Javascript must be enabled to continue!
A review of cryptographic properties of S-boxes with generation and analysis of crypto secure S-boxes.
View through CrossRef
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance in modern cryptography. In this paper, a detailed review of cryptographic properties of S-boxes has been illustrated. The generation of crypto S-boxes with 4-bit as well as 8-bit Boolean functions (BFs) and Polynomials over Galois field GF(p q ) has also been of keen interest of this paper. The detailed analysis and comparisonof generated 4-bit and 8-bit S-boxes with 4-bit as well as 8-bit S-boxes of Data Encryption Standard (DES) and Advance Encryption Standard (AES) respectively, has incorporated with example. Detailed analysis of generated S-boxes claims a better result than DES and AES in view of security of crypto S-boxes.
Title: A review of cryptographic properties of S-boxes with generation and analysis of crypto secure S-boxes.
Description:
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat.
Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance in modern cryptography.
In this paper, a detailed review of cryptographic properties of S-boxes has been illustrated.
The generation of crypto S-boxes with 4-bit as well as 8-bit Boolean functions (BFs) and Polynomials over Galois field GF(p q ) has also been of keen interest of this paper.
The detailed analysis and comparisonof generated 4-bit and 8-bit S-boxes with 4-bit as well as 8-bit S-boxes of Data Encryption Standard (DES) and Advance Encryption Standard (AES) respectively, has incorporated with example.
Detailed analysis of generated S-boxes claims a better result than DES and AES in view of security of crypto S-boxes.
Related Results
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Factorial number system for nonlinear substitutions generation
Factorial number system for nonlinear substitutions generation
Modern cryptographic applications use cryptographic algorithms with a symmetric key. They provide high conversion rates and resistance to crypto-graphic attacks. To complicate the ...
Handling Of Crypto Assets As Evidence In Criminal Cases
Handling Of Crypto Assets As Evidence In Criminal Cases
The increasing number of users and transactions of crypto assets every year has the potential to increase the modus operandi of criminal acts that use crypto assets, either as a to...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...
Study of Factors Influencing Consumer to Adopt Cryptocurrency
Study of Factors Influencing Consumer to Adopt Cryptocurrency
Cryptocurrencies have become one of the most traded financial assets in the last decade. The first half of 2022 will not be easily forgotten by the crypto faithful as it shifted in...
Next-generation cryptographic techniques for robust network security
Next-generation cryptographic techniques for robust network security
Cryptography is a key enabling tool in digital security that is needed to protect information, secure communication, and ensure the integrity between connected networks. As cyberse...
Behaviour of Silver Foxes in Traditional Breeding Boxes and in Boxes With an Entrance Tunnel
Behaviour of Silver Foxes in Traditional Breeding Boxes and in Boxes With an Entrance Tunnel
AbstractThe periparturient behaviour of silver-fox females inside traditional and modified breeding boxes was video-recorded. The behaviour was analysed from 24 hours before partur...

