Efficient and Simple Method for Designing Chaotic S-Boxes

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Method for Designing S-Boxes Based on Chaotic Logistic Maps Using Cipher Key

Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. Substitution boxes (S-boxes) are keystone of modern symmetric cryptosystems. They bring nonlinearity to cryptosystems and strengthen their cryptographic security. The S-box component that used in classic AES is fixed. If we generate this S-box dynamically, the cryptographic strength of AES ciphe...

متن کامل

A Guideline for Designing Cryptographic S-boxes

S-box’s provide the core non-linearity of block ciphers. An s-box must exhibit certain properties in order to support the overall security of a given block cipher. AES is one of the most widely used symmetric algorithms. With growing awareness of cryptographic backdoors, some organizations have expressed an interest in modifying their AES implementations in order to provide a private version of...

متن کامل

Simple and Efficient Method for the Preparation of 5-Bromoisatins

Isatin, N-methyl isatin and N-benzylisatin were smoothly monobrominated in the 5-position by treatment with pyridinium bromochromate (PBC) in acetic acid medium. In the similar conditions indigo underwent bromination and oxidation to give 5-bromoisatin in high yield.

متن کامل

Designing S-boxes through Evolutionary Computation

Substitution boxes (S-boxes) are of major importance in cryptography as they are used to provide the property of confusion to the corresponding cryptosystem. Thus, a great amount of research is devoted to their study. In this contribution, a new methodology for designing strong S-boxes is studied and two Evolutionary Computation methods, the Particle Swarm Optimization and the Differential Evol...

متن کامل

Efficient Masked S-Boxes Processing

To defeat side-channel attacks, the implementation of block cipher algorithms in embedded devices must include dedicated countermeasures. To this end, security designers usually apply secret sharing techniques and build masking schemes to securely operate an shared data. The popularity of this approach can be explained by the fact that it enables formal security proofs. The construction of mask...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ETRI Journal

سال: 2008

ISSN: 1225-6463

DOI: 10.4218/etrij.08.0207.0188