An algorithm for construction of substitution box based on subfield of galois field GF(216) and dynamic linear fractional transformation
In block encryption algorithms the only nonlinear component, which creates confusion and diffusion, is substitution box (S-Box). Therefore, carefully selection of S-Box is an important task. In this article, an algorithm is presented for the construction of 8 × 8 S-Box based on all subfields of Galo...
Saved in:
| Published in | Multimedia tools and applications Vol. 83; no. 19; pp. 56347 - 56368 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Springer US
01.06.2024
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1573-7721 1380-7501 1573-7721 |
| DOI | 10.1007/s11042-023-17763-y |
Cover
| Abstract | In block encryption algorithms the only nonlinear component, which creates confusion and diffusion, is substitution box (S-Box). Therefore, carefully selection of S-Box is an important task. In this article, an algorithm is presented for the construction of
8
×
8
S-Box based on all subfields of Galois Field
G
F
2
16
and linear fractional transformation. Proposed algorithm is easy and simple but significantly complex for the attackers as it utilizes all subfields of
G
F
(
2
16
)
corresponding to all primitive irreducible polynomials for making
G
F
(
2
16
)
. An illustrating S-Box is also developed which is showing good structural characteristics such as it has no fixed point with 108.5 nonlinearity and 0.5020 strict avalanche. In the last, illustrated S-Box is applied on images for checking the performance under various criteria available in the literature. Obtained results of analyses are compared to well-known S-Boxes and found better in the comparison. |
|---|---|
| AbstractList | In block encryption algorithms the only nonlinear component, which creates confusion and diffusion, is substitution box (S-Box). Therefore, carefully selection of S-Box is an important task. In this article, an algorithm is presented for the construction of
8
×
8
S-Box based on all subfields of Galois Field
G
F
2
16
and linear fractional transformation. Proposed algorithm is easy and simple but significantly complex for the attackers as it utilizes all subfields of
G
F
(
2
16
)
corresponding to all primitive irreducible polynomials for making
G
F
(
2
16
)
. An illustrating S-Box is also developed which is showing good structural characteristics such as it has no fixed point with 108.5 nonlinearity and 0.5020 strict avalanche. In the last, illustrated S-Box is applied on images for checking the performance under various criteria available in the literature. Obtained results of analyses are compared to well-known S-Boxes and found better in the comparison. In block encryption algorithms the only nonlinear component, which creates confusion and diffusion, is substitution box (S-Box). Therefore, carefully selection of S-Box is an important task. In this article, an algorithm is presented for the construction of 8×8 S-Box based on all subfields of Galois Field GF216 and linear fractional transformation. Proposed algorithm is easy and simple but significantly complex for the attackers as it utilizes all subfields of GF(216) corresponding to all primitive irreducible polynomials for making GF(216). An illustrating S-Box is also developed which is showing good structural characteristics such as it has no fixed point with 108.5 nonlinearity and 0.5020 strict avalanche. In the last, illustrated S-Box is applied on images for checking the performance under various criteria available in the literature. Obtained results of analyses are compared to well-known S-Boxes and found better in the comparison. |
| Author | Idrees, Bazgha Zafar, Sohail Rashid, Tabasam |
