2022
DOI: 10.1002/cta.3242
|View full text |Cite
|
Sign up to set email alerts
|

FPGA simulation of chaotic tent map‐based S‐Box design

Abstract: The chaotic system has a characteristically random behavior by nature, and these systems have their own characteristics in a completely deterministic structure. This feature of a chaotic system makes it difficult to predict encryptions designed based on such a system. Thanks to this unpredictable and strong feature, maps produced from chaotic systems are an important alternative in the field of encryption. One of the structures obtained by employing chaotic maps is the substitution box. S‐Box, which provides t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 52 publications
0
6
0
Order By: Relevance
“…10 Secret merchant-4 (SM4) [11][12][13][14][15][16][17][18][19][20] and advanced encryption standard (AES) cryptographic algorithms 5,6 are a type of symmetric block ciphers that are able to achieve fast encryption speeds and low hardware implementation costs. 4,[21][22][23][24][25] Unfortunately, both SM4 and AES cryptographic algorithms are pretty vulnerable to PAAs when they are implemented in hardware levels. 4,26 So as to reinforce the security levels of SM4 and AES cryptographic circuits against PAAs, a variety of countermeasures [27][28][29] have been proposed to break the critical correlation between the processed data and monitored power dissipation.…”
Section: Introductionmentioning
confidence: 99%
“…10 Secret merchant-4 (SM4) [11][12][13][14][15][16][17][18][19][20] and advanced encryption standard (AES) cryptographic algorithms 5,6 are a type of symmetric block ciphers that are able to achieve fast encryption speeds and low hardware implementation costs. 4,[21][22][23][24][25] Unfortunately, both SM4 and AES cryptographic algorithms are pretty vulnerable to PAAs when they are implemented in hardware levels. 4,26 So as to reinforce the security levels of SM4 and AES cryptographic circuits against PAAs, a variety of countermeasures [27][28][29] have been proposed to break the critical correlation between the processed data and monitored power dissipation.…”
Section: Introductionmentioning
confidence: 99%
“…In contrast, digest cryptographic algorithms such as message digest‐5 (MD5), 1 SM3, 4 secure hash algorithm‐1 (SHA1), 7 SHA2, 3 and SHA3 2 typically utilize hash functions to build one‐to‐one relationships from the input data to the output data. Unlike asymmetric cryptographic algorithms and digest cryptographic algorithms, symmetric cryptographic algorithms 8–10 can be used for encrypting/decrypting a large number of private data efficiently since the same secret key is presented during the encryption/decryption process.…”
Section: Introductionmentioning
confidence: 99%
“…Software‐implemented RC4 cryptographic algorithm is widely applied in the areas of network security and information security due to its low computational complexity, fast encryption speed, and high security against malicious attacks. However, when RC4 is implemented on hardware, its throughput is significantly lower than the corresponding throughput of hardware‐implemented block ciphers such as advanced encryption standard (AES), 11 data encryption standard (DES), 9 and SM4 4 . Moreover, the latency of RC4 is pretty high 19,20 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In other words, chaotic systems have been used as an entropy source and this entropy source has been transformed into cryptographic primitives such as image encryption schema [2,5,6,7,8], hash functions [9,10], s-box designs [11,12] and key generators with the help of a protocol [13][14][15][16][17]. Again, random numbers and bits have been generated with FPGA using chaos-based maps in studies in the literature [18][19][20].…”
Section: Introductionmentioning
confidence: 99%