Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms
The existing static cryptographic algorithms suffer from different performance and security challenges. These limitations are attributed to their fixed structure, where the substitution and diffusion primitives maintain the same values throughout the process. In this paper, we present a new framewor...
Saved in:
| Published in | Journal of information security and applications Vol. 76; p. 103514 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier Ltd
01.08.2023
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2214-2126 |
| DOI | 10.1016/j.jisa.2023.103514 |
Cover
| Abstract | The existing static cryptographic algorithms suffer from different performance and security challenges. These limitations are attributed to their fixed structure, where the substitution and diffusion primitives maintain the same values throughout the process. In this paper, we present a new framework of a dynamic binary diffusion matrix with flexible dimensions (n×n). The proposed solution replaces the static diffusion primitives, in existing symmetric and un-keyed cryptographic algorithms, with dynamic primitives. We define six different dynamic and flexible binary diffusion forms, four that are invertible, and two that are non-invertible, and hence, they could be used for different security services. However, using a single diffusion form does not always guarantee the required cryptographic properties. To that effect, we propose a binary multiplication scheme of a dynamic primary matrix and its transposed form, which yields the desired efficiency, and provides good resistance against recent implementation attacks, yet without degrading the system performance. We conduct security and performance analyses to validate the effectiveness of the proposed solution. The results confirm the cryptographic performance in terms of the linear branch number and the number of fixed points. In this context, the best-obtained branch number is 4 for n=8 and 5 for n=12 for the invertible forms, while for the non-invertible ones, the best branch number is 3 for n=8 and 4 for n=12. Moreover, in terms of the number of fixed points, the obtained numbers are very close to 0 for the invertible and non-invertible forms. |
|---|---|
| AbstractList | The existing static cryptographic algorithms suffer from different performance and security challenges. These limitations are attributed to their fixed structure, where the substitution and diffusion primitives maintain the same values throughout the process. In this paper, we present a new framework of a dynamic binary diffusion matrix with flexible dimensions (n×n). The proposed solution replaces the static diffusion primitives, in existing symmetric and un-keyed cryptographic algorithms, with dynamic primitives. We define six different dynamic and flexible binary diffusion forms, four that are invertible, and two that are non-invertible, and hence, they could be used for different security services. However, using a single diffusion form does not always guarantee the required cryptographic properties. To that effect, we propose a binary multiplication scheme of a dynamic primary matrix and its transposed form, which yields the desired efficiency, and provides good resistance against recent implementation attacks, yet without degrading the system performance. We conduct security and performance analyses to validate the effectiveness of the proposed solution. The results confirm the cryptographic performance in terms of the linear branch number and the number of fixed points. In this context, the best-obtained branch number is 4 for n=8 and 5 for n=12 for the invertible forms, while for the non-invertible ones, the best branch number is 3 for n=8 and 4 for n=12. Moreover, in terms of the number of fixed points, the obtained numbers are very close to 0 for the invertible and non-invertible forms. |