| Author_xml | – sequence: 1 givenname: Sohail surname: Zafar fullname: Zafar, Sohail email: sohailahmad04@gmail.com organization: Department of Mathematics, University of Management and Technology – sequence: 2 givenname: Bazgha surname: Idrees fullname: Idrees, Bazgha organization: Department of Mathematics, University of Management and Technology – sequence: 3 givenname: Tabasam surname: Rashid fullname: Rashid, Tabasam organization: Department of Mathematics, University of Management and Technology |
| BookMark | eNp9kM1OAyEUhYnRxPrzAq5I3OhilAvMMF02xlaTJm50TWCGqTRTUGAS-wY-trRjonHhCg6cc-_Jd4IOnXcGoQsgN0CIuI0AhNOCUFaAEBUrtgdoAqVghRAUDn_dj9FJjGtCoCopn6DPmcOqX_lg0-sGdz7gxruYwtAk6x32HY6DjsmmYa-1_8BaRdPiLPJPZ03f7lwr1Xsb8agX8ysK1TVWrsXt1qmNbXBvnVEBd0HtJ6sep6BczBs3avdwho461Udz_n2eopf5_fPdQ7F8WjzezZZFw2CaCl1TzkpFRF1D2XDB21ZT0QEnhglg3EBbckGg7pjQumItMRSAMwJTpjUodooux7lvwb8PJia59kPIfaJkpMosa6BldtWjqwk-xmA62di075lb214CkTvucuQuM3e55y63OUr_RN-C3aiw_T_ExlDMZrcy4afVP6kvkdWYtg |
| CitedBy_id | crossref_primary_10_1007_s11760_024_03301_2 |
| Cites_doi | 10.2478/amns.2021.1.00015 10.1109/TC.1979.1675242 10.1049/ip-e.1988.0044 10.1007/s11042-018-6250-8 10.1109/ACCESS.2019.2921708 10.1007/3-540-46416-6_32 10.1109/ACCESS.2021.3053998 10.24507/ijicic.16.01.331 10.1007/BF00630563 10.2478/amns.2020.1.00011 10.5560/zna.2013-0021 10.1109/ACCESS.2020.2988298 10.1155/2019/2847801 10.3390/e21030245 10.1007/s00521-018-3557-3 10.1007/s11042-018-6953-x 10.5897/IJPS11.531 10.2478/AMNS.2020.1.00046 10.1007/s11042-020-08995-3 10.2478/amns.2020.2.00024 10.3390/sym11030437 10.1109/ACCESS.2021.3072075 10.1007/3-540-39799-X_41 10.1007/978-1-84800-988-2 10.1007/3-540-48285-7_33 10.1155/2018/9389065 10.1007/s11071-013-0904-x 10.1002/j.1538-7305.1949.tb00928.x 10.1007/3-540-46885-4_53 10.1038/scientificamerican0573-15 10.1109/ACCESS.2019.2938513 10.1145/168588.168610 10.1007/s11042-019-08282-w 10.1007/s11042-020-08718-8 10.1016/j.physleta.2012.01.009 10.2478/AMNS.2020.2.00041 10.1007/s11277-022-09524-1 10.1007/s11277-020-07841-x 10.1631/FITEE.1800434 10.1007/s40314-015-0265-9 10.1109/ACCESS.2020.2975880 10.1109/ACCESS.2020.3010615 10.1007/s11042-020-10257-1 10.1155/2017/5101934 10.1007/s11277-019-06973-z 10.2298/PIM1307109L 10.1016/j.cjph.2019.05.038 10.1007/s11042-020-10048-8 10.2478/amns.2020.1.00033 10.3390/sym11030351 10.1007/s11277-018-5698-1 10.2478/amns.2020.1.00010 10.3390/info11020110 10.1371/journal.pone.0241890 10.1063/5.0061639 10.3390/cryptography3020013 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. |
| DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI Q9U |
| DOI | 10.1007/s11042-023-17763-y |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection (NTUSG) ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) Research Library ProQuest Central (Alumni) ProQuest Central Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection ProQuest One Community College ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global (OCUL) Computing Database ProQuest Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database (ProQuest) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central Basic |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
| DatabaseTitleList | ABI/INFORM Global (Corporate) |
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1573-7721 |
| EndPage | 56368 |
| ExternalDocumentID | 10_1007_s11042_023_17763_y |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3EH 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 8AO 8FE 8FG 8FL 8G5 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TH9 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADKFA AEZWR AFDZB AFHIU AFOHR AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PUEGO 7SC 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D MBDVC PHGZM PHGZT PKEHL PQEST PQGLB PQUKI Q9U |
