A novel modular approach based substitution-box design for image encryption

AH Zahid, E Al-Solami, M Ahmad - IEEE Access, 2020 - ieeexplore.ieee.org
In modern-day block ciphers, the role of substitution-boxes is to transform the plaintext data
nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed …

A novel construction of efficient substitution-boxes using cubic fractional transformation

AH Zahid, MJ Arshad, M Ahmad - Entropy, 2019 - mdpi.com
A symmetric block cipher employing a substitution–permutation duo is an effective technique
for the provision of information security. For substitution, modern block ciphers use one or …

Efficient dynamic S-box generation using linear trigonometric transformation for security applications

AH Zahid, M Ahmad, A Alkhayyat, MT Hassan… - IEEE …, 2021 - ieeexplore.ieee.org
Protection of data transmitted over the network from illegal access is one of the major
challenges being posed by exponential growth of data in online digital communication …

[HTML][HTML] An innovative design of substitution-boxes using cubic polynomial map**

AH Zahid, MJ Arshad - Symmetry, 2019 - mdpi.com
In this paper, we propose to present a novel technique for designing cryptographically
strong substitution-boxes using cubic polynomial map**. The proposed cubic polynomial …

A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field

N Siddiqui, F Yousaf, F Murtaza, M Ehatisham-ul-Haq… - Plos one, 2020 - journals.plos.org
Cryptography is commonly used to secure communication and data transmission over
insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic …

A novel construction of dynamic S-box with high nonlinearity using heuristic evolution

AH Zahid, AM Iliyasu, M Ahmad, MMU Shaban… - IEEE …, 2021 - ieeexplore.ieee.org
For decades, the security and privacy of data are among the major challenges faced by
service providers dealing with public data. To cope with these challenges, most of the …

Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices

MSM Malik, MA Ali, MA Khan… - Ieee …, 2020 - ieeexplore.ieee.org
This work reports a novel chaos-based affine transformation generation method, which is
based on rotational matrices to design strong key-based S-boxes. Chaotic logistic map's …

Dynamic S-box design using a novel square polynomial transformation and permutation

AH Zahid, H Rashid, MMU Shaban, S Ahmad… - IEEE …, 2021 - ieeexplore.ieee.org
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of
security for the plaintext in the encryption phase and transforming the ciphertext on the …

Image encryption and analysis using dynamic AES

A Singh, P Agarwal, M Chand - 2019 5th international …, 2019 - ieeexplore.ieee.org
AES (Advanced Encryption Algorithm) is a block cipher, which is world wide implemented for
encryption of data. It has been accepted as a standard for data security since 2001. AES is a …

Security analysis of blowfish algorithm

A Alabaichi, F Ahmad… - 2013 Second International …, 2013 - ieeexplore.ieee.org
Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key
lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security …