Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking

نویسندگان

چکیده

A substitution box (S-Box) is a crucial component of contemporary cryptosystems that provide data protection in block ciphers. At the moment, chaotic maps are being created and extensively used to generate these S-Boxes as map assists providing disorder resistance combat cryptanalytical attempts. In this paper, construction dynamic S-Box using cipher key proposed novel an innovative tweaking approach. The projected tweak approach presented for first time use parameters their working makes both nature. employs cubic polynomials while permuting values initial enhance its cryptographic fort. Values provided small variation results completely different unique S-Box. Comparative analysis exploration confirmed exhibits significant amount complexity. security assessment terms bijectivity, nonlinearity, bits independence, strict avalanche, linear approximation probability, differential probability criteria utilized critically investigate effectiveness against several assaults. S-Box’s performance comparable those recently adaption real-world applications. comparative scrutiny pacifies genuine potential applicability security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Color Image Encryption using 3D Chaotic Map with AES key Dependent S-Box

Techniques in encrypting digital images play a crucial role in the prevention of unauthorized access. This paper focuses on color image encryption and decryption using 3D chaotic map with AES key dependent S-Boxes. It contains four major parts which are Exclusive X-or forward and backward, 3D Logistic Map, 3D Chebyshev map, and 2D Arnold Cat Map, and Dynamic S-box of AES. Here, Exclusive X-or i...

متن کامل

Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Encryption is primary method of protecting valuable electronic information transmitted over the networks. SSL/TLS can help to secure transmitted data using various encryption algorithms. AES is one of ciphering algorithm which is used for encryptio...

متن کامل

A New Chaotic System with Multiple Attractors: Dynamic Analysis, Circuit Realization and S-Box Design

Qiang Lai 1,∗ ID , Akif Akgul 2, Chunbiao Li 3, Guanghui Xu 4 and Ünal Çavuşoğlu 5 1 School of Electrical and Automation Engineering, East China Jiaotong University, Nanchang 330013, China 2 Department of Electrical and Electronics Engineering, Faculty of Technology, Sakarya University, Serdivan 54187, Turkey; [email protected] 3 School of Electronic and Information Engineering, Nanjing Uni...

متن کامل

On the Enlargement of Robust Region of Chaotic Tent Map for the Use in Key Based Substitution-Box (S-Box)

Corresponding Author: Muhammad Asif Khan Department of Electrical and Electronics Engineering, Universiti Teknologi PETRONAS, Darul Ridzuan, 31750 Perak, Malaysia Email: [email protected] Abstract: Robust chaotic maps with wide robust region are favored in cryptography as it extends the key length. Chaotic tent map has robust chaos for control parameter μ = 2. Perturbation of control parameter v...

متن کامل

A novel digital communication system using chaotic map

A technique for exploiting deterministic chaos through Logistic Map (with DC component) and a Cubic Map (with no DC component) in a new digital communication has been proposed and demonstrated in presence of additive white Gaussian noise (AWGN) by Monte Carlo simulations. Biterror (BER) graphs were computed in order to compare the performance of the different modulation schemes. The best perfor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2023

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2023.037516