21 results on '"Bit independence criterion"'
Search Results
2. Highly dispersive substitution box (S‐box) design using chaos
- Author
-
Zaid Bin Faheem, Asim Ali, Muhamad Asif Khan, Muhammad Ehatisham Ul‐Haq, and Waqar Ahmad
- Subjects
bit independence criterion ,differential approximation probability ,piecewise linear chaotic map ,strict avalanche criterion ,substitution box ,Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
Highly dispersive S‐boxes are desirable in cryptosystems as nonlinear confusion sub‐layers for resisting modern attacks. For a near optimal cryptosystem resistant to modern cryptanalysis, a highly nonlinear and low differential probability (DP) value is required. We propose a method based on a piecewise linear chaotic map (PWLCM) with optimization conditions. Thus, the linear propagation of information in a cryptosystem appearing as a high DP during differential cryptanalysis of an S‐box is minimized. While mapping from the chaotic trajectory to integer domain, a randomness test is performed that justifies the nonlinear behavior of the highly dispersive and nonlinear chaotic S‐box. The proposed scheme is vetted using well‐established cryptographic performance criteria. The proposed S‐box meets the cryptographic performance criteria and further minimizes the differential propagation justified by the low DP value. The suitability of the proposed S‐box is also tested using an image encryption algorithm. Results show that the proposed S‐box as a confusion component entails a high level of security and improves resistance against all known attacks.
- Published
- 2020
- Full Text
- View/download PDF
3. Avalanche effect and bit independence criterion of perfectly secure Shannon cipher based on matrix power.
- Author
-
Levinskas, Matas and Mihalkovich, Aleksejus
- Subjects
APPLIED mathematics ,DATA security ,DATA protection ,ACCESS to information ,DYNAMICAL systems - Abstract
In 2020 E. Sakalauskas with coauthors published a paper defining perfectly secure Shannon cipher based on matrix power function, proposing effective parallelization, and ensuring no need for multiple rounds encrypting one data block [1]. In this paper we present computational results with the avalanche effect and bit independence criterion (BIC). These criteria are important when describing the rate of confusion of bits in the ciphertext. It was observed that increasing matrix order and group size enhance BIC and avalanche effect results converging to the desired values. Based on the outputs it is possible to pick appropriate parameters satisfying security needs and available memory in a device where appropriate keys are going to be stored. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
4. A Novel Group Theoretic and Graphical Approach for Designing Cryptographically Strong Nonlinear Components of Block Ciphers.
- Author
-
Razaq, Abdul, Ullah, Atta, Alolaiyan, Hanan, and Yousaf, Awais
- Subjects
BLOCK ciphers ,FINITE fields ,TEXT messages ,COLLATERAL security ,CRYPTOGRAPHY - Abstract
Substitution box is a significant and only nonlinear constituent of block cipher. S-box plays a central role in converting the intelligible message or plain text, into an enciphered format. Construction of strong S-boxes is an important area of interest for security experts. In this work, we develop a new method to evolve S-boxes with the help of coset graph for the action of P S L 2 , Z on projective line over the finite field GF (2
8 ), a special type of bijective map g and the symmetric group S256 The capability of the proposed S-boxes to mitigate cryptanalysis is investigated through various performance analyzing parameters. The outcomes of the comparison with the familiar S-boxes indicate that the working abilities of newly designed S-boxes are better than that of many of the well-known S-boxes. [ABSTRACT FROM AUTHOR]- Published
- 2021
- Full Text
- View/download PDF
5. Bit Independence Criterion Extended to Stream Ciphers.
- Author
-
Madarro-Capó, Evaristo José, Legón-Pérez, Carlos Miguel, Rojas, Omar, Sosa-Gómez, Guillermo, and Socorro-Llanes, Raisa
- Subjects
STREAM ciphers ,ALGORITHMS ,BLOCK ciphers ,CIPHERS - Abstract
The bit independence criterion was proposed to evaluate the security of the S-boxes used in block ciphers. This paper proposes an algorithm that extends this criterion to evaluate the degree of independence between the bits of inputs and outputs of the stream ciphers. The effectiveness of the algorithm is experimentally confirmed in two scenarios: random outputs independent of the input, in which it does not detect dependence, and in the RC4 ciphers, where it detects significant dependencies related to some known weaknesses. The complexity of the algorithm is estimated based on the number of inputs l, and the dimensions, n and m, of the inputs and outputs, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
