Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms

The existing static cryptographic algorithms suffer from different performance and security challenges. These limitations are attributed to their fixed structure, where the substitution and diffusion primitives maintain the same values throughout the process. In this paper, we present a new framewor...

Full description

Saved in:
Bibliographic Details
Published inJournal of information security and applications Vol. 76; p. 103514
Main Authors Noura, Hassan N., Salman, Ola, Chehab, Ali
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.08.2023
Subjects
Online AccessGet full text
ISSN2214-2126
DOI10.1016/j.jisa.2023.103514

Cover

Abstract The existing static cryptographic algorithms suffer from different performance and security challenges. These limitations are attributed to their fixed structure, where the substitution and diffusion primitives maintain the same values throughout the process. In this paper, we present a new framework of a dynamic binary diffusion matrix with flexible dimensions (n×n). The proposed solution replaces the static diffusion primitives, in existing symmetric and un-keyed cryptographic algorithms, with dynamic primitives. We define six different dynamic and flexible binary diffusion forms, four that are invertible, and two that are non-invertible, and hence, they could be used for different security services. However, using a single diffusion form does not always guarantee the required cryptographic properties. To that effect, we propose a binary multiplication scheme of a dynamic primary matrix and its transposed form, which yields the desired efficiency, and provides good resistance against recent implementation attacks, yet without degrading the system performance. We conduct security and performance analyses to validate the effectiveness of the proposed solution. The results confirm the cryptographic performance in terms of the linear branch number and the number of fixed points. In this context, the best-obtained branch number is 4 for n=8 and 5 for n=12 for the invertible forms, while for the non-invertible ones, the best branch number is 3 for n=8 and 4 for n=12. Moreover, in terms of the number of fixed points, the obtained numbers are very close to 0 for the invertible and non-invertible forms.
AbstractList The existing static cryptographic algorithms suffer from different performance and security challenges. These limitations are attributed to their fixed structure, where the substitution and diffusion primitives maintain the same values throughout the process. In this paper, we present a new framework of a dynamic binary diffusion matrix with flexible dimensions (n×n). The proposed solution replaces the static diffusion primitives, in existing symmetric and un-keyed cryptographic algorithms, with dynamic primitives. We define six different dynamic and flexible binary diffusion forms, four that are invertible, and two that are non-invertible, and hence, they could be used for different security services. However, using a single diffusion form does not always guarantee the required cryptographic properties. To that effect, we propose a binary multiplication scheme of a dynamic primary matrix and its transposed form, which yields the desired efficiency, and provides good resistance against recent implementation attacks, yet without degrading the system performance. We conduct security and performance analyses to validate the effectiveness of the proposed solution. The results confirm the cryptographic performance in terms of the linear branch number and the number of fixed points. In this context, the best-obtained branch number is 4 for n=8 and 5 for n=12 for the invertible forms, while for the non-invertible ones, the best branch number is 3 for n=8 and 4 for n=12. Moreover, in terms of the number of fixed points, the obtained numbers are very close to 0 for the invertible and non-invertible forms.
ArticleNumber 103514
Author Noura, Hassan N.
Chehab, Ali
Salman, Ola
Author_xml – sequence: 1
  givenname: Hassan N.
  orcidid: 0000-0002-2589-5053
  surname: Noura
  fullname: Noura, Hassan N.
