Cryptanalysis of hyperchaotic S-box generation and image encryption DOI Creative Commons
Mohammad Mazyad Hazzazi,

Gulraiz,

Rashad Ali

и другие.

AIMS Mathematics, Год журнала: 2024, Номер 9(12), С. 36116 - 36139

Опубликована: Янв. 1, 2024

<p>Cryptography serves as the cornerstone for safe communication and data security in today's digital environment. Because they feature substitution boxes, substitution-permutation networks (SPNs) are crucial cryptographic algorithms such popular Advanced Encryption Standard (AES). The structure properties of S-boxes have a significant impact on overall systems. This article aims to improve through unique S-box construction methodologies. proposed features by employing chaotic maps Galois fields, which go beyond traditional design approaches. were analyzed weaknesses removed strong candidate S-boxes. efficiency increasing resilience is thoroughly explored thereby taking nonlinearity, strict avalanche requirements, bit independence constraints, linear approximation, differential approximation into account. dynamic average scores criteria(SAC), nonlinearity Bit Independence Criteria (BIC Nonlinearity), SAC SAC), Linear Approximation Probability (LAP) Differential (DAP) 111.1025, 111.1022, 0.5014, 0.5024, 111.1082, 111.0964, 0.5022, 0.0726, 0.0729 0.0214, 0.0219, respectively. Furthermore, given prevalence images modern storage, this work studies seamless incorporation advanced image encryption With its thorough research, paper contributes current discussion providing theoretical understandings practical solutions an era rising cyber dangers ubiquitous connectivity.</p>

Язык: Английский

Extended fractional transformation based S-box and applications in medical image encryption DOI
Javed Ali, Muhammad Kamran Jamil, Rashad Ali

и другие.

Multimedia Tools and Applications, Год журнала: 2025, Номер unknown

Опубликована: Янв. 4, 2025

Язык: Английский

Процитировано

3

Secure S-box construction with 1D chaotic maps and finite field theory for block cipher encryption DOI
Sajjad Shaukat Jamal, Rashad Ali, Muhammad Kamran Jamil

и другие.

Alexandria Engineering Journal, Год журнала: 2025, Номер 125, С. 278 - 296

Опубликована: Апрель 16, 2025

Язык: Английский

Процитировано

1

Dynamic behavior of multi-dimensional chaotic systems based on state variables and unknown parameters with applications in image encryption DOI
Jingfeng Jie,

Ping Zhang,

Yang Yang

и другие.

Physica Scripta, Год журнала: 2025, Номер 100(2), С. 025222 - 025222

Опубликована: Янв. 14, 2025

Abstract To explore the impact of unknown terms and parameters on chaotic characteristics in systems, this paper examines effects state variables parameters. The study focuses different combinations linear, nonlinear, constant It primarily investigates role multi-order their application to system models varying dimensions. Firstly, by simulating a three-dimensional system, analyzes how nonlinear initial conditions affect system's behavior. Secondly, it evaluates four-dimensional combining with parameters, using tools such as Lyapunov index diagrams, sample entropy, dynamic trajectory plots. Finally, integrates constructed mapping develop two-level key image encryption thoroughly assessing its security resistance interference.

Язык: Английский

Процитировано

0

Exploring three periodic point dynamics in $ 2 $D spatiotemporal discrete systems DOI Creative Commons
Mohamed Lamine Sahari, Abdel-Kaddous Taha,

Louis Randriamihamison

и другие.

AIMS Mathematics, Год журнала: 2025, Номер 10(3), С. 5021 - 5051

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

Batch generated strongly nonlinear S-Boxes using enhanced quadratic maps DOI Creative Commons
Mohammad Mazyad Hazzazi,

F. Azam,

Rashad Ali

и другие.

AIMS Mathematics, Год журнала: 2025, Номер 10(3), С. 5671 - 5695

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme DOI Open Access
Souad Baowidan, Ahmed Alamer,

M. Taimoor Hassan

и другие.

Symmetry, Год журнала: 2024, Номер 16(8), С. 954 - 954

Опубликована: Июль 25, 2024

Data security is one of the biggest concerns in modern world due to advancements technology, and cryptography ensures that privacy, integrity, authenticity such information are safeguarded today’s digitally connected world. In this article, we introduce a new technique for construction non-linear components block ciphers. The proposed S-box generation process transformational procedure through which elements finite field mapped onto highly nonlinear permutations. This transformation achieved series algebraic combinatorial operations. It involves group actions on some pairs two Galois fields create an initial Pr Sbox, induces rich structure. post Po derived from heuristic group-based optimization, leads high nonlinearity other important cryptographic parameters. demonstrates resilience against various attacks, making system resistant statistical vulnerabilities. investigation reveals remarkable attributes, including score 112, average Strict Avalanche Criterion 0.504, LAP (Linear Approximation Probability) 0.062, surpassing well-established S-boxes exhibit desired properties. novel methodology suggests encouraging approach enhancing framework addition, also three-step image encryption comprising Row Permutation, Bitwise XOR, block-wise substitution using Sbox. These operations contribute adding more levels randomness, improves dispersion across cipher makes it equally intense. Therefore, were able establish works mitigate cryptanalytic attacks. PSNR, UACI, MSE, NCC, AD, SC, MD, NAE data comparisons with existing methods provided prove efficiency algorithm.

Язык: Английский

Процитировано

2

AES S-box modification uses affine matrices exploration for increased S-box strength DOI

Fmipa Ilkom Alamsyah,

Abas Setiawan, Anggyi Trisnawan Putra

и другие.

Nonlinear Dynamics, Год журнала: 2024, Номер unknown

Опубликована: Окт. 8, 2024

Язык: Английский

Процитировано

1

Cryptanalysis of hyperchaotic S-box generation and image encryption DOI Creative Commons
Mohammad Mazyad Hazzazi,

Gulraiz,

Rashad Ali

и другие.

AIMS Mathematics, Год журнала: 2024, Номер 9(12), С. 36116 - 36139

Опубликована: Янв. 1, 2024

<p>Cryptography serves as the cornerstone for safe communication and data security in today's digital environment. Because they feature substitution boxes, substitution-permutation networks (SPNs) are crucial cryptographic algorithms such popular Advanced Encryption Standard (AES). The structure properties of S-boxes have a significant impact on overall systems. This article aims to improve through unique S-box construction methodologies. proposed features by employing chaotic maps Galois fields, which go beyond traditional design approaches. were analyzed weaknesses removed strong candidate S-boxes. efficiency increasing resilience is thoroughly explored thereby taking nonlinearity, strict avalanche requirements, bit independence constraints, linear approximation, differential approximation into account. dynamic average scores criteria(SAC), nonlinearity Bit Independence Criteria (BIC Nonlinearity), SAC SAC), Linear Approximation Probability (LAP) Differential (DAP) 111.1025, 111.1022, 0.5014, 0.5024, 111.1082, 111.0964, 0.5022, 0.0726, 0.0729 0.0214, 0.0219, respectively. Furthermore, given prevalence images modern storage, this work studies seamless incorporation advanced image encryption With its thorough research, paper contributes current discussion providing theoretical understandings practical solutions an era rising cyber dangers ubiquitous connectivity.</p>

Язык: Английский

Процитировано

1