2016
DOI: 10.1007/978-3-319-29172-7_3
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm

Abstract: S-boxes play an important role in ensuring the resistance of block ciphers against cryptanalysis as often they are their only nonlinear components. The cryptographic properties of S-boxes and a variety of constructions have been studied extensively over the past years. Techniques for S-box generation include algebraic constructions, pseudo-random generation and heuristic approaches. The family of artificial immune algorithms is a particular example of a heuristic approach. In this paper we propose an S-box gen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(27 citation statements)
references
References 24 publications
0
25
0
2
Order By: Relevance
“…For the case of δ F /κ F , the best solutions are those far from the Y -axis and close to the X-axis. As one can perceive in the right plot of figure 1, the best solutions according to δ F /κ F non-dominance condition are S-boxes presented in [7], [29].…”
Section: B Non-dominated Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…For the case of δ F /κ F , the best solutions are those far from the Y -axis and close to the X-axis. As one can perceive in the right plot of figure 1, the best solutions according to δ F /κ F non-dominance condition are S-boxes presented in [7], [29].…”
Section: B Non-dominated Solutionsmentioning
confidence: 99%
“…Finally, with respect to the non-dominance condition N L F /δ F , it is more than clear why our S-boxes are not the best solutions for the space. There are a large set of papers which have presented S-boxes having nonlinearity greater than 102 and differential uniformity lower than 8 [6], [7], [15]- [17], [20], [37]. Also see table 5 (Appendix B) for more information about nonlinearity, differential uniformity and confusion coefficient variance of some 8 × 8 S-boxes referred in this paper.…”
Section: B Non-dominated Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…One example can be found in [40]. In this paper, the algorithm was inspired by artificial immune algorithm family, which also referred as clonal selection algorithm.…”
Section:   mentioning
confidence: 99%
“…Therefore, researchers have been designing methods to protect digital images from piracy while they are transferred from one place to another such as encryption algorithms via chaos [ 2 , 3 , 4 , 5 , 6 ], DNA coding [ 7 ], and wavelets [ 8 ]. Also S-boxes play an excellent role in confirming the resistance of block ciphers against cryptanalysis [ 9 ]. In Reference [ 10 ], the authors presented an efficient algorithm based on a class of Mordell elliptic curves to generate S-boxes.…”
Section: Introductionmentioning
confidence: 99%