Develo** a secure image encryption technique using a novel S-box constructed through real-coded genetic algorithm's crossover and mutation operators
D Ustun, S Sahinkaya, N Atli - Expert Systems with Applications, 2024 - Elsevier
The objective of this study is to craft a novel S-Box tailored to stringent security standards,
achieved through iterative application of crossover and mutation operators inherent to real …
achieved through iterative application of crossover and mutation operators inherent to real …
A novel algorithm based on DNA coding for substitution box generation problem
F Artuğer - Neural Computing and Applications, 2024 - Springer
Substitution boxes are very important for cryptographic structures. But getting an 8-bit strong
s-box is a difficult problem. To address this problem, a new approach is proposed in this …
s-box is a difficult problem. To address this problem, a new approach is proposed in this …
Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main
aim of this paper is how to increase the security level of the blockchain based on the …
aim of this paper is how to increase the security level of the blockchain based on the …
Chaos and cellular automata-based substitution box and its application in cryptography
Substitution boxes are the key factor in symmetric-key cryptosystems that determines their
ability to resist various cryptanalytic attacks. Creating strong substitution boxes that have …
ability to resist various cryptanalytic attacks. Creating strong substitution boxes that have …
A strong hybrid S-box scheme based on chaos, 2D cellular automata and algebraic structure
Substitution-boxes are the main deciding components in symmetric-key cryptosystems for
resisting many cryptanalytic attacks. It has been a challenging task for the designers to …
resisting many cryptanalytic attacks. It has been a challenging task for the designers to …
Fuzzy logic-based substitution-box for robust medical image encryption in telemedicine
Due to privacy and sensitivity of the medical images, the creation of strong medical image
encryption schemes has gained the attention of cryptographers. In this study, a robust …
encryption schemes has gained the attention of cryptographers. In this study, a robust …
Strong s-box construction approach based on Josephus problem
F Artuğer - Soft Computing, 2024 - Springer
There are two basic requirements for symmetric encryption algorithms. The first of these is
diffusion. The second and most important is confusion. In these algorithms, this requirement …
diffusion. The second and most important is confusion. In these algorithms, this requirement …
A novel secure S-box design methodology based on FPGA and SHA-256 hash algorithm for block cipher algorithms
In this study, a novel robust design methodology that successfully meets the performance
and security criteria for substitution-boxes (s-boxes), critical component in block cipher …
and security criteria for substitution-boxes (s-boxes), critical component in block cipher …
Provably secure color image encryption algorithm based on FO 4D-HCS and ACM
Digital image security has become a major concern due to open networks and Internet data
sharing. Many image encryption algorithms have been introduced recently for securely …
sharing. Many image encryption algorithms have been introduced recently for securely …
[HTML][HTML] Symmetry analysis in construction two dynamic lightweight s-boxes based on the 2d tinkerbell map and the 2d duffing map
AT Khudhair, AT Maolood, EK Gbashi - Symmetry, 2024 - mdpi.com
The lack of an S-Box in some lightweight cryptography algorithms, like Speck and Tiny
Encryption Algorithm, or the presence of a fixed S-Box in others, like Advanced Encryption …
Encryption Algorithm, or the presence of a fixed S-Box in others, like Advanced Encryption …