  email: hassan.noura@univ-fcomte.fr
  organization: Univ. Bourgogne Franche-Comté (UBFC), FEMTO-ST Institute, France
– sequence: 2
  givenname: Ola
  surname: Salman
  fullname: Salman, Ola
  organization: American University of Beirut, Electrical and Computer Engineering Department, Beirut 1107 2020, Lebanon
– sequence: 3
  givenname: Ali
  orcidid: 0000-0002-1939-2740
  surname: Chehab
  fullname: Chehab, Ali
  organization: American University of Beirut, Electrical and Computer Engineering Department, Beirut 1107 2020, Lebanon
BookMark eNp9kMtOwzAQRb0oEqX0B1j5B1Js59VIbFDFS6rEBtaWY8-0Do0d2S6if0-ismLR1eiO5ox0zw2ZOe-AkDvOVpzx6r5bdTaqlWAiHxd5yYsZmQvBi0xwUV2TZYwdY4wL3pQin5N-452GIVnvqEcKiFZbcIl-wSkzMIAzU2qtU-FEjUU8xum2VynYHxpTOOp0DBAp-kDNyaneaqrDaUh-F9SwH5M67Hywad_HW3KF6hBh-TcX5PP56WPzmm3fX942j9tM54ylrKpLA0VVt8CLdQMKwSDUqq2RY9OWpjCGNw3UoqxRqKYE1SJipXOlTM6LIl-Q9fmvDj7GACi1TWoqmYKyB8mZnGzJTk625GRLnm2NqPiHDsH2Y_nL0MMZgrHUt4Ug42RRg7EBdJLG20v4L17ajDQ
CitedBy_id crossref_primary_10_3233_JIFS_236998
crossref_primary_10_1088_2631_8695_ad988c
Cites_doi 10.1155/2014/540253
10.1007/s11042-018-6845-0
10.1016/j.image.2019.08.005
10.1016/j.comnet.2014.09.013
10.1145/263580.263662
10.1002/sec.556
ContentType Journal Article
Copyright 2023 Elsevier Ltd
Copyright_xml – notice: 2023 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.jisa.2023.103514
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_jisa_2023_103514
S2214212623000984
GroupedDBID --M
.~1
1~.
4.4
457
4G.
5VS
7-5
8P~
AACTN
AAEDT
AAEDW
AAFJI
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXKI
AAXUO
AAYFN
ABBOA
ABMAC
ABXDB
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
AEBSH
AEKER
AFJKZ
AFKWA
AFTJW
AGHFR
AGUBO
AIALX
AIEXJ
AIKHN
AITUG
AJOXV
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
AOUOD
AVARZ
AXJTR
BKOJK
BLXMC
EBS
EFJIC
EJD
FDB
FIRID
FNPLU
FYGXN
GBLVA
GBOLZ
KOM
M41
MO0
OAUVE
P-8
P-9
PC.
PRBVW
RIG
ROL
SPC
SPCBC
SSB
SSO
SSV
SSZ
T5K
~G-
AATTM
AAYWO
AAYXX
ACLOT
ACVFH
ADCNI
AEIPS
AEUPX
AFPUW
AIGII
AIIUN
AKBMS
AKYEP
ANKPU
APXCP
CITATION
EFKBS
EFLBG
ID FETCH-LOGICAL-c300t-675de467be1489eafedfe7ab7f1f9b5d4dd199e7257f2a95eabfff6c3aad31443
IEDL.DBID .~1
ISSN 2214-2126
IngestDate Wed Oct 01 03:30:10 EDT 2025
Thu Apr 24 23:04:32 EDT 2025
Tue Dec 03 03:45:30 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Fixed points
Dynamic diffusion primitives
Binary diffusion matrix
Flexible diffusion matrix
Linear branch number
Dynamic cryptographic algorithms
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c300t-675de467be1489eafedfe7ab7f1f9b5d4dd199e7257f2a95eabfff6c3aad31443
ORCID 0000-0002-1939-2740
0000-0002-2589-5053
ParticipantIDs crossref_citationtrail_10_1016_j_jisa_2023_103514
crossref_primary_10_1016_j_jisa_2023_103514
elsevier_sciencedirect_doi_10_1016_j_jisa_2023_103514
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate August 2023
2023-08-00
PublicationDateYYYYMMDD 2023-08-01
PublicationDate_xml – month: 08
  year: 2023
  text: August 2023
PublicationDecade 2020
PublicationTitle Journal of information security and applications
PublicationYear 2023
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Sakallı Muharrem Tolga, Akleylek Sedat, Aslan Bora, Bulus Ercan, Sakallı Fatma Büyüksaraçoglu. On the construction of 20
Noura, Salman, Couturier, Chehab (b20) 2021
Noura, Sleem, Noura, Mansour, Chehab, Couturier (b23) 2017
Stallings (b2) 2017
Kwon, Kim, Park, Sung, Sohn, Song (b8) 2004; vol. 2971
Noura Hassan. Design and simulation of efficient chaos based generators, crypto-systems and hash functions. [Ph.D. thesis].
