Generating Highly Nonlinear S-Boxes Using a Hybrid Approach With Particle Swarm Optimization DOI
Mohammad Shadab, Md Saquib Jawed, Mohammad Sajid

и другие.

Advances in computer and electrical engineering book series, Год журнала: 2024, Номер unknown, С. 1 - 30

Опубликована: Дек. 6, 2024

A substitution box (S-box) is a fundamental component in cryptographic algorithms that enhance data security by providing complex mapping between input and output values. S-box strengthens the encryption decryption process introducing nonlinearity protecting encrypted against various differential linear cryptanalytic attacks. The problem of generating an with optimal properties challenging falls under category NP-Hard problems. This study proposes hybrid approach combining Particle Swarm optimization algorithm (PSO) Booster to construct highly nonlinear low computational efforts. PSO algorithm, assisted Transfer function Random Key (RK), utilized navigate large permutation search space find acceptable properties. works based on random applications local operators for shuffling elements each other transforming elements' arrangement, resulting modified increased nonlinearity.

Язык: Английский

Enhancing solar irradiance prediction for sustainable energy solutions employing a hybrid machine learning model; improving hydrogen production through Photoelectrochemical device DOI

Yandi Zhang

Applied Energy, Год журнала: 2025, Номер 382, С. 125280 - 125280

Опубликована: Янв. 13, 2025

Язык: Английский

Процитировано

2

CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture DOI
Md Saquib Jawed, Mohammad Sajid

The Journal of Supercomputing, Год журнала: 2024, Номер 80(11), С. 15834 - 15867

Опубликована: Апрель 6, 2024

Язык: Английский

Процитировано

4

Substitution Box Construction Using Transfer‐Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach DOI
Mohammad Shadab, Md Saquib Jawed, Mohammad Sajid

и другие.

Security and Privacy, Год журнала: 2024, Номер unknown

Опубликована: Сен. 26, 2024

ABSTRACT S‐box strengthens the encryption and decryption process by introducing nonlinearity protecting encrypted data against various differential linear cryptanalytic attacks. Generating a highly nonlinear with maximal is computationally impractical due to expansive search space, classifying it as an NP‐hard problem. This paper proposes Hawkboost algorithm, novel hybrid method merging Harris Hawks optimization algorithm (HHO) Booster for generating S‐boxes low computational efforts. The HHO utilized navigate in large permutation space find acceptable cryptographic properties. assisted Transfer function Random Key (RK) speed up design process. Additionally, enhances applying random local operators like swap inversion, effectively reshaping elements of S‐box. combination methodologies facilitates efficient generation that exhibit excellent properties while addressing key challenges optimization. performance proposed has been analyzed comparing state‐of‐the‐art based on numerous characteristics including average nonlinearity, strict Avalanche criterion (SAC), SAC offset, bit independence (BIC), approximation probability (LP), (DP), fixed points, opposite cycle counts. results from experiments analysis multiple metrics show satisfies all requirements safe reliable without sacrificing any crucial security features.

Язык: Английский

Процитировано

4

A novel approach for code coverage testing using hybrid metaheuristic algorithm DOI
Fatma Ahsan, Faisal Anwer

International Journal of Information Technology, Год журнала: 2024, Номер 16(6), С. 3691 - 3701

Опубликована: Июнь 22, 2024

Язык: Английский

Процитировано

3

LightAgriCrypt: A Novel Lightweight Stream Cipher for Enhancing Security in Smart Agriculture Systems DOI
Shahnwaz Afzal, Mohammad Ubaidullah Bokhari

Security and Privacy, Год журнала: 2025, Номер 8(3)

Опубликована: Апрель 17, 2025

ABSTRACT The agriculture industry has embraced recent technological advancements to ensure sustainable farming methods, increase resource efficiency, and boost productivity. Nonetheless, merging these technologies raised new security concerns, particularly protecting personal data preserving device communication integrity. We propose a lightweight stream cipher address challenges facilitate secure in smart environments. innovation lies the key‐generating block, which utilizes 128‐bit key 64‐bit Initialization Vector (IV) produce an 80‐bit keystream through iterative round functions. This process involves integration of dynamic nonlinear logic module robust state update mechanism, ensuring high entropy resistance against cryptanalytic attacks. In second phase, is initialized feedback shift register (NLFSR), where it undergoes additional transformations using specialized filter output functions generate final encryption keystream. two‐phase design not only ensures but also adapts effectively constraints systems. Comprehensive comparative evaluations demonstrate that proposed outperforms state‐of‐the‐art ciphers multiple benchmarks, such as Grain v1, Grain‐128, Trivium, Logic. suggested achieves higher throughput, ideal Shannon values, faster decryption times. It exhibits robustness with near‐zero correlation coefficients, passes all 16 NIST randomness tests, efficient memory usage, low power consumption, strong cryptographic makes solution tailored unique needs

Язык: Английский

Процитировано

0

Payment Security Expert: Analyzing Smart Cards and Contactless Payments with Cryptographic Techniques DOI

R. Yuvarani,

R Mahaveerakannan

Опубликована: Июль 10, 2024

Язык: Английский

Процитировано

2

A Swarm Intelligence-based Faster and Secure Algorithm for Improved Industrial IoT-Cloud Computing Communication DOI
Md Saquib Jawed, Mohammad Sajid

Опубликована: Янв. 28, 2024

The Industrial Internet of Things (IIoT) is receiving greater attention as it strives to capitalize on significant potential in the Industry 4.0 landscape. IIoT has asserted its dominance worldwide market by introducing many products almost every industry. Significant hurdles emerge data privacy and security when comes serving a huge number requests for automated real-world collection monitoring across industrial applications within purview IIoT. This paper presents Harris Hawks Optimization (HHO) based cryptographic algorithm incorporated with feature selection faster secure communication between cloud computing. main idea behind strategically encrypt sensitive portion request rather than encrypting whole created sending processing. To evaluate performance proposed algorithm, three parameters, fitness key, encryption time, decryption are computed through application two different datasets. HHObased key compared against other swarm intelligence algorithms, such Grey Wolf Optimizer (GWO), Salp Swarm Algorithm (SSA), Particle (PSO). Encryption times selection. experimental results validate robustness efficiency algorithm.

Язык: Английский

Процитировано

1

ChaosForge: a lightweight stream cipher fusion of chaotic dynamics and NLFSRs for secure IoT communication DOI
Mohammad Ubaidullah Bokhari, Shahnwaz Afzal, Gaurav Yadav

и другие.

International Journal of Information Technology, Год журнала: 2024, Номер unknown

Опубликована: Июль 29, 2024

Язык: Английский

Процитировано

1

Securing Payment Transactions: A Comprehensive Review of Smart Cards and Contactless Payments with Cryptographic Methods DOI

Yatri Patel,

Niti Chovatia,

Hargeet Kaur

и другие.

2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), Год журнала: 2024, Номер unknown, С. 785 - 790

Опубликована: Фев. 28, 2024

In today's fast, advanced and tech-oriented world, human life has been simplified upgraded at a much higher level which with time will increase great spectrum. According to the report, smart card market is projected experience growth rate (CAGR) of 7.33% by 2033. Payment systems have evolved lot from we are about discuss security payment transactions using cards. A chip comprising CPU, RAM ROM for storage purposes. This concept plastic an embedded was first patented in 1968 two German inventors, Jurgen Dethloff Helmut Grottrup. Motorola Bull developed microchips 1977. Due its ability provide more secured authenticated transaction cards fit use contactless payments as compared barcodes or machine-readable stripes. Smart find utility scenarios demanding heightened authentication contrast alternative data stores such magnetic The passwords, confidential public cryptographic keys encryption decryption etc. It performs personal identification collecting information. involves biometric information like fingerprint scans, iris scans images. second digital currency. Electronic cash debited purchase cardholder must pay "real" money complete it. Personal (excluding information), certain stores, medical history travel history. One most crucial factors success that they secure, transferable can maintain integrity then stored on card. this article examine systems, considering threats different attacks system protect against. Our review focused importance trust, measures technologies govern how occur NFC-enabled mobile wallets. We also investigate EMV ISO standards highlight their limitations improving privacy payments. These conflicts problematic because adversaries them weaken free connections

Язык: Английский

Процитировано

0

Design and analysis of key scheduling algorithm for symmetric cipher security DOI
Vikas Tiwari,

U. Surya Kameswari,

Ajeet Singh

и другие.

International Journal of Information Technology, Год журнала: 2024, Номер 16(6), С. 3991 - 3997

Опубликована: Июнь 7, 2024

Язык: Английский

Процитировано

0