期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
1
作者 Muhammad Fahad Khan Khalid Saleem +4 位作者 Mohammed Alotaibi Mohammad Mazyad Hazzazi Eid Rehman Aaqif Afzaal Abbasi Muhammad Asif Gondal 《Computers, Materials & Continua》 SCIE EI 2022年第11期2679-2696,共18页
Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them suscept... Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them susceptible to various kinds of security threats.These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field.In this regard,block cipher has been one of the most reliable options through which data security is accomplished.The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes.For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques.On the other side,literature endorse the true random numbers for information security due to the reason that,true random numbers are purely non-deterministic.In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes.Secondly,a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes.Based on the outcome of Systematic Literature Review(SLR),genetic algorithm is chosen for the optimization of s-boxes.The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers.Moreover,our results showed that the proposed substitution boxes achieve better cryptographic strength as compared with state-of-the-art techniques. 展开更多
关键词 IoT security sensors data encryption substitution box generation True Random Number Generators(TRNG) heuristic optimization genetic algorithm
下载PDF
S-box:six-dimensional compound hyperchaotic map and artificial bee colony algorithm 被引量:1
2
作者 Ye Tian Zhimao Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期232-241,共10页
Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes th... Being as unique nonlinear components of block ciphers,substitution boxes(S-boxes) directly affect the security of the cryptographic systems.It is important and difficult to design cryptographically strong S-boxes that simultaneously meet with multiple cryptographic criteria such as bijection,non-linearity,strict avalanche criterion(SAC),bits independence criterion(BIC),differential probability(DP) and linear probability(LP).To deal with this problem,a chaotic S-box based on the artificial bee colony algorithm(CSABC) is designed.It uses the S-boxes generated by the six-dimensional compound hyperchaotic map as the initial individuals and employs ABC to improve their performance.In addition,it considers the nonlinearity and differential uniformity as the fitness functions.A series of experiments have been conducted to compare multiple cryptographic criteria of this algorithm with other algorithms.Simulation results show that the new algorithm has cryptographically strong S-box while meeting multiple cryptographic criteria. 展开更多
关键词 substitution boxes(S-boxes) multiple cryptographic criteria six-dimensional compound hyperchaotic map artificial bee colony algorithm(ABC).
下载PDF
Effective method for the design of S-Boxes satisfying the strict avalanche criterion(SAC)
3
作者 高胜 Ma Wenping +1 位作者 Zhuo Zepeng Li Xiaoping 《High Technology Letters》 EI CAS 2013年第1期88-91,共4页
The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fu... The strict avalanche criterion(SAC)is one of the most important cryptographic criteria for substitution boxes(S-boxes)used in many symmetric encryption systems.However,there are few constructive methods for S-boxes fulfilling the SAC until now.In this paper,to construct S-boxes satisfying the SAC directly,we generalize the concatenation techniques of Boolean functions to S-boxes.Using the idea of concatenating small variable S-boxes,we present a simple yet effective construction method of S-boxes satisfying the SAC.Finally,a simple example on how to construct SAC S-boxes with large input variables by small variables SAC S-boxes is given. 展开更多
关键词 CRYPTOGRAPHY Boolean functions substitution boxes (S-boxes) strict avalanche criterion (SAC) CONCATENATION CONSTRUCTION
下载PDF
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
4
作者 Musheer Ahmad Reem Ibrahim Alkanhel +3 位作者 Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2361-2380,共20页
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ... Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems. 展开更多
关键词 Secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(S-box)
下载PDF
Dynamic inhomogeneous S-Boxes in AES: a novel countermeasure against power analysis attacks
5
作者 陈毅成 《High Technology Letters》 EI CAS 2008年第4期390-393,共4页
Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.Th... Substitution boxes (S-Boxes) in advanced encryption standard (AES) are vulnerable to attacks bypower analysis.The general S-Boxes masking schemes in circuit level need to adjust the design flow andlibrary databases.The masking strategies in algorithm level view each S-Box as an independent moduleand mask them respectively,which are costly in size and power for non-linear characteristic of S-Boxes.The new method uses dynamic inhomogeneous S-Boxes instead of traditional homogeneous S-Boxes,andarranges the S-Boxes randomly.So the power and data path delay of substitution unit become unpre-dictable.The experimental results demonstrate that this scheme takes advantages of the circuit character-istics of various S-Box implementations to eliminate the correlation between crypto operation and power.Itneeds less extra circuits and suits resource constrained applications. 展开更多
关键词 advanced encryption standard (AES) substitution box (S-box correlation power analysis
下载PDF
Novel Scheme for Robust Confusion Component Selection Based on Pythagorean Fuzzy Set
6
作者 Nabilah Abughazalah Mohsin Iqbal +1 位作者 Majid Khan Iqtadar Hussain 《Computers, Materials & Continua》 SCIE EI 2023年第3期6523-6534,共12页
