AbstractIn this paper, we present a method for the construction of 8×8 substitution boxes used in the area of cryptography. A symmetric group permutation S8 is applied on Galois field elements that originally belong to GF(28), and as a consequence, 40320 new substitution boxes are synthesized. The Liu J substitution box is used as a seed in the creation process of the new algebraically complex nonlinear components. The core design of this new algorithm relies on the symmetric group permutation operation which is embedded in the algebraic structure of the new substitution box. We study the characteristics of the newly created substitution boxes and highlight the improved performance parameters and their usefulness in practical applications. ...
Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to imp...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
At a fundamental level, the security of symmetric key cryptosystems ties back to Claude Shannon\u27s...
AbstractIn this paper, we present a method for the construction of 8×8 substitution boxes used in th...
The aim of this work is to synthesize 8*8 substitution boxes (S-boxes) for block ciphers. The confus...
In the literature, different algebraic techniques have been applied on Galois field GF(28) to constr...
Cryptography is commonly used to secure communication and data transmission over insecure networks t...
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-li...
Substitution boxes are the only nonlinear component of the symmetric key cryptography and play a key...
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for th...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy ...
This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes...
Existing literature shows that genetic algorithms can be successfully used for automated constructio...
Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to imp...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
At a fundamental level, the security of symmetric key cryptosystems ties back to Claude Shannon\u27s...
AbstractIn this paper, we present a method for the construction of 8×8 substitution boxes used in th...
The aim of this work is to synthesize 8*8 substitution boxes (S-boxes) for block ciphers. The confus...
In the literature, different algebraic techniques have been applied on Galois field GF(28) to constr...
Cryptography is commonly used to secure communication and data transmission over insecure networks t...
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-li...
Substitution boxes are the only nonlinear component of the symmetric key cryptography and play a key...
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for th...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy ...
This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes...
Existing literature shows that genetic algorithms can be successfully used for automated constructio...
Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to imp...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
At a fundamental level, the security of symmetric key cryptosystems ties back to Claude Shannon\u27s...