Noura, Chehab, Noura, Couturier, Mansour (b22) 2018
Noura, Noura, Chehab, Mansour, Couturier (b21) 2019; 78
Schneier (b4) 1994; vol. 809
Noura, Martin, Al Agha, Chahine (b15) 2014; 75, Part A
Kwon, Sung, Song, Park (b9) 2005; 8
20 and 24
Sakallı, Akleylek, Aslan, Buluş, Sakallı (b14) 2014; 2014
Nakahara, Abrahão (b6) 2009; 9
Koo, Jang, Song (b10) 2004; vol. 2908
Brent (b28) 1970
Aslan, Sakalli (b12) 2014; 7
Noura Hassan, Martin Steven, Al Agha Khaldoun. E3SN - efficient security scheme for sensor networks. In: SECRYPT - 10th international conference on security and cryptography. Reykjavik, Iceland; 2013.
Daemen, Rijmen (b29) 2013
Chou, Tramèr, Pellegrino, Boneh (b3) 2018
Noura, Chehab, Couturier (b24) 2019; 78
Bilmes J, Asanovic K, Chin C, Demmel J. Optimizing matrix multiply using PHiPAC: A portable, high-performance, Ansi C coding methodology. In: International conference on supercomputing. 1997.
Noura, Courousse (b16) 2021
24 Binary matrices with good implementation properties for lightweight block ciphers and hash functions.
Miller, Vandome, McBrewster (b5) 2009
Aoki, Ichikawa, Kanda, Matsui, Moriai, Nakajima (b7) 2001; 2012
Z’aba (b26) 2010
Dai A, Kim C, Kim J. Invertibility probability of binary matrices.
Daemen, Rijmen (b25) 2002
Menezes, Van Oorschot, Vanstone (b1) 1997
Koo, Jang, Song (b11) 2006; vol. 4296
Daemen (10.1016/j.jisa.2023.103514_b29) 2013
Miller (10.1016/j.jisa.2023.103514_b5) 2009
Noura (10.1016/j.jisa.2023.103514_b16) 2021
10.1016/j.jisa.2023.103514_b17
Schneier (10.1016/j.jisa.2023.103514_b4) 1994; vol. 809
10.1016/j.jisa.2023.103514_b19
10.1016/j.jisa.2023.103514_b18
Kwon (10.1016/j.jisa.2023.103514_b8) 2004; vol. 2971
Noura (10.1016/j.jisa.2023.103514_b24) 2019; 78
10.1016/j.jisa.2023.103514_b13
Chou (10.1016/j.jisa.2023.103514_b3) 2018
Daemen (10.1016/j.jisa.2023.103514_b25) 2002
Noura (10.1016/j.jisa.2023.103514_b23) 2017
Noura (10.1016/j.jisa.2023.103514_b21) 2019; 78
Menezes (10.1016/j.jisa.2023.103514_b1) 1997
Noura (10.1016/j.jisa.2023.103514_b15) 2014; 75, Part A
Kwon (10.1016/j.jisa.2023.103514_b9) 2005; 8
Nakahara (10.1016/j.jisa.2023.103514_b6) 2009; 9
10.1016/j.jisa.2023.103514_b27
Noura (10.1016/j.jisa.2023.103514_b20) 2021
Koo (10.1016/j.jisa.2023.103514_b11) 2006; vol. 4296
Stallings (10.1016/j.jisa.2023.103514_b2) 2017
Koo (10.1016/j.jisa.2023.103514_b10) 2004; vol. 2908
Aslan (10.1016/j.jisa.2023.103514_b12) 2014; 7
Brent (10.1016/j.jisa.2023.103514_b28) 1970
Aoki (10.1016/j.jisa.2023.103514_b7) 2001; 2012
Noura (10.1016/j.jisa.2023.103514_b22) 2018
Z’aba (10.1016/j.jisa.2023.103514_b26) 2010
Sakallı (10.1016/j.jisa.2023.103514_b14) 2014; 2014
References_xml – volume: vol. 2971
  start-page: 432
  year: 2004
  end-page: 445
  ident: b8
  article-title: New block cipher: ARIA
  publication-title: Lecture notes in computer science (Including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)
– reference: 24 Binary matrices with good implementation properties for lightweight block ciphers and hash functions.
– volume: 9
  start-page: 109
  year: 2009
  end-page: 116
  ident: b6
  article-title: A new involutory MDS matrix for the AES
  publication-title: Int J Netw Secur
– volume: vol. 2908
  start-page: 489
  year: 2004
  end-page: 503
  ident: b10
  article-title: Constructing and cryptanalysis of a 16
  publication-title: Information security applications
– volume: 8
  start-page: 13
  year: 2005
  end-page: 20
  ident: b9
  article-title: Design of block ciphers and coding theory
  publication-title: Trends Math
– reference: Noura Hassan. Design and simulation of efficient chaos based generators, crypto-systems and hash functions. [Ph.D. thesis].
