Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic algorithms offering security facilities for maintaining more cover-ups. A substitution-box (S-box) is the lone component in a cryptosystem that gives rise to a nonlinear mapping between inputs and outputs, thus providing confusion in data. An S-box that possesses high nonlinearity and low linear and differential probability is considered cryptographically secure. In this study, a new technique is presented to construct cryptographically strong 8×8 S-boxes by applying an adjacency matrix on the Galois field GF(28). The adjacency matrix is obtained corresponding to the co...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to imp...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
The aim of this work is to synthesize 8*8 substitution boxes (S-boxes) for block ciphers. The confus...
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-li...
AbstractIn this paper, we present a method for the construction of 8×8 substitution boxes used in th...
In the literature, different algebraic techniques have been applied on Galois field GF(28) to constr...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
In recent times, the research community has shown interest in information security due to the increa...
This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes...
Substitution boxes with strong cryptographic properties are commonly used in block ciphers to provid...
Secure exchange of sensitive information between different entities is a serious challenge in today&...
Substitution boxes are the only nonlinear component of the symmetric key cryptography and play a key...
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for th...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to imp...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
The aim of this work is to synthesize 8*8 substitution boxes (S-boxes) for block ciphers. The confus...
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-li...
AbstractIn this paper, we present a method for the construction of 8×8 substitution boxes used in th...
In the literature, different algebraic techniques have been applied on Galois field GF(28) to constr...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
In recent times, the research community has shown interest in information security due to the increa...
This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes...
Substitution boxes with strong cryptographic properties are commonly used in block ciphers to provid...
Secure exchange of sensitive information between different entities is a serious challenge in today&...
Substitution boxes are the only nonlinear component of the symmetric key cryptography and play a key...
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for th...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to imp...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...