6. Highly dispersive substitution box (S‐box) design using chaos.
- Author
-
Bin Faheem, Zaid, Ali, Asim, Khan, Muhamad Asif, Ul‐Haq, Muhammad Ehatisham, and Ahmad, Waqar
- Subjects
ALGORITHMS ,LINEAR operators ,IMAGE encryption ,CRYPTOGRAPHY ,CRYPTOSYSTEMS ,BOXES ,INTEGERS - Abstract
Highly dispersive S‐boxes are desirable in cryptosystems as nonlinear confusion sub‐layers for resisting modern attacks. For a near optimal cryptosystem resistant to modern cryptanalysis, a highly nonlinear and low differential probability (DP) value is required. We propose a method based on a piecewise linear chaotic map (PWLCM) with optimization conditions. Thus, the linear propagation of information in a cryptosystem appearing as a high DP during differential cryptanalysis of an S‐box is minimized. While mapping from the chaotic trajectory to integer domain, a randomness test is performed that justifies the nonlinear behavior of the highly dispersive and nonlinear chaotic S‐box. The proposed scheme is vetted using well‐established cryptographic performance criteria. The proposed S‐box meets the cryptographic performance criteria and further minimizes the differential propagation justified by the low DP value. The suitability of the proposed S‐box is also tested using an image encryption algorithm. Results show that the proposed S‐box as a confusion component entails a high level of security and improves resistance against all known attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
7. A Novel Technique to Improve Nonlinearity of Substitution Box Without Disturbing Its Mathematical Properties.
- Author
-
Razaq, Abdul, Ullah, Atta, and Waheed, Adil
- Subjects
PERMUTATION groups ,SECURITY systems ,BIJECTIONS ,BOXES ,BLOCK ciphers ,DATA encryption - Abstract
Substitution box is a basic nonlinear component in data encryption. It converts the plain text into an enciphered format. The formation of cryptographically secure S-boxes is the most important task for cryptographers to ensure the security of the system. In this paper, we have introduced a novel method to increase the working capability of an S-box without demolishing its basic mathematical structure, that is, Eigen values, characteristic polynomial and determinant of the S-box/ 16 × 16 matrix. We considered Skipjack, Xyi, Prime, Jakimoski, Tang and Iqtadar S-boxes and reshuffled their rows/columns in such a way that they become cryptographically stronger. Algebraically, this can be accomplished by using appropriate permutations of the symmetric group S 16 over rows/columns of the S-boxes. The proposed technique is very constructive in enhancing the performance of S-boxes based on fundamental idea; bijection over the same set. The outcomes of different analyses demonstrated that the improved versions of S-boxes are more reliable than the original ones. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
8. Bit Independence Criterion Extended to Stream Ciphers
- Author
-
Evaristo José Madarro-Capó, Carlos Miguel Legón-Pérez, Omar Rojas, Guillermo Sosa-Gómez, and Raisa Socorro-Llanes
- Subjects
bit independence criterion ,bit independence ,RC4 ,stream cipher ,complexity ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
The bit independence criterion was proposed to evaluate the security of the S-boxes used in block ciphers. This paper proposes an algorithm that extends this criterion to evaluate the degree of independence between the bits of inputs and outputs of the stream ciphers. The effectiveness of the algorithm is experimentally confirmed in two scenarios: random outputs independent of the input, in which it does not detect dependence, and in the RC4 ciphers, where it detects significant dependencies related to some known weaknesses. The complexity of the algorithm is estimated based on the number of inputs l, and the dimensions, n and m, of the inputs and outputs, respectively.