– year: 2013
  ident: b29
  article-title: The design of Rijndael: AES-the advanced encryption standard
– start-page: 1
  year: 2018
  end-page: 35
  ident: b22
  article-title: Lightweight, dynamic and efficient image encryption scheme
  publication-title: Multimedia Tools Appl
– volume: vol. 4296
  start-page: 51
  year: 2006
  end-page: 64
  ident: b11
  article-title: On constructing of a 32
  publication-title: Information security and cryptology – ICISC 2006
– volume: 2012
  start-page: 39
  year: 2001
  end-page: 56
  ident: b7
  article-title: Camellia: A 128-bit block cipher suitable for multiple platforms - Design and analysis
  publication-title: LNCS
– start-page: 1
  year: 2017
  end-page: 28
  ident: b23
  article-title: A new efficient lightweight and secure image cipher scheme
  publication-title: Multimedia Tools Appl
– year: 2017
  ident: b2
  article-title: Cryptography and network security: Principles and practice
– volume: 78
  start-page: 1
  year: 2019
  end-page: 30
  ident: b21
  article-title: Efficient and secure cipher scheme for multimedia contents
  publication-title: Multimedia Tools Appl
– year: 2018
  ident: b3
  article-title: SentiNet: Detecting physical attacks against deep learning systems
– volume: 78
  start-page: 448
  year: 2019
  end-page: 464
  ident: b24
  article-title: Efficient & secure cipher scheme with dynamic key-dependent mode of operation
  publication-title: Signal Process, Image Commun
– reference: 20 and 24
– volume: 2014
  year: 2014
  ident: b14
  article-title: On the construction of and binary matrices with good implementation properties for lightweight block ciphers and hash functions
  publication-title: Math Probl Eng
– year: 2010
  ident: b26
  article-title: Analysis of linear relationships in block ciphers
– reference: Noura Hassan, Martin Steven, Al Agha Khaldoun. E3SN - efficient security scheme for sensor networks. In: SECRYPT - 10th international conference on security and cryptography. Reykjavik, Iceland; 2013.
– year: 2021
  ident: b16
  article-title: Method of encryption with dynamic diffusion and confusion layers
– reference: Bilmes J, Asanovic K, Chin C, Demmel J. Optimizing matrix multiply using PHiPAC: A portable, high-performance, Ansi C coding methodology. In: International conference on supercomputing. 1997.
– volume: 75, Part A
  start-page: 99
  year: 2014
  end-page: 112
  ident: b15
  article-title: ERSS-RLNC: Efficient and robust secure scheme for random linear network coding
  publication-title: Comput Netw
– volume: 7
  start-page: 53
  year: 2014
  end-page: 63
  ident: b12
  article-title: Algebraic construction of cryptographically good binary linear transformations
  publication-title: Secur Commun Netw
– year: 2009
  ident: b5
  article-title: Advanced encryption standard
– year: 1970
  ident: b28
  article-title: Algorithms for matrix multiplication
– year: 2002
  ident: b25
  article-title: The design of Rijndael
– year: 1997
  ident: b1
  article-title: Handbook of applied cryptography
– volume: vol. 809
  start-page: 191
  year: 1994
  end-page: 204
  ident: b4
  article-title: Description of a new variable-length key, 64-bit block cipher (blowfish)
  publication-title: Fast software encryption
– reference: Sakallı Muharrem Tolga, Akleylek Sedat, Aslan Bora, Bulus Ercan, Sakallı Fatma Büyüksaraçoglu. On the construction of 20
– year: 2021
  ident: b20
  article-title: LoRCA: Lightweight round block and stream cipher algorithms for IoV systems
  publication-title: Veh Commun
– reference: Dai A, Kim C, Kim J. Invertibility probability of binary matrices.