| ArticleNumber | 103514 |
| Author | Noura, Hassan N. Chehab, Ali Salman, Ola |
| Author_xml | – sequence: 1 givenname: Hassan N. orcidid: 0000-0002-2589-5053 surname: Noura fullname: Noura, Hassan N. email: hassan.noura@univ-fcomte.fr organization: Univ. Bourgogne Franche-Comté (UBFC), FEMTO-ST Institute, France – sequence: 2 givenname: Ola surname: Salman fullname: Salman, Ola organization: American University of Beirut, Electrical and Computer Engineering Department, Beirut 1107 2020, Lebanon – sequence: 3 givenname: Ali orcidid: 0000-0002-1939-2740 surname: Chehab fullname: Chehab, Ali organization: American University of Beirut, Electrical and Computer Engineering Department, Beirut 1107 2020, Lebanon |
| BookMark | eNp9kMtOwzAQRb0oEqX0B1j5B1Js59VIbFDFS6rEBtaWY8-0Do0d2S6if0-ismLR1eiO5ox0zw2ZOe-AkDvOVpzx6r5bdTaqlWAiHxd5yYsZmQvBi0xwUV2TZYwdY4wL3pQin5N-452GIVnvqEcKiFZbcIl-wSkzMIAzU2qtU-FEjUU8xum2VynYHxpTOOp0DBAp-kDNyaneaqrDaUh-F9SwH5M67Hywad_HW3KF6hBh-TcX5PP56WPzmm3fX942j9tM54ylrKpLA0VVt8CLdQMKwSDUqq2RY9OWpjCGNw3UoqxRqKYE1SJipXOlTM6LIl-Q9fmvDj7GACi1TWoqmYKyB8mZnGzJTk625GRLnm2NqPiHDsH2Y_nL0MMZgrHUt4Ug42RRg7EBdJLG20v4L17ajDQ |
| CitedBy_id | crossref_primary_10_3233_JIFS_236998 crossref_primary_10_1088_2631_8695_ad988c |
| Cites_doi | 10.1155/2014/540253 10.1007/s11042-018-6845-0 10.1016/j.image.2019.08.005 10.1016/j.comnet.2014.09.013 10.1145/263580.263662 10.1002/sec.556 |
| ContentType | Journal Article |
| Copyright | 2023 Elsevier Ltd |
| Copyright_xml | – notice: 2023 Elsevier Ltd |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.jisa.2023.103514 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10_1016_j_jisa_2023_103514 S2214212623000984 |
| GroupedDBID | --M .~1 1~. 4.4 457 4G. 5VS 7-5 8P~ AACTN AAEDT AAEDW AAFJI AAIKJ AAKOC AALRI AAOAW AAQFI AAXKI AAXUO AAYFN ABBOA ABMAC ABXDB ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE AEBSH AEKER AFJKZ AFKWA AFTJW AGHFR AGUBO AIALX AIEXJ AIKHN AITUG AJOXV AKRWK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD AVARZ AXJTR BKOJK BLXMC EBS EFJIC EJD FDB FIRID FNPLU FYGXN GBLVA GBOLZ KOM M41 MO0 OAUVE P-8 P-9 PC. PRBVW RIG ROL SPC SPCBC SSB SSO SSV SSZ T5K ~G- AATTM AAYWO AAYXX ACLOT ACVFH ADCNI AEIPS AEUPX AFPUW AIGII AIIUN AKBMS AKYEP ANKPU APXCP CITATION EFKBS EFLBG |
| ID | FETCH-LOGICAL-c300t-675de467be1489eafedfe7ab7f1f9b5d4dd199e7257f2a95eabfff6c3aad31443 |
| IEDL.DBID | .~1 |
| ISSN | 2214-2126 |
| IngestDate | Wed Oct 01 03:30:10 EDT 2025 Thu Apr 24 23:04:32 EDT 2025 Tue Dec 03 03:45:30 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Fixed points Dynamic diffusion primitives Binary diffusion matrix Flexible diffusion matrix Linear branch number Dynamic cryptographic algorithms |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c300t-675de467be1489eafedfe7ab7f1f9b5d4dd199e7257f2a95eabfff6c3aad31443 |
| ORCID | 0000-0002-1939-2740 0000-0002-2589-5053 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_jisa_2023_103514 crossref_primary_10_1016_j_jisa_2023_103514 elsevier_sciencedirect_doi_10_1016_j_jisa_2023_103514 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | August 2023 2023-08-00 |
| PublicationDateYYYYMMDD | 2023-08-01 |
| PublicationDate_xml | – month: 08 year: 2023 text: August 2023 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of information security and applications |
