2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) 2016
DOI: 10.1109/iceeot.2016.7754809
|View full text |Cite
|
Sign up to set email alerts
|

Design of chaotic neural network based method for cryptographic substitution box

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Other uses for Chaos NNs is pseudo random number generations using a peice wise linear chaotic map [165,166]. Besides using chaotic maps for pseudo random generation, it is also being used in research in conjunction with S-boxes in order to improve upon public key cryptography [167,168], while encryption via NNs may be possible, a comparison with AES shows it provides better performance at the cost of security for larger files [169]. -Genetic Algorithms: Genetic algorithms are heuristics based of the theory of evolution where the best performing individuals will be used to create the next generation of individuals for further optimization in the hopes to converge to an optimization.…”
Section: -Neural Physically Unclonable Function (Puf)mentioning
confidence: 99%
“…Other uses for Chaos NNs is pseudo random number generations using a peice wise linear chaotic map [165,166]. Besides using chaotic maps for pseudo random generation, it is also being used in research in conjunction with S-boxes in order to improve upon public key cryptography [167,168], while encryption via NNs may be possible, a comparison with AES shows it provides better performance at the cost of security for larger files [169]. -Genetic Algorithms: Genetic algorithms are heuristics based of the theory of evolution where the best performing individuals will be used to create the next generation of individuals for further optimization in the hopes to converge to an optimization.…”
Section: -Neural Physically Unclonable Function (Puf)mentioning
confidence: 99%
“…The group G 5 =<x: x 32 =1> of order 32 with only one generator, that is, x:= (27,24,28,21,3,11,5,25,17,9,23,26,8,12,18,20,7,30,22,14,19,29,15,6,1,10,4,2,32,31,13,16); acts naturally on the index set I Ωi of A 1 that is, 5×5 S-box from chaos-based search. This action can be defined as:…”
Section: B Proposed Group Structures and Actionsmentioning
confidence: 99%
“…The successes of AES block cipher and its S-box is mainly responsible for the progress and development of proposals devoted to the creation of S-boxes [22]. All of them are balanced and whose designs are primarily based on concepts such as algebraic techniques, optimization, chaotic maps and systems, etc, [23][24][25][26][27][28][29][30]. Lambić proposed a simple search methodology for yielding S-boxes which is based on chaotic system and composition methods in [31].…”
Section: Introductionmentioning
confidence: 99%
“…A mathematical operation named as Determinant Rotation is introduced by [49] to produce different s-boxes for each round of AES. Ahmad and Malik [50] proposed the chaosbased neural network with four layers; input layer with eight neurons, two hidden layers with four neurons, two neurons respectively and output layer with one neuron. The sequence of the corresponding multiplicative inverse in GF(2 8 ) and artificial neural network with seven perceptron neurons in three layers operations are synthesized to generate an s-box [51].…”
Section: Related Workmentioning
confidence: 99%