In the literature, different algebraic techniques have been applied on Galois field GF(28) to construct substitution boxes. In this paper, instead of Galois field GF(28), we use a cyclic group C255 in the formation of proposed substitution box. The construction proposed S-box involves three simple steps. In the first step, we introduce a special type of transformation T of order 255 to generate C255. Next, we adjoin 0 to C255 and write the elements of C255∪0 in 16×16 matrix to destroy the initial sequence 0,1,2,…,255. In the 2nd step, the randomness in the data is increased by applying certain permutations of the symmetric group S16 on rows and columns of the matrix. In the last step we consider the symmetric group S256, and positions of th...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes...
Two significant recent advances in cryptanalysis, namely the differential attack put forward by Biha...
The aim of this work is to synthesize 8*8 substitution boxes (S-boxes) for block ciphers. The confus...
AbstractIn this paper, we present a method for the construction of 8×8 substitution boxes used in th...
Cryptography is commonly used to secure communication and data transmission over insecure networks t...
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-li...
Substitution boxes are the only nonlinear component of the symmetric key cryptography and play a key...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy ...
The paper presents a general framework for improving the security of the cryptosystem based on the s...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
Two significant recent advances in cryptanalysis, namely the differential attack put forward by Biha...
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for th...
In most modern symmetric ciphers, substitution boxes are non-linear core components that provide rob...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes...
Two significant recent advances in cryptanalysis, namely the differential attack put forward by Biha...
The aim of this work is to synthesize 8*8 substitution boxes (S-boxes) for block ciphers. The confus...
AbstractIn this paper, we present a method for the construction of 8×8 substitution boxes used in th...
Cryptography is commonly used to secure communication and data transmission over insecure networks t...
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-li...
Substitution boxes are the only nonlinear component of the symmetric key cryptography and play a key...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy ...
The paper presents a general framework for improving the security of the cryptosystem based on the s...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
Two significant recent advances in cryptanalysis, namely the differential attack put forward by Biha...
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for th...
In most modern symmetric ciphers, substitution boxes are non-linear core components that provide rob...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes...
Two significant recent advances in cryptanalysis, namely the differential attack put forward by Biha...