| PublicationYear | 2023 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Sakallı Muharrem Tolga, Akleylek Sedat, Aslan Bora, Bulus Ercan, Sakallı Fatma Büyüksaraçoglu. On the construction of 20 Noura, Salman, Couturier, Chehab (b20) 2021 Noura, Sleem, Noura, Mansour, Chehab, Couturier (b23) 2017 Stallings (b2) 2017 Kwon, Kim, Park, Sung, Sohn, Song (b8) 2004; vol. 2971 Noura Hassan. Design and simulation of efficient chaos based generators, crypto-systems and hash functions. [Ph.D. thesis]. Noura, Chehab, Noura, Couturier, Mansour (b22) 2018 Noura, Noura, Chehab, Mansour, Couturier (b21) 2019; 78 Schneier (b4) 1994; vol. 809 Noura, Martin, Al Agha, Chahine (b15) 2014; 75, Part A Kwon, Sung, Song, Park (b9) 2005; 8 20 and 24 Sakallı, Akleylek, Aslan, Buluş, Sakallı (b14) 2014; 2014 Nakahara, Abrahão (b6) 2009; 9 Koo, Jang, Song (b10) 2004; vol. 2908 Brent (b28) 1970 Aslan, Sakalli (b12) 2014; 7 Noura Hassan, Martin Steven, Al Agha Khaldoun. E3SN - efficient security scheme for sensor networks. In: SECRYPT - 10th international conference on security and cryptography. Reykjavik, Iceland; 2013. Daemen, Rijmen (b29) 2013 Chou, Tramèr, Pellegrino, Boneh (b3) 2018 Noura, Chehab, Couturier (b24) 2019; 78 Bilmes J, Asanovic K, Chin C, Demmel J. Optimizing matrix multiply using PHiPAC: A portable, high-performance, Ansi C coding methodology. In: International conference on supercomputing. 1997. Noura, Courousse (b16) 2021 24 Binary matrices with good implementation properties for lightweight block ciphers and hash functions. Miller, Vandome, McBrewster (b5) 2009 Aoki, Ichikawa, Kanda, Matsui, Moriai, Nakajima (b7) 2001; 2012 Z’aba (b26) 2010 Dai A, Kim C, Kim J. Invertibility probability of binary matrices. Daemen, Rijmen (b25) 2002 Menezes, Van Oorschot, Vanstone (b1) 1997 Koo, Jang, Song (b11) 2006; vol. 4296 Daemen (10.1016/j.jisa.2023.103514_b29) 2013 Miller (10.1016/j.jisa.2023.103514_b5) 2009 Noura (10.1016/j.jisa.2023.103514_b16) 2021 10.1016/j.jisa.2023.103514_b17 Schneier (10.1016/j.jisa.2023.103514_b4) 1994; vol. 809 10.1016/j.jisa.2023.103514_b19 10.1016/j.jisa.2023.103514_b18 Kwon (10.1016/j.jisa.2023.103514_b8) 2004; vol. 2971 Noura (10.1016/j.jisa.2023.103514_b24) 2019; 78 10.1016/j.jisa.2023.103514_b13 Chou (10.1016/j.jisa.2023.103514_b3) 2018 Daemen (10.1016/j.jisa.2023.103514_b25) 2002 Noura (10.1016/j.jisa.2023.103514_b23) 2017 Noura (10.1016/j.jisa.2023.103514_b21) 2019; 78 Menezes (10.1016/j.jisa.2023.103514_b1) 1997 Noura (10.1016/j.jisa.2023.103514_b15) 2014; 75, Part A Kwon (10.1016/j.jisa.2023.103514_b9) 2005; 8 Nakahara (10.1016/j.jisa.2023.103514_b6) 2009; 9 10.1016/j.jisa.2023.103514_b27 Noura (10.1016/j.jisa.2023.103514_b20) 2021 Koo (10.1016/j.jisa.2023.103514_b11) 2006; vol. 4296 Stallings (10.1016/j.jisa.2023.103514_b2) 2017 Koo (10.1016/j.jisa.2023.103514_b10) 2004; vol. 2908 Aslan (10.1016/j.jisa.2023.103514_b12) 2014; 7 Brent (10.1016/j.jisa.2023.103514_b28) 1970 Aoki (10.1016/j.jisa.2023.103514_b7) 2001; 2012 Noura (10.1016/j.jisa.2023.103514_b22) 2018 Z’aba (10.1016/j.jisa.2023.103514_b26) 2010 Sakallı (10.1016/j.jisa.2023.103514_b14) 2014; 2014 |