- Published
- 2020
- Full Text
- View/download PDF
9. Avalanche effect and bit independence criterion of perfectly secure Shannon cipher based on matrix power
- Author
-
Aleksejus Mihalkovich and Matas Levinskas
- Subjects
T57-57.97 ,Applied mathematics. Quantitative methods ,business.industry ,Computer science ,block cipher ,bit independence criterion ,Encryption ,Information-theoretic security ,Matrix (mathematics) ,symmetric cipher ,Symmetric-key algorithm ,Cipher ,Ciphertext ,perfect secrecy ,matrix power function ,avalanche effect ,business ,Algorithm ,Avalanche effect ,Computer Science::Cryptography and Security ,Block cipher - Abstract
In 2020 E. Sakalauskas with coauthors published a paper defining perfectly secure Shannon cipher based on matrix power function, proposing effective parallelization, and ensuring no need for multiple rounds encrypting one data block [1]. In this paper we present computational results with the avalanche effect and bit independence criterion (BIC). These criteria are important when describing the rate of confusion of bits in the ciphertext. It was observed that increasing matrix order and group size enhance BIC and avalanche effect results converging to the desired values. Based on the outputs it is possible to pick appropriate parameters satisfying security needs and available memory in a device where appropriate keys are going to be stored.
- Published
- 2021
10. Bit Independence Criterion Extended to Stream Ciphers
- Author
-
Carlos Miguel Legón-Pérez, Guillermo Sosa-Gómez, Evaristo José Madarro-Capó, Raisa Socorro-Llanes, and Omar Rojas
- Subjects
Computer science ,bit independence ,0211 other engineering and technologies ,02 engineering and technology ,RC4 ,lcsh:Technology ,lcsh:Chemistry ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Arithmetic ,Instrumentation ,Stream cipher ,lcsh:QH301-705.5 ,Block cipher ,Computer Science::Cryptography and Security ,Fluid Flow and Transfer Processes ,021110 strategic, defence & security studies ,Degree (graph theory) ,lcsh:T ,Process Chemistry and Technology ,General Engineering ,020207 software engineering ,bit independence criterion ,lcsh:QC1-999 ,stream cipher ,Computer Science Applications ,Bit (horse) ,lcsh:Biology (General) ,lcsh:QD1-999 ,lcsh:TA1-2040 ,Independence (mathematical logic) ,lcsh:Engineering (General). Civil engineering (General) ,complexity ,lcsh:Physics - Abstract
The bit independence criterion was proposed to evaluate the security of the S-boxes used in block ciphers. This paper proposes an algorithm that extends this criterion to evaluate the degree of independence between the bits of inputs and outputs of the stream ciphers. The effectiveness of the algorithm is experimentally confirmed in two scenarios: random outputs independent of the input, in which it does not detect dependence, and in the RC4 ciphers, where it detects significant dependencies related to some known weaknesses. The complexity of the algorithm is estimated based on the number of inputs l, and the dimensions, n and m, of the inputs and outputs, respectively.
- Published
- 2020
- Full Text
- View/download PDF
11. Literature survey on nonlinear components and chaotic nonlinear components of block ciphers.
- Author
-
Hussain, Iqtadar and Shah, Tariq
- Abstract
In the modern era of secure communication, it is important to create uncertainty in the original data in order to avoid unauthorized entities to extract or manipulate information. From simple methods such as permutations of original data to different mapping algorithms, the security of the ciphers rely on the substitution process. There are many types of components proposed in literature that are evolved by different methodologies and ideas. The prevailing ciphers use substitution boxes (S-boxes) to do this transformation process. In this work, we present a literature review of the design, construction, and analysis of the S-boxes used in block ciphers. The performance of S-boxes depends on the design and algebraic structure used for the construction and is contingent upon its ability to resist against cryptanalysis. We present the details of the S-box synthesis process and issues pertaining to creating resistance against various types of attacks, and highlight the consequences of a particular design methodology. In the infancy of the development of modern block ciphers, Shannon (Bell Syst. Tech. J. 28(4):656–715, 1949 ) presented the idea of encryption with the implementation of substitution-permutation network (SPN). In this process, the data is initially transformed by the substation process and then permuted that ends the first round supported by the secret key for this step. This substitution-permutation process is repeated several times to ensure reliability of encrypted data. The objective of using the substitution-permutation network is to create confusion between cipher text and secret key, and add diffusion in the plaintext. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
12. Construction of S8 Liu J S-boxes and their applications
- Author
-
Hussain, Iqtadar, Shah, Tariq, Mahmood, Hasan, and Gondal, Muhammad Asif
- Subjects
- *
CRYPTOGRAPHY , *PERMUTATIONS , *FINITE fields , *ALGORITHMS , *NONLINEAR analysis , *ALGEBRA - Abstract
Abstract: In this paper, we present a method for the construction of 8×8 substitution boxes used in the area of cryptography. A symmetric group permutation S8 is applied on Galois field elements that originally belong to GF(28), and as a consequence, 40320 new substitution boxes are synthesized. The Liu J substitution box is used as a seed in the creation process of the new algebraically complex nonlinear components. The core design of this new algorithm relies on the symmetric group permutation operation which is embedded in the algebraic structure of the new substitution box. We study the characteristics of the newly created substitution boxes and highlight the improved performance parameters and their usefulness in practical applications. In particular, we focus on the nonlinear properties and the behavior of input/output bits and determine the suitability of a particular substitution box for a specific type of encryption application. A comparison with some of the prevailing and popular substitution boxes is presented. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