– volume: 2012
  start-page: 39
  issue: 2012
  year: 2001
  ident: 10.1016/j.jisa.2023.103514_b7
  article-title: Camellia: A 128-bit block cipher suitable for multiple platforms - Design and analysis
  publication-title: LNCS
– volume: 2014
  year: 2014
  ident: 10.1016/j.jisa.2023.103514_b14
  article-title: On the construction of and binary matrices with good implementation properties for lightweight block ciphers and hash functions
  publication-title: Math Probl Eng
  doi: 10.1155/2014/540253
– year: 2009
  ident: 10.1016/j.jisa.2023.103514_b5
– year: 1970
  ident: 10.1016/j.jisa.2023.103514_b28
– ident: 10.1016/j.jisa.2023.103514_b13
– year: 2010
  ident: 10.1016/j.jisa.2023.103514_b26
– ident: 10.1016/j.jisa.2023.103514_b17
– volume: vol. 2971
  start-page: 432
  year: 2004
  ident: 10.1016/j.jisa.2023.103514_b8
  article-title: New block cipher: ARIA
– ident: 10.1016/j.jisa.2023.103514_b19
– volume: vol. 809
  start-page: 191
  year: 1994
  ident: 10.1016/j.jisa.2023.103514_b4
  article-title: Description of a new variable-length key, 64-bit block cipher (blowfish)
– year: 2002
  ident: 10.1016/j.jisa.2023.103514_b25
– volume: 9
  start-page: 109
  issue: 2
  year: 2009
  ident: 10.1016/j.jisa.2023.103514_b6
  article-title: A new involutory MDS matrix for the AES
  publication-title: Int J Netw Secur
– start-page: 1
  year: 2017
  ident: 10.1016/j.jisa.2023.103514_b23
  article-title: A new efficient lightweight and secure image cipher scheme
  publication-title: Multimedia Tools Appl
– volume: 78
  start-page: 1
  year: 2019
  ident: 10.1016/j.jisa.2023.103514_b21
  article-title: Efficient and secure cipher scheme for multimedia contents
  publication-title: Multimedia Tools Appl
  doi: 10.1007/s11042-018-6845-0
– volume: 8
  start-page: 13
  issue: 1
  year: 2005
  ident: 10.1016/j.jisa.2023.103514_b9
  article-title: Design of block ciphers and coding theory
  publication-title: Trends Math
– year: 2021
  ident: 10.1016/j.jisa.2023.103514_b20
  article-title: LoRCA: Lightweight round block and stream cipher algorithms for IoV systems
  publication-title: Veh Commun
– year: 1997
  ident: 10.1016/j.jisa.2023.103514_b1
– start-page: 1
  year: 2018
  ident: 10.1016/j.jisa.2023.103514_b22
  article-title: Lightweight, dynamic and efficient image encryption scheme
  publication-title: Multimedia Tools Appl
– volume: 78
  start-page: 448
  year: 2019
  ident: 10.1016/j.jisa.2023.103514_b24
  article-title: Efficient & secure cipher scheme with dynamic key-dependent mode of operation
  publication-title: Signal Process, Image Commun
  doi: 10.1016/j.image.2019.08.005
– volume: 75, Part A
  start-page: 99
  year: 2014
  ident: 10.1016/j.jisa.2023.103514_b15
  article-title: ERSS-RLNC: Efficient and robust secure scheme for random linear network coding
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2014.09.013
– year: 2013
  ident: 10.1016/j.jisa.2023.103514_b29
– year: 2017
  ident: 10.1016/j.jisa.2023.103514_b2
– year: 2018
  ident: 10.1016/j.jisa.2023.103514_b3
– ident: 10.1016/j.jisa.2023.103514_b18
– year: 2021
  ident: 10.1016/j.jisa.2023.103514_b16
– ident: 10.1016/j.jisa.2023.103514_b27
  doi: 10.1145/263580.263662
– volume: 7
  start-page: 53
  issue: 1
  year: 2014
  ident: 10.1016/j.jisa.2023.103514_b12
  article-title: Algebraic construction of cryptographically good binary linear transformations
  publication-title: Secur Commun Netw
  doi: 10.1002/sec.556
– volume: vol. 2908
  start-page: 489
  year: 2004
  ident: 10.1016/j.jisa.2023.103514_b10