| References_xml | – volume: vol. 2971 start-page: 432 year: 2004 end-page: 445 ident: b8 article-title: New block cipher: ARIA publication-title: Lecture notes in computer science (Including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) – reference: 24 Binary matrices with good implementation properties for lightweight block ciphers and hash functions. – volume: 9 start-page: 109 year: 2009 end-page: 116 ident: b6 article-title: A new involutory MDS matrix for the AES publication-title: Int J Netw Secur – volume: vol. 2908 start-page: 489 year: 2004 end-page: 503 ident: b10 article-title: Constructing and cryptanalysis of a 16 publication-title: Information security applications – volume: 8 start-page: 13 year: 2005 end-page: 20 ident: b9 article-title: Design of block ciphers and coding theory publication-title: Trends Math – reference: Noura Hassan. Design and simulation of efficient chaos based generators, crypto-systems and hash functions. [Ph.D. thesis]. – year: 2013 ident: b29 article-title: The design of Rijndael: AES-the advanced encryption standard – start-page: 1 year: 2018 end-page: 35 ident: b22 article-title: Lightweight, dynamic and efficient image encryption scheme publication-title: Multimedia Tools Appl – volume: vol. 4296 start-page: 51 year: 2006 end-page: 64 ident: b11 article-title: On constructing of a 32 publication-title: Information security and cryptology – ICISC 2006 – volume: 2012 start-page: 39 year: 2001 end-page: 56 ident: b7 article-title: Camellia: A 128-bit block cipher suitable for multiple platforms - Design and analysis publication-title: LNCS – start-page: 1 year: 2017 end-page: 28 ident: b23 article-title: A new efficient lightweight and secure image cipher scheme publication-title: Multimedia Tools Appl – year: 2017 ident: b2 article-title: Cryptography and network security: Principles and practice – volume: 78 start-page: 1 year: 2019 end-page: 30 ident: b21 article-title: Efficient and secure cipher scheme for multimedia contents publication-title: Multimedia Tools Appl – year: 2018 ident: b3 article-title: SentiNet: Detecting physical attacks against deep learning systems – volume: 78 start-page: 448 year: 2019 end-page: 464 ident: b24 article-title: Efficient & secure cipher scheme with dynamic key-dependent mode of operation publication-title: Signal Process, Image Commun – reference: 20 and 24 – volume: 2014 year: 2014 ident: b14 article-title: On the construction of and binary matrices with good implementation properties for lightweight block ciphers and hash functions publication-title: Math Probl Eng – year: 2010 ident: b26 article-title: Analysis of linear relationships in block ciphers – reference: Noura Hassan, Martin Steven, Al Agha Khaldoun. E3SN - efficient security scheme for sensor networks. In: SECRYPT - 10th international conference on security and cryptography. Reykjavik, Iceland; 2013. – year: 2021 ident: b16 article-title: Method of encryption with dynamic diffusion and confusion layers – reference: Bilmes J, Asanovic K, Chin C, Demmel J. Optimizing matrix multiply using PHiPAC: A portable, high-performance, Ansi C coding methodology. In: International conference on supercomputing. 1997. – volume: 75, Part A start-page: 99 year: 2014 end-page: 112 ident: b15 article-title: ERSS-RLNC: Efficient and robust secure scheme for random linear network coding publication-title: Comput Netw – volume: 7 start-page: 53 year: 2014 end-page: 63 ident: b12 article-title: Algebraic construction of cryptographically good binary linear transformations publication-title: Secur Commun Netw – year: 2009 ident: b5 article-title: Advanced encryption standard – year: 1970 ident: b28 article-title: Algorithms for matrix multiplication – year: 2002 ident: b25 article-title: The design of Rijndael – year: 1997 ident: b1 article-title: Handbook of applied cryptography – volume: vol. 809 start-page: 191 year: 1994 end-page: 204 ident: b4 article-title: Description of a new variable-length key, 64-bit block cipher (blowfish) publication-title: Fast software encryption – reference: Sakallı Muharrem Tolga, Akleylek Sedat, Aslan Bora, Bulus Ercan, Sakallı