13. S affine-power-affine S-boxes and their applications.
- Author
-
Hussain, Iqtadar, Shah, Tariq, Gondal, Muhammad, and Mahmood, Hasan
- Subjects
- *
DATA encryption , *NONLINEAR theories , *APPROXIMATION theory , *GENERALIZATION , *AFFINAL relatives , *MATHEMATICAL mappings , *COMPLEXITY (Philosophy) , *FINITE fields - Abstract
The encryption process relies on the use of nonlinear mapping subsystems to create confusion in the ciphertext. The design of these nonlinear components is a challenging task and requires complex algebraic expression for their descriptions. In an effort to increase the complexity of nonlinear mappings, several implementations exhibiting interesting properties are proposed in the literature. In particular, affine-power-affine structure is designed for advanced encryption standard, which improves the complexity of its algebraic expression by increasing the number of terms. Based on the characteristics of affine-power-affine structure, we propose a new nonlinear component that uses the symmetric group permutation S on the Galois field GF(2) elements and provides the possibility to incorporate 40320 unique instances. A rigorous analysis is presented to evaluate the properties of these new nonlinear components by applying nonlinearity analysis, linear approximation analysis, differential approximation analysis, bit independence criterion and strict avalanche criterion. In order to determine the suitability to various encryption applications, the S-boxes are tested with generalized majority logic criterion. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
14. Fast S-box security mechanism research based on the polymorphic cipher
- Author
-
Yin, Yifeng, Li, Xinshe, and Hu, Yupu
- Subjects
- *
CIPHERS , *INFORMATION science , *TESTING equipment , *METHODS engineering - Abstract
Abstract: In this study we propose a new design method for fast S-box construction. Its security is dependent upon the length of pseudorandom numbers generated by two communication parties. As the S-box is being built, we demonstrate that Boolean functions play an important role in the design of both block and stream ciphers. To satisfy a variety of cryptographic test methods, such as strict avalanche criterion (SAC), bit independence criterion (BIC), and nonlinearity, we apply polymorphic cipher (PMC) theory to the permutation function construction. Correlations among the test criteria in a real network environment are also evaluated. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
15. Construction of Dynamical Non-linear Components Based on Lorenz System and Symmetric Group of Permutations
- Author
-
Hussain, Iqtadar, Gondal, Muhammad Asif, and Hussain, Azkar
- Published
- 2015
- Full Text
- View/download PDF
16. Construction of Substitution Box Based on Piecewise Linear Chaotic Map and S8 Group
- Author
-
Hussain, Iqtadar, Gondal, Muhammad Asif, and Hussain, Azkar
- Published
- 2015
- Full Text
- View/download PDF
17. A Scheme for Obtaining Secure S-Boxes Based on Chaotic Baker’s Map
- Author
-
Gondal, Muhammad Asif, Abdul Raheem, and Hussain, Iqtadar
- Published
- 2014
- Full Text
- View/download PDF
18. Choice of optical system is critical for the security of double random phase encryption systems
- Author
-
John J. Healy, Ra'ed Malallah, Inbarasan Muniraj, Changliang Guo, James P. Ryle, Derek Cassidy, John T. Sheridan, and Liang Zhao
- Subjects
Theoretical computer science ,Computer science ,Cryptography ,02 engineering and technology ,Encryption ,01 natural sciences ,Linear canonical transform ,010309 optics ,symbols.namesake ,020210 optoelectronics & photonics ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Avalanche effect ,Cryptosystem ,Independence (probability theory) ,Quadratic phase encoding system ,Computer Science::Cryptography and Security ,business.industry ,General Engineering ,Double Random Phase Encryption ,Atomic and Molecular Physics, and Optics ,Fourier transform ,Bit independence criterion ,symbols ,business ,Personal sensing ,Algorithm - Abstract
