Proceedings of the Twenty-Second National Radio Science Conference, 2005. NRSC 2005. 2005
DOI: 10.1109/nrsc.2005.194031
|View full text |Cite
|
Sign up to set email alerts
|

A novel approach for designing the s-box of advanced encryption standard algorithm (AES) using chaotic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Many efforts were emulated to redesign, reconstruct or renew the design and implementation of the S-box, as in [5], [6]. In the RA, two modifications are done for obtaining the MRA, the first modification is performed in the S-box methodology and the second modification is performed in the cipher key expansion process.…”
Section: A Proposed Methodology For Designing Small S-boxesmentioning
confidence: 99%
“…Many efforts were emulated to redesign, reconstruct or renew the design and implementation of the S-box, as in [5], [6]. In the RA, two modifications are done for obtaining the MRA, the first modification is performed in the S-box methodology and the second modification is performed in the cipher key expansion process.…”
Section: A Proposed Methodology For Designing Small S-boxesmentioning
confidence: 99%
“… Reconstruct the S-box every execution time decrease the system efficiency and complicates the hardware implementations [2,3,8].  Repetitive security evaluation: When a new S-box generated then it need to be tested upon different types of attacks.…”
Section: Key Dependant Aesmentioning
confidence: 99%
“…Each output word from the (CCS-PRBG2) is compared with the contents of the chaotic key-dependent S-box in a sequence row by row until the construction of the 16 x 16 S-box is completed. Repeated words generated from the second (CCS-PRBG2) are discarded [8].…”
Section: Pseudorandom S-box Generation Using Chaotic Algorithmmentioning
confidence: 99%
“…F(x,y),F(x,y) Є{0,.., L− 1} are the different samples of F , F′ .We will define HL(F) as the number of occurrence for each sample L in the original (plaintext), and HL(F') as the number of occurrence for each sample L in the (ciphertext). The encryption quality represents the average number of changes to each sample and it can be expressed mathematically as Following Table (8) gives results of Encryption quality of AES and its comparison with AES-VMS. From the results we can conclude that the modification to AES will not affect the Encryption Quality of the cipher in any way.…”
Section: Measurement Of Encryption Qualitymentioning
confidence: 99%