Advances in computer and electrical engineering book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 1 - 30
Published: Dec. 6, 2024
A
substitution
box
(S-box)
is
a
fundamental
component
in
cryptographic
algorithms
that
enhance
data
security
by
providing
complex
mapping
between
input
and
output
values.
S-box
strengthens
the
encryption
decryption
process
introducing
nonlinearity
protecting
encrypted
against
various
differential
linear
cryptanalytic
attacks.
The
problem
of
generating
an
with
optimal
properties
challenging
falls
under
category
NP-Hard
problems.
This
study
proposes
hybrid
approach
combining
Particle
Swarm
optimization
algorithm
(PSO)
Booster
to
construct
highly
nonlinear
low
computational
efforts.
PSO
algorithm,
assisted
Transfer
function
Random
Key
(RK),
utilized
navigate
large
permutation
search
space
find
acceptable
properties.
works
based
on
random
applications
local
operators
for
shuffling
elements
each
other
transforming
elements'
arrangement,
resulting
modified
increased
nonlinearity.
Security and Privacy,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Sept. 26, 2024
ABSTRACT
S‐box
strengthens
the
encryption
and
decryption
process
by
introducing
nonlinearity
protecting
encrypted
data
against
various
differential
linear
cryptanalytic
attacks.
Generating
a
highly
nonlinear
with
maximal
is
computationally
impractical
due
to
expansive
search
space,
classifying
it
as
an
NP‐hard
problem.
This
paper
proposes
Hawkboost
algorithm,
novel
hybrid
method
merging
Harris
Hawks
optimization
algorithm
(HHO)
Booster
for
generating
S‐boxes
low
computational
efforts.
The
HHO
utilized
navigate
in
large
permutation
space
find
acceptable
cryptographic
properties.
assisted
Transfer
function
Random
Key
(RK)
speed
up
design
process.
Additionally,
enhances
applying
random
local
operators
like
swap
inversion,
effectively
reshaping
elements
of
S‐box.
combination
methodologies
facilitates
efficient
generation
that
exhibit
excellent
properties
while
addressing
key
challenges
optimization.
performance
proposed
has
been
analyzed
comparing
state‐of‐the‐art
based
on
numerous
characteristics
including
average
nonlinearity,
strict
Avalanche
criterion
(SAC),
SAC
offset,
bit
independence
(BIC),
approximation
probability
(LP),
(DP),
fixed
points,
opposite
cycle
counts.
results
from
experiments
analysis
multiple
metrics
show
satisfies
all
requirements
safe
reliable
without
sacrificing
any
crucial
security
features.
Security and Privacy,
Journal Year:
2025,
Volume and Issue:
8(3)
Published: April 17, 2025
ABSTRACT
The
agriculture
industry
has
embraced
recent
technological
advancements
to
ensure
sustainable
farming
methods,
increase
resource
efficiency,
and
boost
productivity.
Nonetheless,
merging
these
technologies
raised
new
security
concerns,
particularly
protecting
personal
data
preserving
device
communication
integrity.
We
propose
a
lightweight
stream
cipher
address
challenges
facilitate
secure
in
smart
environments.
innovation
lies
the
key‐generating
block,
which
utilizes
128‐bit
key
64‐bit
Initialization
Vector
(IV)
produce
an
80‐bit
keystream
through
iterative
round
functions.
This
process
involves
integration
of
dynamic
nonlinear
logic
module
robust
state
update
mechanism,
ensuring
high
entropy
resistance
against
cryptanalytic
attacks.
In
second
phase,
is
initialized
feedback
shift
register
(NLFSR),
where
it
undergoes
additional
transformations
using
specialized
filter
output
functions
generate
final
encryption
keystream.
two‐phase
design
not
only
ensures
but
also
adapts
effectively
constraints
systems.
Comprehensive
comparative
evaluations
demonstrate
that
proposed
outperforms
state‐of‐the‐art
ciphers
multiple
benchmarks,
such
as
Grain
v1,
Grain‐128,
Trivium,
Logic.
suggested
achieves
higher
throughput,
ideal
Shannon
values,
faster
decryption
times.
It
exhibits
robustness
with
near‐zero
correlation
coefficients,
passes
all
16
NIST
randomness
tests,
efficient
memory
usage,
low
power
consumption,
strong
cryptographic
makes
solution
tailored
unique
needs
The
Industrial
Internet
of
Things
(IIoT)
is
receiving
greater
attention
as
it
strives
to
capitalize
on
significant
potential
in
the
Industry
4.0
landscape.
IIoT
has
asserted
its
dominance
worldwide
market
by
introducing
many
products
almost
every
industry.
Significant
hurdles
emerge
data
privacy
and
security
when
comes
serving
a
huge
number
requests
for
automated
real-world
collection
monitoring
across
industrial
applications
within
purview
IIoT.
This
paper
presents
Harris
Hawks
Optimization
(HHO)
based
cryptographic
algorithm
incorporated
with
feature
selection
faster
secure
communication
between
cloud
computing.
main
idea
behind
strategically
encrypt
sensitive
portion
request
rather
than
encrypting
whole
created
sending
processing.
To
evaluate
performance
proposed
algorithm,
three
parameters,
fitness
key,
encryption
time,
decryption
are
computed
through
application
two
different
datasets.
HHObased
key
compared
against
other
swarm
intelligence
algorithms,
such
Grey
Wolf
Optimizer
(GWO),
Salp
Swarm
Algorithm
(SSA),
Particle
(PSO).
Encryption
times
selection.
experimental
results
validate
robustness
efficiency
algorithm.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom),
Journal Year:
2024,
Volume and Issue:
unknown, P. 785 - 790
Published: Feb. 28, 2024
In
today's
fast,
advanced
and
tech-oriented
world,
human
life
has
been
simplified
upgraded
at
a
much
higher
level
which
with
time
will
increase
great
spectrum.
According
to
the
report,
smart
card
market
is
projected
experience
growth
rate
(CAGR)
of
7.33%
by
2033.
Payment
systems
have
evolved
lot
from
we
are
about
discuss
security
payment
transactions
using
cards.
A
chip
comprising
CPU,
RAM
ROM
for
storage
purposes.
This
concept
plastic
an
embedded
was
first
patented
in
1968
two
German
inventors,
Jurgen
Dethloff
Helmut
Grottrup.
Motorola
Bull
developed
microchips
1977.
Due
its
ability
provide
more
secured
authenticated
transaction
cards
fit
use
contactless
payments
as
compared
barcodes
or
machine-readable
stripes.
Smart
find
utility
scenarios
demanding
heightened
authentication
contrast
alternative
data
stores
such
magnetic
The
passwords,
confidential
public
cryptographic
keys
encryption
decryption
etc.
It
performs
personal
identification
collecting
information.
involves
biometric
information
like
fingerprint
scans,
iris
scans
images.
second
digital
currency.
Electronic
cash
debited
purchase
cardholder
must
pay
"real"
money
complete
it.
Personal
(excluding
information),
certain
stores,
medical
history
travel
history.
One
most
crucial
factors
success
that
they
secure,
transferable
can
maintain
integrity
then
stored
on
card.
this
article
examine
systems,
considering
threats
different
attacks
system
protect
against.
Our
review
focused
importance
trust,
measures
technologies
govern
how
occur
NFC-enabled
mobile
wallets.
We
also
investigate
EMV
ISO
standards
highlight
their
limitations
improving
privacy
payments.
These
conflicts
problematic
because
adversaries
them
weaken
free
connections