The linear canonical transform (LCT) is used in modeling a coherent light field propagation through first-order optical systems. Recently, a generic optical system, known as the Quadratic Phase Encoding System (QPES), for encrypting a two-dimensional (2D) image has been reported. In such systems, two random phase keys and the individual LCT parameters (, , ) serve as secret keys of the cryptosystem. It is important that such encryption systems also satisfies some dynamic security properties. In this work, we therefore examine such systems using two cryptographic evaluation methods, the avalanche effect and bit independence criterion, which indicate the degree of security of the cryptographic algorithms using QPES. We compared our simulation results with the conventional Fourier and the Fresnel transform based DRPE systems. The results show that the LCT based DRPE has an excellent avalanche and bit independence characteristics compared to the conventional Fourier and Fresnel based encryption systems.Keywords: Quadratic Phase Encoding system, linear canonical transform, Double Random Phase Encryption, Avalanche effect and bit independence criterion. Science Foundation Ireland Insight Research Centre
- Published
- 2017
19. Relations among cryptographic security criteria and linear cryptanalysis
- Author
-
Murad, Raed, Yücel, Melek, and Diğer
- Subjects
Cryptanalysis ,Bit independence criterion ,Elektrik ve Elektronik Mühendisliği ,Security ,Cryptography ,Nonlinearity ,Strict avalanche criterion ,Electrical and Electronics Engineering - Abstract
öz KRİPTOGRAFİK GÜVENLİK ÖLÇÜTLERİ ARASINDAKİ İLİŞKİLER VE DOĞRUSAL KRİPTO ANALİZ MURAD, Raed Yüksek Lisans, Elektrik ve Elektronik Mühendisliği Bölümü Tez Yöneticisi: Doç. Dr. Melek D. YÜCEL Temmuz 2002, 62 Sayfa İkil Bağımsızlığı, Katı Çığ, En Yüksek Derece Katı Çığ, Doğrusal Olmama ve Doğrusal Yaklaşım Tabloları gibi bazı kriptografîk güvenlik ölçütleri genellikle simetrik kriptografik yerleşim kutularının güvenlik testlerinde kullanılmaktadır. Bu çalışmada bahsedilen ölçütler arasındaki ilişkiler türetilmiş ve bu ölçütler, ya yerleşim kutularını oluşturan Boole işlevlerinin özilişki fonksiyonları ya da Walsh-Hadamard çevrimleri cinsinden ifade edilmiştir. Ayrıca, Boole işlevlerinin özilişki fonksiyonları ve Walsh- Hadamard görüngeleri, yerleşim kutularıyla ilgili bazı doğrusal denklemlerin sağlanma olasılığının yüzde elliden sapma miktarı olarak yorumlanmıştır. Sözü edilen sapmalar büyük olduğunda, bunlara karşılık gelen şifrelerin kripto analizinde kullanılabilirler. Heys'in kullandığı yerleşim-değişim ağı üzerinde, Kim, Matsumoto ve Imai tarafınden önerilen yerleşim kutusunun doğrusal kripto analiziyapılmıştır. Ayrıca, bu yerleşim kutusu, DES şifresinin 4x4 lük bir yerleşim kutusu ile, en yüksek derece katı çığ olasılıkları ve doğrusal yaklaşım tabloları bazında karşılaştırılmıştır. Anahtar Kelimeler: Katı Çığ Ölçütü, İkil Bağımsızlığı Ölçütü, Doğrusal Olmama Ölçütü, Doğrusal Yaklaşım Tabloları, Walsh-Hadamard Çevrimleri, Yerleşim Kutuları. VI T.C. YtJKSKK^amM KUROLD ABSTRACT RELATIONS AMONG CRYPTOGRAPHIC SECURITY CRITERIA AND LINEAR CRYPTANALYSIS MURAD, Raed M.S., Department of Electrical and Electronics Engineering Supervisor: Assoc. Prof. Dr. Melek D. YÜCEL July 2002, 62 pages Some cryptographic security criteria, such as, Bit Independence Criterion (BIC), Strict Avalanche Criterion (SAC), Maximum Order Strict Avalanche Criterion (MOSAC), Nonlinearity Criterion (NC) and Linear Approximation Tables (LAT) are used