| ID | FETCH-LOGICAL-c319t-b82435a078815c474ddb27f140e37134e1d547018f37bb63d0e211430193bb1a3 |
| IEDL.DBID | BENPR |
| ISSN | 1573-7721 1380-7501 |
| IngestDate | Fri Jul 25 09:37:26 EDT 2025 Wed Oct 01 04:51:41 EDT 2025 Thu Apr 24 22:56:16 EDT 2025 Fri Feb 21 02:40:13 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 19 |
| Keywords | Image encryption S-Box Galois field Linear fractional transformation |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-b82435a078815c474ddb27f140e37134e1d547018f37bb63d0e211430193bb1a3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 3060078125 |
| PQPubID | 54626 |
| PageCount | 22 |
| ParticipantIDs | proquest_journals_3060078125 crossref_citationtrail_10_1007_s11042_023_17763_y crossref_primary_10_1007_s11042_023_17763_y springer_journals_10_1007_s11042_023_17763_y |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20240600 |
| PublicationDateYYYYMMDD | 2024-06-01 |
| PublicationDate_xml | – month: 6 year: 2024 text: 20240600 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Dordrecht |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Multimedia tools and applications |
| PublicationTitleAbbrev | Multimed Tools Appl |
| PublicationYear | 2024 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | PieprzykJFinkelsteinGTowards effective nonlinear cryptosystem designIEE Proc E - Comput Digit Tech199813532533510.1049/ip-e.1988.0044 Hussain I, Anees A, Al-Maadeed TA, Mustafa MT (2019) Construction of S-box based on chaotic map and algebraic structures. MDPI, Symmetry 11. https://doi.org/10.3390/sym11030351 FarahMABGuesmiRKachouriASametMA new design of cryptosystem based on S-box and chaotic permutationMultimed Tools Appl202079191291915010.1007/s11042-020-08718-8 RafiqAKhanMConstruction of new s-boxes based on triangle groups and its applications in copyright protectionMultimed Tools Appl201978155271554410.1007/s11042-018-6953-x ShahTJahangirSAndradeAADDesign of new 4×4 S-box from finite commutative chain ringsComput Appl Math201736843857364205710.1007/s40314-015-0265-9 Shah T, Qureshi A (2019) S-box on subgroup of galois field. Cryptography 3. https://doi.org/10.3390/cryptography3020013 GaoWIdreesBZafarSRashidTConstruction of nonlinear component of block cipher by action of modular group PSL (2, Z) on projective line PL (GF (2 8))IEEE Access2020813673613674910.1109/ACCESS.2020.3010615 SeverMÖzdemirASNTRU over Galois ringsAppl Math Nonlinear Sci20216499506428172610.2478/AMNS.2020.2.00041 BhattiUAYuZLiJNawazSAMehmoodAZhangKYuanLHybrid watermarking algorithm using clifford algebra with arnold scrambling and chaotic encryptionIEEE Access20208763867639810.1109/ACCESS.2020.2988298 RazaqAUllahAAlolaiyanHYousafAA novel group theoretic and graphical approach for designing cryptographically strong nonlinear components of block ciphersWireless Pers Commun20201163165319010.1007/s11277-020-07841-x SiddiquiNYousafFMurtazaFEhatisham-ul-HaqMAshrafMUAlghamdiAMAlfakeehASA highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite fieldPLos One202015e024189010.1371/journal.pone.0241890 Lambić D, Živković M (2013) Comparison of random s-box generation method. In: Publications de l’institut mathématique nouvelle série, tome, vol 93. pp. 109–115. https://doi.org/10.2298/PIM1307109L Matsui M (1993) Linear cryptanalysis method for DES cipher. In: Proceedings of the workshop on the theory and application of of cryptographic techniques. pp 386–397 ShannonCCommunication theory of secrecy systemBell Syst Tech J1949286567153213310.1002/j.1538-7305.1949.tb00928.x HayatUAzamNAAsifMA method of generating 8× 8 substitution boxes based on elliptic curvesWireless Pers Commun201810143945110.1007/s11277-018-5698-1 