2021
DOI: 10.1038/s41598-021-93344-z
|View full text |Cite
|
Sign up to set email alerts
|

Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging

Abstract: Block cipher has been a standout amongst the most reliable option by which data security is accomplished. Block cipher strength against various attacks relies on substitution boxes. In literature, extensively algebraic structures, and chaotic systems-based techniques are available to design the cryptographic substitution boxes. Although, algebraic and chaotic systems-based approaches have favorable characteristics for the design of substitution boxes, but on the other side researchers have also pointed weaknes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
1

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 149 publications
0
9
0
1
Order By: Relevance
“…Numerous structures exist to generate the outcomes for S-boxes with either traditional or modern chaos-based algorithms 37,38 , and many researchers have applied optimization methods, such as evolutionary algorithms [39][40][41] , to improve the chaos-based consequences for the confusion component. Although these methodologies to design the structures of S-boxes offer favorable characteristics, researchers have also pointed out the weaknesses of these approaches 42 . Many statistical attacks are available for the assembly of S-box designs, including linear and differential [43][44][45] , interpolation 46 , Grobner basis 47 , side-channel 48 , SAT solver 49 , XL 50 , and XSL 51 attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Numerous structures exist to generate the outcomes for S-boxes with either traditional or modern chaos-based algorithms 37,38 , and many researchers have applied optimization methods, such as evolutionary algorithms [39][40][41] , to improve the chaos-based consequences for the confusion component. Although these methodologies to design the structures of S-boxes offer favorable characteristics, researchers have also pointed out the weaknesses of these approaches 42 . Many statistical attacks are available for the assembly of S-box designs, including linear and differential [43][44][45] , interpolation 46 , Grobner basis 47 , side-channel 48 , SAT solver 49 , XL 50 , and XSL 51 attacks.…”
Section: Related Workmentioning
confidence: 99%
“…This approach is associated with linear regression analysis, which signifies the statistical method for modeling the relationship between dependent variables. To observe the relationship between the original and encrypted digital content, we performed an analysis between the pixel pairs in horizontal, diagonal, and vertical directions [36]- [37].…”
Section: Pixels' Correlation Analysismentioning
confidence: 99%
“…Information security is the protection of secret data from illegal access, disclosure, inspection, destruction, disruption, and modification. e protection of confidential information is a global issue and block encryption algorithms are the most reliable option [1]. Block cipher is a branch of deterministic algorithm that works on the static length of bits, which is called block.…”
Section: Introductionmentioning
confidence: 99%
“…e responsibility to create a randomized relation among ciphertext and the key is on the confusion component; also, the confusion component is totally responsible to provide resistance against the linear and differential attacks [1][2][3][4][5][6][7][8][9][10][11]. Block cipher's confusion component is generally known as substitution (S-box) which transforms k input bits into m output bits through S:{0,1} k ⟶{0,1} m , transforms vector z…”
Section: Introductionmentioning
confidence: 99%