The substitution box,often known as an S-box,is a nonlinear component that is a part of several block ciphers.Its purpose is to protect cryptographic algorithms from a variety of cryptanalytic assaults.A Multi-Criteri... The substitution box,often known as an S-box,is a nonlinear component that is a part of several block ciphers.Its purpose is to protect cryptographic algorithms from a variety of cryptanalytic assaults.A Multi-Criteria Decision Making(MCDM)problem has a complex selection procedure because of having many options and criteria to choose from.Because of this,statistical methods are necessary to assess the performance score of each S-box and decide which option is the best one available based on this score.Using the Pythagorean Fuzzy-based Technique for Order of Preference by Similarity to Ideal Solution(TOPSIS)method,the major objective of this investigation is to select the optimal S-box to be implemented from a pool of twelve key choices.With the help of the Pythagorean fuzzy set(PFS),the purpose of this article is to evaluate whether this nonlinear component is suitable for use in a variety of encryption applications.In this article,we have considered various characteristics of S-boxes,including nonlinearity,algebraic degree,strict avalanche criterion(SAC),absolute indicator,bit independent criterion(BIC),sum of square indicator,algebraic immunity,transparency order,robustness to differential cryptanalysis,composite algebraic immunity,signal to noise ratio-differential power attack(SNR-DPA),and confusion coefficient variance on some standard S-boxes that are Advanced Encryption Following this,the findings of the investigation are changed into Pythagorean fuzzy numbers in the shape of a matrix.This matrix is then subjected to an analysis using the TOPSIS method,which is dependent on the Pythagorean fuzzy set,to rank the most suitable S-box for use in encryption applications. 展开更多
关键词 Decision making substitution box TOPSIS multi-criterion decision making fuzzy set Pythagorean fuzzy set
下载PDF
Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher
7
作者 Hafeez ur Rehman Tariq Shah +2 位作者 Mohammad Mazyad Hazzazi Ali Alshehri Bassfar Zaid 《Computers, Materials & Continua》 SCIE EI 2022年第11期2913-2930,共18页
Elliptic curves(ECs)are deemed one of the most solid structures against modern computational attacks because of their small key size and high security.In many well-known cryptosystems,the substitution box(Sbox)is used... Elliptic curves(ECs)are deemed one of the most solid structures against modern computational attacks because of their small key size and high security.In many well-known cryptosystems,the substitution box(Sbox)is used as the only nonlinear portion of a security system.Recently,it has been shown that using dynamic S-boxes rather than static S-boxes increases the security of a cryptosystem.The conferred study also extends the practical application of ECs in designing the nonlinear components of block ciphers in symmetric key cryptography.In this study,instead of the Mordell elliptic curve(MEC)over the prime field,the Galois field has been engaged in constructing the S-boxes,the main nonlinear component of the block ciphers.Also,the proposed scheme uses the coordinates of MEC and the operation of the Galois field to generate a higher number of S-boxes with optimal nonlinearity,which increases the security of cryptosystems.The proposed S-boxes resilience against prominent algebraic and statistical attacks is evaluated to determine its potential to induce confusion and produce acceptable results compared to other schemes.Also,the majority logic criteria(MLC)are used to assess the new S-boxes usage in the image encryption application,and the outcomes indicate that they have significant cryptographic strength. 展开更多
关键词 Galois field Mordell elliptic curve NONLINEARITY substitution box
下载PDF
More constructions of APN and differentially 4-uniform functions by concatenation 被引量:4
8
作者 CARLET Claude 《Science China Mathematics》 SCIE 2013年第7期1373-1384,共12页
We study further the method of concatenating the outputs of two functions for designing an APN or a differentially 4-uniform (n, n)-function for every even n. We deduce several specific constructions of APN or differe... We study further the method of concatenating the outputs of two functions for designing an APN or a differentially 4-uniform (n, n)-function for every even n. We deduce several specific constructions of APN or differentially 4-uniform (n, n)-functions from APN and differentially 4-uniform (n/2, n/2)-functions. We also give a construction of quadratic APN functions which includes as particular cases a previous construction by the author and a more recent construction by Pott and Zhou. 展开更多
关键词 block cipher vectorial function substitution box almost perfect nonlinear almost bent
原文传递
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
9
作者 韩玮 郑东 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期81-85,共5页
Temporal key integrity protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in wired equivalent privacy (WEP) protocol. TKIP adds four new algorithms to WEP: a message integrity co... Temporal key integrity protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in wired equivalent privacy (WEP) protocol. TKIP adds four new algorithms to WEP: a message integrity code (MIC) called Michael, an initialization vector (IV) sequencing discipline, a key mixing function and a reeying mechanism. The key mixing function, also called temporal key hash, de-correlates the IVs from weak keys. Some cryptographic properties of the substitution box (S-box) used in the key mixing function are investigated in this paper, such as regularity, avalanche effect, differ uniform and linear structure. Moen et al pointed out that there existed a temporal key recovery attack in TKIP key mixing function. In this paper a method is proposed to defend against the attack, and the resulting effect on performance is discussed. 展开更多
关键词 wireless local area network (WLAN) temporal key integrity protocol (TKIP) substitution box (S- box
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部