Nyberg K (1991) Perfect nonlinear S-boxes. Berlin, Heidelberg, pp 378–3865 FarhanAKAliRSNatiqHAl-SaidiNMGA new S-box generation algorithm based on multistability behavior of a plasma perturbation modelIEEE Access2019712491412492410.1109/ACCESS.2019.2938513 ParidaPPradhanCGaoX-ZRoyDSBarikRKImage encryption and authentication with elliptic curve cryptography and multidimensional chaotic mapsIEEE Access20219761917620410.1109/ACCESS.2021.3072075 PieprzykJFinkelsteinGTowards effective nonlinear cryptosystem designIEE Proc E - Comput Digit Tech198813532533510.1049/ip-e.1988.0044 SunZNonlinear relationship based on range quadratic loss functionAppl Math Nonlinear Sci20205483492419169210.2478/amns.2020.2.00024 AlhadawiHSMajidMALambićDAhmadMA novel method of S-box design based on discrete chaotic maps and cuckoo search algorithmMultimed Tools Appl2021807333735010.1007/s11042-020-10048-8 AkgandüllerÖAtmacaSPDiscrete normal vector field approximation via time scale calculusAppl Math Nonlinear Sci20205349360409291510.2478/amns.2020.1.00033 Meier W, Staffelbach O (1990) Nonlinearity criteria for cryptographic functions. Berlin, Heidelberg, pp. 549–562 YousafMAAlolaiyanHAhmadMDilbarMRazaqAComparison of pre and post-action of a finite abelian group over certain nonlinear schemesIEEE Access20208397813979210.1109/ACCESS.2020.2975880 ShahzadIMushtaqQRazaqAConstruction of new s-box using action of quotient of the modular group for multimedia securityHindawi Secur Commun Netw201920191310.1155/2019/2847801 Gallian JA (2017) Contemporary abstract algebra. Cengage Learning RazaqAUllahAWaheedAA novel technique to improve nonlinearity of substitution box without disturbing its mathematical propertiesWireless Pers Commun20201112091210510.1007/s11277-019-06973-z ShahTHussainIGondalMAMahmoodHStatistical analysis of s-box in image encryption applications based on majority logic criterionInt J Phys Sci201164110412710.5897/IJPS11.531 AhmedHAZolkipliMFAhmadMA novel efficient substitution-box design based on firefly algorithm and discrete chaotic mapNeural Comput Appl2019317201721010.1007/s00521-018-3557-3 Nardo LG, Nepomuceno EG, Bastos GT, Santos TA, Butusov DN, Arias-Garcia J (2021) A reliable chaos-based cryptography using Galois field. Chaos 31. https://doi.org/10.1063/5.0061639 Seberry J, Zhang X-M, Zheng Y (1993) Systematic generation of cryptographically robust s-boxes (extended abstract). In Proceedings of the 1st ACM Conference on Computer and Communications Security. pp. 171–182 JahangirSShahTDesigning S-boxes triplet over a finite chain ring and its application in RGB image encryptionMultimed Tools Appl202079268852691110.1007/s11042-020-08995-3 BhattiUAYuanLYuZLiJNawazSAMehmoodAZhangKNew watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryptionMultimed Tools Appl202180133671338710.1007/s11042-020-10257-1 ZahidAHArshadMJAhmadMA novel construction of efficient substitution-boxes using cubic fractional transformationMDPI, Entropy201921245394322810.3390/e21030245 QiuY-HYangXLiZ-ZZhangCChenS-XInvestigating the impacts of artificial intelligence technology on technological innovation from a patent perspectiveAppl Math Nonlinear Sci2021612914010.2478/amns.2021.1.00015 WangYWongK-WLiCLiYA novel method to design S-box based on chaotic map and genetic algorithmPhys Lett A201237682783310.1016/j.physleta.2012.01.009 BihamEShamirADifferential cryptanalysis of DES-like cryptosystemsJ Cryptol19914372120278610.1007/BF00630563 ShahTShahDConstruction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over ℤ2Multimed Tools Appl2019781219123410.1007/s11042-018-6250-8 HorstFCryptography and computer privacySci Am1973228152310.1038/scientificamerican0573-15 RazaqAYousafAShuaibUSiddiquiNUllahAWaheedAA