Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A review of cryptographic properties of S-boxes with generation and analysis of crypto secure S-boxes.

View through CrossRef
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance in modern cryptography. In this paper, a detailed review of cryptographic properties of S-boxes has been illustrated. The generation of crypto S-boxes with 4-bit as well as 8-bit Boolean functions (BFs) and Polynomials over Galois field GF(p q ) has also been of keen interest of this paper. The detailed analysis and comparisonof generated 4-bit and 8-bit S-boxes with 4-bit as well as 8-bit S-boxes of Data Encryption Standard (DES) and Advance Encryption Standard (AES) respectively, has incorporated with example. Detailed analysis of generated S-boxes claims a better result than DES and AES in view of security of crypto S-boxes.
Title: A review of cryptographic properties of S-boxes with generation and analysis of crypto secure S-boxes.
Description:
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat.
Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance in modern cryptography.
In this paper, a detailed review of cryptographic properties of S-boxes has been illustrated.
The generation of crypto S-boxes with 4-bit as well as 8-bit Boolean functions (BFs) and Polynomials over Galois field GF(p q ) has also been of keen interest of this paper.
The detailed analysis and comparisonof generated 4-bit and 8-bit S-boxes with 4-bit as well as 8-bit S-boxes of Data Encryption Standard (DES) and Advance Encryption Standard (AES) respectively, has incorporated with example.
Detailed analysis of generated S-boxes claims a better result than DES and AES in view of security of crypto S-boxes.

Related Results

Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Factorial number system for nonlinear substitutions generation
Factorial number system for nonlinear substitutions generation
Modern cryptographic applications use cryptographic algorithms with a symmetric key. They provide high conversion rates and resistance to crypto-graphic attacks. To complicate the ...
Handling Of Crypto Assets As Evidence In Criminal Cases
Handling Of Crypto Assets As Evidence In Criminal Cases
The increasing number of users and transactions of crypto assets every year has the potential to increase the modus operandi of criminal acts that use crypto assets, either as a to...
Testing multichambered bat box designs in a habitat-offset area in eastern Australia: influence of material, colour, size and box host
Testing multichambered bat box designs in a habitat-offset area in eastern Australia: influence of material, colour, size and box host
Bat boxes are frequently used as conservation and habitat-offset measures, yet their effectiveness is equivocal, particularly in Australia. Boxes used in Australia are largely volu...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...
Behaviour of Silver Foxes in Traditional Breeding Boxes and in Boxes With an Entrance Tunnel
Behaviour of Silver Foxes in Traditional Breeding Boxes and in Boxes With an Entrance Tunnel
AbstractThe periparturient behaviour of silver-fox females inside traditional and modified breeding boxes was video-recorded. The behaviour was analysed from 24 hours before partur...
Using nest-boxes in pine stands of the Augustów Forest
Using nest-boxes in pine stands of the Augustów Forest
Abstract In 2011–2014, the occupancy of nest-boxes by secondary hole-nesting birds and their breeding success was investigated in pine stands of the Augustów Forest ...

Back to Top