AbstractEfficient substitution boxes have crucial importance in the design of cryptographically strong modern block encryption algorithms. They are the only nonlinear blocks that decide the security strength of entire cryptosystem. In this paper, a meta-heuristic approach based on Ant Colony Optimization and chaos is put forward to retrieve a suitable configuration of strong 8×8 substitution box. The optimization is carried out by transforming initial S-box to travelling salesman problem through edge matrix. The cryptographic strength of optimized S-box is investigated against standard tests such as bijectivity, nonlinearity, strict avalanche criterion, output bits independence criterion and differential approximation probability. The perfo...
In this paper, we present a novel method to construct cryptographically strong bijective substitutio...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
The paper presents a general framework for improving the security of the cryptosystem based on the s...
This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
Abstract. Substitution box (S-box) is an important nonlinear component in block cipher algorithms. E...
Substitution boxes are essential nonlinear components responsible to impart strong confusion and sec...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
Cipher strength mainly depends on the robust structure and a well-designed interaction of the compon...
As the unique nonlinear component of block ciphers, Substitution box (S-box) directly affects the sa...
Substitution boxes are important parts in many block and stream ciphers. The emergence of a range of...
Secure exchange of sensitive information between different entities is a serious challenge in today&...
This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4...
In most modern symmetric ciphers, substitution boxes are non-linear core components that provide rob...
In this paper, we present a novel method to construct cryptographically strong bijective substitutio...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
The paper presents a general framework for improving the security of the cryptosystem based on the s...
This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
Abstract. Substitution box (S-box) is an important nonlinear component in block cipher algorithms. E...
Substitution boxes are essential nonlinear components responsible to impart strong confusion and sec...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
Cipher strength mainly depends on the robust structure and a well-designed interaction of the compon...
As the unique nonlinear component of block ciphers, Substitution box (S-box) directly affects the sa...
Substitution boxes are important parts in many block and stream ciphers. The emergence of a range of...
Secure exchange of sensitive information between different entities is a serious challenge in today&...
This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4...
In most modern symmetric ciphers, substitution boxes are non-linear core components that provide rob...
In this paper, we present a novel method to construct cryptographically strong bijective substitutio...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
The paper presents a general framework for improving the security of the cryptosystem based on the s...