2019
DOI: 10.1631/fitee.1800434
|View full text |Cite
|
Sign up to set email alerts
|

Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field

Abstract: Elliptic curve cryptography (ECC) is used in many security systems due to its small key size and high security as compared to the other cryptosystems. In many well-known security systems substitution box (S-box) is the only non-linear component. Recently, it is shown that the security of a cryptosystem can be improved by using dynamic S-boxes instead of a static S-box. This fact necessitates the construction of new secure S-boxes. In this paper, we propose an efficient method for the generation of S-boxes base… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
57
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 47 publications
(57 citation statements)
references
References 35 publications
0
57
0
Order By: Relevance
“…It is clear from the table that the LAP of the proposed S-boxes is low, while their NL and AC are high enough to resist the linear attacks efficiently. Note that the average value of LAP of the proposed S-boxes is 0.1445 which is less than that of the S-boxes in [21,22,27,31], while their average NL and AC are 106 and 254 which are higher than that of [20,26,27,29,[31][32][33] and [28,30,31], respectively. This implies that the proposed method is capable of generating S-boxes with high security against linear attacks than some of the listed S-boxes.…”
Section: Linear Attacksmentioning
confidence: 83%
See 4 more Smart Citations
“…It is clear from the table that the LAP of the proposed S-boxes is low, while their NL and AC are high enough to resist the linear attacks efficiently. Note that the average value of LAP of the proposed S-boxes is 0.1445 which is less than that of the S-boxes in [21,22,27,31], while their average NL and AC are 106 and 254 which are higher than that of [20,26,27,29,[31][32][33] and [28,30,31], respectively. This implies that the proposed method is capable of generating S-boxes with high security against linear attacks than some of the listed S-boxes.…”
Section: Linear Attacksmentioning
confidence: 83%
“…Azam et al [22] defined three typical orderings namely natural N, diffusion D, and modulo diffusion M on a given EC for the generation of S-boxes. The main idea behind these ordering is the arrangement of the points with the samecoordinates.…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations