Cargando…
A secure key dependent dynamic substitution method for symmetric cryptosystems
The biggest challenge for symmetric cryptosystems is to replace their static substitution with dynamic substitution, because static substitution S-boxes make the symmetric block ciphers more vulnerable to attacks. Previous well-known dynamic key-dependent S-boxes are lacking in dynamicity and do not...
Autores principales: | Ejaz, Aisha, Shoukat, Ijaz Ali, Iqbal, Umer, Rauf, Abdul, Kanwal, Afshan |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8323725/ https://www.ncbi.nlm.nih.gov/pubmed/34395857 http://dx.doi.org/10.7717/peerj-cs.587 |
Ejemplares similares
-
Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
por: Seyhan, Kübra, et al.
Publicado: (2023) -
A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map
por: Ali, Asim, et al.
Publicado: (2022) -
A new secure authentication based distance bounding protocol
por: Sultan, Ahmed Raheeq, et al.
Publicado: (2021) -
A comprehensive review of security threats and solutions for the online social networks industry
por: Nawaz, Naeem A., et al.
Publicado: (2023) -
Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective
por: Kapil, Gayatri, et al.
Publicado: (2020)