2023
DOI: 10.3390/math11020446
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement of Non-Permutation Binomial Power Functions to Construct Cryptographically Strong S-Boxes

Abstract: A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy Shannon’s property on confusion. As the only nonlinear operation, the S-box must be cryptographically strong to thwart any cryptanalysis tools on cryptosystems. Generally, the S-boxes can be constructed using any of the following approaches: the random search approach, heuristic/evolutionary approach or mathematical approach. However, the current S-box construction has some drawbacks, such as low cryptographic p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 64 publications
0
3
0
Order By: Relevance
“…The article [14] focuses only on the differential properties of S-boxes, which is clearly not enough. Articles [15] and [16] also offer quite complex and time-consuming algorithms for generating S-boxes.…”
Section: Review Of the Literaturementioning
confidence: 99%
“…The article [14] focuses only on the differential properties of S-boxes, which is clearly not enough. Articles [15] and [16] also offer quite complex and time-consuming algorithms for generating S-boxes.…”
Section: Review Of the Literaturementioning
confidence: 99%
“…A. ), the authors [46] created a series of mathematical functions. This approach prevented random production of S-Box and its attributes such as BIC and DP were 106.32 and 0.015625, while NL, SAC, and LP were 108, 0.5001, and 0.1545 respectively.…”
Section: Introductionmentioning
confidence: 99%
“…More than 100 sbox generation algorithms have been proposed using many approaches from the past to the present. Among these approaches, the most; mathematical transformations [3][4][5][6][7][8], chaotic systems [9][10][11][12][13][14] and optimization techniques [15][16][17][18][19][20][21][22] are used. In addition, hybrid approaches have been developed [23][24][25] by combining DNA coding, cellular automata, and the benefits of existing approaches.…”
Section: Introductionmentioning
confidence: 99%