …, 2022 - Springer
Data encryption with substitution-box (S-box) is now widely regarded as the most secure
method of communicating in order to prevent unauthorized access to sensitive and …