2022
DOI: 10.1016/j.jisa.2021.103065
|View full text |Cite
|
Sign up to set email alerts
|

A novel method to generate key-dependent s-boxes with identical algebraic properties

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 14 publications
0
11
0
2
Order By: Relevance
“…For the encryption process, the PSNR must be decreased, while the MSE and EQ must be increased and EQ must range between 528930 and 1587785. From this point, we note that the proposed method achieved better results and the EQ of [ 45 ] fewer than the appropriate value. Since the results of the proposed S-Box were better when compared with the other previous works, the encryption results will also be better when compared to the earlier works.…”
Section: Resultsmentioning
confidence: 77%
See 3 more Smart Citations
“…For the encryption process, the PSNR must be decreased, while the MSE and EQ must be increased and EQ must range between 528930 and 1587785. From this point, we note that the proposed method achieved better results and the EQ of [ 45 ] fewer than the appropriate value. Since the results of the proposed S-Box were better when compared with the other previous works, the encryption results will also be better when compared to the earlier works.…”
Section: Resultsmentioning
confidence: 77%
“…The range of AC should be between 0 and 1, with the best value being 0.5, which results in an S-Box satisfying the avalanche criterion. The avalanche of the transformation function for the S-Box can be obtained using the following equation [ 44 , 45 ]: …”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The resulted algorithm was analyzed and produced desired encryption strength results. On the other hand, other suggested enhanced s-box algorithms do not depend on a key or external parameter [11]. The initial s-box can be considered a starting point, and the succeeding sboxes all depend on the initial s-box, such as the APA s-box, S8 AES s-box [12], and Gray s-box [13].…”
Section: Introductionmentioning
confidence: 99%