Fatma Büyüksaraçoglu. On the construction of 20 – year: 2021 ident: b20 article-title: LoRCA: Lightweight round block and stream cipher algorithms for IoV systems publication-title: Veh Commun – reference: Dai A, Kim C, Kim J. Invertibility probability of binary matrices. – volume: 2012 start-page: 39 issue: 2012 year: 2001 ident: 10.1016/j.jisa.2023.103514_b7 article-title: Camellia: A 128-bit block cipher suitable for multiple platforms - Design and analysis publication-title: LNCS – volume: 2014 year: 2014 ident: 10.1016/j.jisa.2023.103514_b14 article-title: On the construction of and binary matrices with good implementation properties for lightweight block ciphers and hash functions publication-title: Math Probl Eng doi: 10.1155/2014/540253 – year: 2009 ident: 10.1016/j.jisa.2023.103514_b5 – year: 1970 ident: 10.1016/j.jisa.2023.103514_b28 – ident: 10.1016/j.jisa.2023.103514_b13 – year: 2010 ident: 10.1016/j.jisa.2023.103514_b26 – ident: 10.1016/j.jisa.2023.103514_b17 – volume: vol. 2971 start-page: 432 year: 2004 ident: 10.1016/j.jisa.2023.103514_b8 article-title: New block cipher: ARIA – ident: 10.1016/j.jisa.2023.103514_b19 – volume: vol. 809 start-page: 191 year: 1994 ident: 10.1016/j.jisa.2023.103514_b4 article-title: Description of a new variable-length key, 64-bit block cipher (blowfish) – year: 2002 ident: 10.1016/j.jisa.2023.103514_b25 – volume: 9 start-page: 109 issue: 2 year: 2009 ident: 10.1016/j.jisa.2023.103514_b6 article-title: A new involutory MDS matrix for the AES publication-title: Int J Netw Secur – start-page: 1 year: 2017 ident: 10.1016/j.jisa.2023.103514_b23 article-title: A new efficient lightweight and secure image cipher scheme publication-title: Multimedia Tools Appl – volume: 78 start-page: 1 year: 2019 ident: 10.1016/j.jisa.2023.103514_b21 article-title: Efficient and secure cipher scheme for multimedia contents publication-title: Multimedia Tools Appl doi: 10.1007/s11042-018-6845-0 – volume: 8 start-page: 13 issue: 1 year: 2005 ident: 10.1016/j.jisa.2023.103514_b9 article-title: Design of block ciphers and coding theory publication-title: Trends Math – year: 2021 ident: 10.1016/j.jisa.2023.103514_b20 article-title: LoRCA: Lightweight round block and stream cipher algorithms for IoV systems publication-title: Veh Commun – year: 1997 ident: 10.1016/j.jisa.2023.103514_b1 – start-page: 1 year: 2018 ident: 10.1016/j.jisa.2023.103514_b22 article-title: Lightweight, dynamic and efficient image encryption scheme publication-title: Multimedia Tools Appl – volume: 78 start-page: 448 year: 2019 ident: 10.1016/j.jisa.2023.103514_b24 article-title: Efficient & secure cipher scheme with dynamic key-dependent mode of operation publication-title: Signal Process, Image Commun doi: 10.1016/j.image.2019.08.005 – volume: 75, Part A start-page: 99 year: 2014 ident: 10.1016/j.jisa.2023.103514_b15 article-title: ERSS-RLNC: Efficient and robust secure scheme for random linear network coding publication-title: Comput Netw doi: 10.1016/j.comnet.2014.09.013 – year: 2013 ident: 10.1016/j.jisa.2023.103514_b29 – year: 2017 ident: 10.1016/j.jisa.2023.103514_b2 – year: 2018 ident: 10.1016/j.jisa.2023.103514_b3 – ident: 10.1016/j.jisa.2023.103514_b18 – year: 2021 ident: 10.1016/j.jisa.2023.103514_b16 – ident: 10.1016/j.jisa.2023.103514_b27 doi: 10.1145/263580.263662 – volume: 7 start-page: 53 issue: 1 year: 2014 ident: 10.1016/j.jisa.2023.103514_b12 article-title: Algebraic construction of cryptographically good binary linear transformations publication-title: Secur Commun Netw doi: 10.1002/sec.556 – volume: vol. 2908 start-page: 489 year: 2004 ident: 10.1016/j.jisa.2023.103514_b10 article-title: Constructing and cryptanalysis of a 16 × 16 binary matrix as a diffusion layer – volume: vol. 4296 start-page: 51 year: 2006 ident: 10.1016/j.jisa.2023.103514_b11 article-title: On constructing of a 32 ×32 binary matrix as a diffusion layer for a 256-bit block cipher |