mainly for the security tests of the substitution boxes (S-Boxes) of the symmetric cryptographic algorithms. In this study, mathematical relationships among these criteria are derived; and they are expressed in terms of either the autocorrelation functions or Walsh- Hadamard spectra of the Boolean functions, which constitute the S-Boxes. Moreover, the autocorrelation functions and Walsh-Hadamard spectra of the constituting Boolean functions are interpreted as bias terms of some linear equations related to the S-Box. iii jjcYtnLsmoeMMrmmmmsWhenever these bias terms are large, they can be used in the cryptanalysis of the corresponding cipher. Linear cryptanalysis is applied to the 4x4 S-Box of Kim, Matsumoto and Imai, using the substitution-permutation network given by Heys. We also compare this S-Box to one of the 4x4 DES S-Boxes, on the basis of their maximum order strict avalanche probabilities and linear approximation tables. Keywords: Strict Avalanche Criterion, Bit Independence Criterion, Nonlinearity Criterion, Linear Approximation Tables, WalshrHadamard Transforms, S-Boxes. IV 62
- Published
- 2002
20. Construction of S8 Liu J S-boxes and their applications
- Author
-
Muhammad Asif Gondal, Iqtadar Hussain, Tariq Shah, and Hasan Mahmood
- Subjects
Discrete mathematics ,AES ,business.industry ,Algebraic structure ,Galois theory ,Substitution (logic) ,Cryptography ,Type (model theory) ,Encryption ,Strict avalanche criterion ,Differential probability ,Algebra ,Permutation ,Computational Mathematics ,Computational Theory and Mathematics ,Bit independence criterion ,Symmetric group ,Modeling and Simulation ,Modelling and Simulation ,Generalized majority criterion ,business ,Linear probability ,Mathematics - Abstract
In this paper, we present a method for the construction of 8×8 substitution boxes used in the area of cryptography. A symmetric group permutation S8 is applied on Galois field elements that originally belong to GF(28), and as a consequence, 40320 new substitution boxes are synthesized. The Liu J substitution box is used as a seed in the creation process of the new algebraically complex nonlinear components. The core design of this new algorithm relies on the symmetric group permutation operation which is embedded in the algebraic structure of the new substitution box. We study the characteristics of the newly created substitution boxes and highlight the improved performance parameters and their usefulness in practical applications. In particular, we focus on the nonlinear properties and the behavior of input/output bits and determine the suitability of a particular substitution box for a specific type of encryption application. A comparison with some of the prevailing and popular substitution boxes is presented.
- Full Text
- View/download PDF
21. A novel design for the construction of safe S-boxes based on TDERC sequence
- Author
-
Iqtadar Hussain, Ali H. Alkhaldi, and Muhammad Asif Gondal
- Subjects
Discrete mathematics ,Sequence ,S-box ,Substitution (logic) ,MathematicsofComputing_NUMERICALANALYSIS ,General Engineering ,Chaotic ,Tangent ,SAC ,Engineering (General). Civil engineering (General) ,Permutation ,Bit independence criterion ,Symmetric group ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,TA1-2040 ,Differential (infinitesimal) ,Nonlinearity ,Engineering(all) ,Mathematics - Abstract
The focus of this article is to construct substitution box based on tangent delay for elliptic cavity chaotic sequence and a particular permutation of symmetric group of permutations. The analysis result shows that the proposed S-box is very good against differential and linear type of attacks. Keywords: S-box, Nonlinearity, Bit independence criterion, SAC
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.