2022
DOI: 10.1155/2022/8338508
|View full text |Cite
|
Sign up to set email alerts
|

Block Cipher’s Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight’s Tour Chain

Abstract: The protection of confidential information is a global issue, and block encryption algorithms are the most reliable option for securing data. The famous information theorist, Claude Shannon, has given two desirable characteristics that should exist in a strong cipher which are substitution and permutation in their fundamental research on “Communication Theory of Secrecy Systems.” block ciphers strictly follow the substitution and permutation principle in an iterative manner to generate a ciphertext. The actual… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 97 publications
0
8
0
Order By: Relevance
“…The results of the SAC analysis for the sample S-box are presented in Table 6. [27] 112 [44] 106 [28] 112 [46] 106 [29] 110 [47] 106 [9] 106 [48] 106 [38] 110 [49] 108 [39] 110 [50] 108 [40] 108 [51] 110…”
Section: ) Strict Avalanche Criteria(sac)mentioning
confidence: 99%
“…The results of the SAC analysis for the sample S-box are presented in Table 6. [27] 112 [44] 106 [28] 112 [46] 106 [29] 110 [47] 106 [9] 106 [48] 106 [38] 110 [49] 108 [39] 110 [50] 108 [40] 108 [51] 110…”
Section: ) Strict Avalanche Criteria(sac)mentioning
confidence: 99%
“…The variations of the Lyapunov exponent of the sine map are shown in Fig. 2(b) Study regarding the combinations of onedimensional chaotic maps shows that by introducing suitable combinations of such maps, the chaotic range can be enhanced [19]. In the next section, we discuss such combinations in detail.…”
Section: B the Sine Mapmentioning
confidence: 99%
“…Consequently, the study and analysis of chaos-based steganographic techniques have gained popularity in recent years. However, it has been observed that some chaos-based methods are vulnerable to statistical analysis because of the limited chaotic range of the used maps [16][17][18][19][20]. To overcome this issue, authors of [19] proposed a nonlinear combination of one-dimensional chaotic maps that enhances the chaotic range of the resulting system.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Security analysis demonstrated that the newly constructed S-Box is effective and defiant to the various threats in network security. An other work [16] identified various attacks over the cyber security products including Gröbner-based attacks, linear and differential attacks, SAT solver, XL-based attacks, interpolation attacks etc. The focus of the reported research was to design a novel algorithm for dynamic generation of S-Boxes which could defy the various algebraic structure-based and chaos-based cryptanalysis techniques.…”
Section: Introductionmentioning
confidence: 99%