  article-title: Constructing and cryptanalysis of a 16 × 16 binary matrix as a diffusion layer
– volume: vol. 4296
  start-page: 51
  year: 2006
  ident: 10.1016/j.jisa.2023.103514_b11
  article-title: On constructing of a 32 ×32 binary matrix as a diffusion layer for a 256-bit block cipher
SSID ssj0001219523
Score 2.3017256
Snippet The existing static cryptographic algorithms suffer from different performance and security challenges. These limitations are attributed to their fixed...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 103514
SubjectTerms Binary diffusion matrix
Dynamic cryptographic algorithms
Dynamic diffusion primitives
Fixed points
Flexible diffusion matrix
Linear branch number
Title Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms
URI https://dx.doi.org/10.1016/j.jisa.2023.103514
Volume 76
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  issn: 2214-2126
  databaseCode: GBLVA
  dateStart: 20110101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0001219523
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  issn: 2214-2126
  databaseCode: ACRLP
  dateStart: 20130701
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0001219523
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect (Elsevier)
  issn: 2214-2126
  databaseCode: .~1
  dateStart: 20130701
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0001219523
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection Journals
  issn: 2214-2126
  databaseCode: AIKHN
  dateStart: 20130701
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0001219523
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  issn: 2214-2126
  databaseCode: AKRWK
  dateStart: 20130701
  customDbUrl:
  isFulltext: true
  mediaType: online
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001219523
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA9jXrz4LX6OHLxJnGmbtTmO4ZiKu-hgt5I0iW7si9mBXvzbfa9pZYLs4KWQkgflJXkf6Xu_HyFXPLCxhEyZ8dhYFgljmBQmY04rmwgEFJfYnPzUb_UG0cNQDGukU_XCYFllafu9TS-sdfmmWWqzuRiNms8BooXxAPw3BgoJYoJGUYwsBjdffO2ehUtRsLzhfIYCZe-ML_Ma4z9j5BDH9nPBo7_905rP6e6RnTJYpG3_PfukZmcHZLciYqDluTwk045vPgQd07mjtoCFAG9C4YSyiuY2p7rovaXIibLCSzI6RXz-D-oxZFeQeFMIYanxJPU0W34uco9oDSM1eZ0vR_nb9P2IDLp3L50eK3kUWAaqyRnkBMaCQdQWch9plbPG2Vjp2HEntTCRMVxKG8PpdYGSwirtnGtloVImhIQrPCb12XxmTwg1caI4PG5dHEYuaaksMJk2wrU0xH46PCW80l6alSDjyHUxSatqsnGKGk9R46nX-Cm5_pFZeIiNjbNFtSjpr42Sgg_YIHf2T7lzso0jX_N3QeqwIvYS4pBcN4qN1iBb7fvHXv8bWn3gNQ
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwELVYDnBhR5TVB27IFCdxUx9RRVWW9kIr9RbZsQ2tuqkECS58OzNxgoqEeuASKctE0diexZl5j5BLHthYQqbMeGwsi4QxTAqTMqeVrQsEFJfYnNzu1Fq96KEv-iukUfbCYFllYfu9Tc-tdXGlWmizOhsMqs8BooXxAPw3Bgr1aJWsR_B2zMCuv_jCRguXIqd5QwGGEkXzjK_zGuJPYyQRx_5zwaO_HdSC02nukK0iWqS3_oN2yYqd7JHtkomBFgtzn4wbvvsQlEynjtocFwLcCYUlykqe24zqvPmWIinKO-6S0TEC9H9QDyL7Dpk3hRiWGs9ST9P55yzzkNZwpkYv0_kgex2_HZBe867baLGCSIGloJuMQVJgLFhEbSH5kVY5a5yNlY4dd1ILExnDpbQxLF8XKCms0s65WhoqZULIuMJDsjaZTuwRoSauKw6HGxeHkavXVBqYVBvhahqCPx1WCC-1l6QFyjiSXYySspxsmKDGE9R44jVeIVc_MjOPsbH0aVEOSvJrpiTgBJbIHf9T7oJstLrtp-TpvvN4Qjbxji8APCVrMDr2DIKSTJ_nk-4booPhyg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Conception+of+efficient+key-dependent+binary+diffusion+matrix+structures+for+dynamic+cryptographic+algorithms&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Noura%2C+Hassan+N.&rft.au=Salman%2C+Ola&rft.au=Chehab%2C+Ali&rft.date=2023-08-01&rft.issn=2214-2126&rft.volume=76&rft.spage=103514&rft_id=info:doi/10.1016%2Fj.jisa.2023.103514&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jisa_2023_103514
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon