2021
DOI: 10.1109/access.2021.3090163
|View full text |Cite
|
Sign up to set email alerts
|

Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System

Abstract: The security strengths of block ciphers greatly rely on the confusion components which have the tendency to transform the data nonlinearly into the perplexed form. This paper proposes to put forward a novel scheme of generating cryptographically strong nonlinear confusion components of block ciphers, usually termed as substitution-boxes (S-boxes). The anticipated S-box design scheme is based on a novel five-dimensional (5-D) chaotic system analyzed in this paper. The proposed 5-D dynamical system consists of h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 49 publications
0
12
0
1
Order By: Relevance
“…Both methods are vulnerable to statistical and algebraic assaults. Additionally, [2], [13] used a hyperchaotic system (five-dimensional). Its implementation in hardware and software is hence inefficient.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Both methods are vulnerable to statistical and algebraic assaults. Additionally, [2], [13] used a hyperchaotic system (five-dimensional). Its implementation in hardware and software is hence inefficient.…”
Section: Related Workmentioning
confidence: 99%
“…Encryption is one of the key strategies for safeguarding digital data. Building block ciphers, which use mathematical operations (substitutionpermutation networks), is based on Shannon's theory of diffusion and confusion [1,2]. An input block of n bits is transformed into a new nonlinear block of m bits via a substitution box (S-box).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Chaotic maps are dynamic models with excellent features such as unpredictable, periodic behaviour and sensitivity to system parameters as well as sensitivity to initial values. There are two classes of chaotic maps: one-dimensional(1-D) [16] and multidimensional(M-D) [17]. Most one-dimensional chaotic maps, like the Logistic, Piecewise linear, and Tent map [18], are made up of one variable and a few parameters.…”
Section: Introductionmentioning
confidence: 99%
“…It is extensively recognized as a useful technique for secure transmission. Every image encryption algorithm is aimed to keep information secret [2,3]. Image cryptographic models are based on mathematical functions to generate a combination of different keys to encrypt the input image.…”
Section: Introductionmentioning
confidence: 99%