| SSID | ssj0001219523 |
| Score | 2.3017256 |
| Snippet | The existing static cryptographic algorithms suffer from different performance and security challenges. These limitations are attributed to their fixed... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 103514 |
| SubjectTerms | Binary diffusion matrix Dynamic cryptographic algorithms Dynamic diffusion primitives Fixed points Flexible diffusion matrix Linear branch number |
| Title | Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms |
| URI | https://dx.doi.org/10.1016/j.jisa.2023.103514 |
| Volume | 76 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) issn: 2214-2126 databaseCode: GBLVA dateStart: 20110101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0001219523 providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] issn: 2214-2126 databaseCode: ACRLP dateStart: 20130701 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0001219523 providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect (Elsevier) issn: 2214-2126 databaseCode: .~1 dateStart: 20130701 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0001219523 providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection Journals issn: 2214-2126 databaseCode: AIKHN dateStart: 20130701 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0001219523 providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals issn: 2214-2126 databaseCode: AKRWK dateStart: 20130701 customDbUrl: isFulltext: true mediaType: online dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001219523 providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA9jXrz4LX6OHLxJnGmbtTmO4ZiKu-hgt5I0iW7si9mBXvzbfa9pZYLs4KWQkgflJXkf6Xu_HyFXPLCxhEyZ8dhYFgljmBQmY04rmwgEFJfYnPzUb_UG0cNQDGukU_XCYFllafu9TS-sdfmmWWqzuRiNms8BooXxAPw3BgoJYoJGUYwsBjdffO2ehUtRsLzhfIYCZe-ML_Ma4z9j5BDH9nPBo7_905rP6e6RnTJYpG3_PfukZmcHZLciYqDluTwk045vPgQd07mjtoCFAG9C4YSyiuY2p7rovaXIibLCSzI6RXz-D-oxZFeQeFMIYanxJPU0W34uco9oDSM1eZ0vR_nb9P2IDLp3L50eK3kUWAaqyRnkBMaCQdQWch9plbPG2Vjp2HEntTCRMVxKG8PpdYGSwirtnGtloVImhIQrPCb12XxmTwg1caI4PG5dHEYuaaksMJk2wrU0xH46PCW80l6alSDjyHUxSatqsnGKGk9R46nX-Cm5_pFZeIiNjbNFtSjpr42Sgg_YIHf2T7lzso0jX_N3QeqwIvYS4pBcN4qN1iBb7fvHXv8bWn3gNQ |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwELVYDnBhR5TVB27IFCdxUx9RRVWW9kIr9RbZsQ2tuqkECS58OzNxgoqEeuASKctE0diexZl5j5BLHthYQqbMeGwsi4QxTAqTMqeVrQsEFJfYnNzu1Fq96KEv-iukUfbCYFllYfu9Tc-tdXGlWmizOhsMqs8BooXxAPw3Bgr1aJWsR_B2zMCuv_jCRguXIqd5QwGGEkXzjK_zGuJPYyQRx_5zwaO_HdSC02nukK0iWqS3_oN2yYqd7JHtkomBFgtzn4wbvvsQlEynjtocFwLcCYUlykqe24zqvPmWIinKO-6S0TEC9H9QDyL7Dpk3hRiWGs9ST9P55yzzkNZwpkYv0_kgex2_HZBe867baLGCSIGloJuMQVJgLFhEbSH5kVY5a5yNlY4dd1ILExnDpbQxLF8XKCms0s65WhoqZULIuMJDsjaZTuwRoSauKw6HGxeHkavXVBqYVBvhahqCPx1WCC-1l6QFyjiSXYySspxsmKDGE9R44jVeIVc_MjOPsbH0aVEOSvJrpiTgBJbIHf9T7oJstLrtp-TpvvN4Qjbxji8APCVrMDr2DIKSTJ_nk-4booPhyg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Conception+of+efficient+key-dependent+binary+diffusion+matrix+structures+for+dynamic+cryptographic+algorithms&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Noura%2C+Hassan+N.&rft.au=Salman%2C+Ola&rft.au=Chehab%2C+Ali&rft.date=2023-08-01&rft.issn=2214-2126&rft.volume=76&rft.spage=103514&rft_id=info:doi/10.1016%2Fj.jisa.2023.103514&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jisa_2023_103514 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon |