Efficient and Simple Method for Designing Chaotic S-Boxes
نویسندگان
چکیده
منابع مشابه
A Novel Method for Designing S-Boxes Based on Chaotic Logistic Maps Using Cipher Key
Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. Substitution boxes (S-boxes) are keystone of modern symmetric cryptosystems. They bring nonlinearity to cryptosystems and strengthen their cryptographic security. The S-box component that used in classic AES is fixed. If we generate this S-box dynamically, the cryptographic strength of AES ciphe...
متن کاملA Guideline for Designing Cryptographic S-boxes
S-box’s provide the core non-linearity of block ciphers. An s-box must exhibit certain properties in order to support the overall security of a given block cipher. AES is one of the most widely used symmetric algorithms. With growing awareness of cryptographic backdoors, some organizations have expressed an interest in modifying their AES implementations in order to provide a private version of...
متن کاملSimple and Efficient Method for the Preparation of 5-Bromoisatins
Isatin, N-methyl isatin and N-benzylisatin were smoothly monobrominated in the 5-position by treatment with pyridinium bromochromate (PBC) in acetic acid medium. In the similar conditions indigo underwent bromination and oxidation to give 5-bromoisatin in high yield.
متن کاملDesigning S-boxes through Evolutionary Computation
Substitution boxes (S-boxes) are of major importance in cryptography as they are used to provide the property of confusion to the corresponding cryptosystem. Thus, a great amount of research is devoted to their study. In this contribution, a new methodology for designing strong S-boxes is studied and two Evolutionary Computation methods, the Particle Swarm Optimization and the Differential Evol...
متن کاملEfficient Masked S-Boxes Processing
To defeat side-channel attacks, the implementation of block cipher algorithms in embedded devices must include dedicated countermeasures. To this end, security designers usually apply secret sharing techniques and build masking schemes to securely operate an shared data. The popularity of this approach can be explained by the fact that it enables formal security proofs. The construction of mask...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ETRI Journal
سال: 2008
ISSN: 1225-6463
DOI: 10.4218/etrij.08.0207.0188