2021
DOI: 10.1109/access.2021.3085861
|View full text |Cite
|
Sign up to set email alerts
|

Generating Cryptographic S-Boxes Using the Reinforcement Learning

Abstract: Substitution boxes (S-boxes) are essential components of many cryptographic primitives. The Dijkstra algorithm, SAT solvers, and heuristic methods have been used to find bitsliced implementations of S-boxes. However, it is difficult to apply these methods for 8-bit S-boxes because of their size. Therefore, in order to implement these S-boxes so that the countermeasure of side-channel attack can be applied efficiently, using structures such as Feistel, Lai-Massey, and MISTY that can be bitsliced implemented wit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 40 publications
0
4
0
Order By: Relevance
“…is crucial for IoT devices that rely on battery power. The incorporation of reinforcement learning into the domain of lightweight block ciphers is explored in a study conducted by Kim et al [23], which presents the concept of dynamic adaptability. The methodology employed by the researchers guarantees that the cryptographic system has the capability to dynamically modify its parameters in response to feedback, improving both its performance and security.…”
Section: Related Workmentioning
confidence: 99%
“…is crucial for IoT devices that rely on battery power. The incorporation of reinforcement learning into the domain of lightweight block ciphers is explored in a study conducted by Kim et al [23], which presents the concept of dynamic adaptability. The methodology employed by the researchers guarantees that the cryptographic system has the capability to dynamically modify its parameters in response to feedback, improving both its performance and security.…”
Section: Related Workmentioning
confidence: 99%
“…The fifth‐generation mobile communication technology (5G) recently became commercially available. [ 23 ] 5G features extremely low latency and a high data rate, which is required for Industry 4.0 [ 379 ] and future IoT applications. [ 380 ] A high data rate of a 5G network can supply IoT nodes with information about their mutual location, making beneficial directional wireless charging widely available and allowing for seamless switching between power sources.…”
Section: Prospects and Future Trendsmentioning
confidence: 99%
“…In "Deep Learning-Based Malware Detection Using Two-Dimensional Binary Program Features," Kim et al propose a novel approach that uses convolutional neural networks (CNNs) to extract two-dimensional binary program features from malware samples. The model achieves 99.2% accuracy in detecting both known and unknown malware samples [39].…”
Section: Deep Learning Techniquesmentioning
confidence: 99%