novel construction of substitution box involving coset diagram and a bijective mapSecur Commun Netw201710.1155/2017/5101934 AçikkapiMŞÖzkaynakFÖzerABSide-channel analysis of chaos-based substitution box structuresIEEE Access20197790307904310.1109/ACCESS.2019.2921708 JamalSSAttaullahShahTAlKhaldiAHTufailMNConstruction of new substitution boxes using linear fractional transformation and enhanced chaosChin J Phys201960564572397951110.1016/j.cjph.2019.05.038 ShahTQamarAHussainISubstitution box on maximal cyclic subgroup of units of a Galois ringZ Naturforsch A20136856757210.5560/zna.2013-0021 Kam JB, Davida GI (1979) Structured design of substitution-permutation encryption networks. IEEE Trans Comput 747–753 AlzaidiAAAhmadMAhmedHSSolamiEASine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic mapComplexity201810.1155/2018/9389065 Begum M, Uddin MS (2020) Digital image watermarking techniques: A review. Information 11. https://doi.org/10.3390/info11020110 Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A. Image steganography: A review of the recent advances. IEEE Access 9:23409–23423. https://doi.org/10.1109/ACCESS.2021.3053998 BozdumanHÇGAfacanESimulation of a homomorphic encryption systemAppl Math Nonlinear Sci20205479484409546410.2478/AMNS.2020.1.00046 IdreesBZafarSRashidTGaoWImage encryption algorithm using s-box and dynamic hénon bit level permutationMultimed Tools Appl2020796135616210.1007/s11042-019-08282-w El-BorhamyMMosalamNOn the existence of periodic solution and the transition to chaos of Rayleigh-Duffing equation with application of gyro dynamicAppl Math Nonlinear Sci2020593108408022410.2478/amns.2020.1.00010 Webster A, Tavares SE (1985) On the design of S-boxes. In: Proceedings of the conference on the theory and application of cryptographic techniques. pp. 523–534 GünerhanHÇelikEAnalytical and approximate solutions of fractional partial differential-algebraic equationsAppl Math Nonlinear Sci20205109120409291010.2478/amns.2020.1.00011 Wu W-l, Feng D-g, ZhangW-t (2009) Design and analysis of block cipher FarhanAKAliRSYasseinHRAl-SaidiNMGAbdul-MajeedGHA new approach to generate multi S-boxes based on RNA computingInt J Innov Comput Inf Control20201633134810.24507/ijicic.16.01.331 KhanMShahTGondalMAAn efficient technique for the construction of substitution box with chaotic partial differential equationNonlinear Dyn20137317951801308382110.1007/s11071-013-0904-x AzamNAHayatUUllahIEfficient construction of a substitution box based on a Mordell elliptic curve over a finite fieldFront Inf Technol Electron Eng2019201378138910.1631/FITEE.1800434 ZahidAHArshadMJAn innovative design of substitution-boxes using cubic polynomial mappingSymmerty20191143710.3390/sym11030437 ArshadBSiddiquiNHussainZEhatisham-ul-HaqMA novel scheme for designing secure substitution boxes (S-boxes) based on Mobius group and finite fieldWireless Pers Commun20221243527354810.1007/s11277-022-09524-1 Wilson RA (2009) The classical groups. In: Axler S, Ribet KA (eds) The finite simple groups. Springer-Verlag T Shah (17763_CR25) 2013; 68 E Biham (17763_CR55) 1991; 4 17763_CR52 Ö Akgandüller (17763_CR47) 2020; 5 17763_CR51 17763_CR53 17763_CR49 17763_CR45 I Shahzad (17763_CR17) 2019; 2019 N Siddiqui (17763_CR31) 2020; 15 17763_CR44 HA Ahmed (17763_CR41) 2019; 31 UA Bhatti (17763_CR3) 2020; 8 H Günerhan (17763_CR24) 2020; 5 HÇG Bozduman (17763_CR6) 2020; 5 17763_CR1 17763_CR2 17763_CR8 Z Sun (17763_CR48) 2020; 5 F Horst (17763_CR50) 1973; 228 17763_CR56 17763_CR14 17763_CR58 S Jahangir (17763_CR29) 2020; 79 MA Yousaf (17763_CR57) 2020; 8 MAB Farah (17763_CR38) 2020; 79 B Arshad (17763_CR28) 2022; 124 J Pieprzyk (17763_CR54) 1998; 135 UA Bhatti (17763_CR4) 2021; 80 T Shah (17763_CR33) 2019; 78 AH Zahid (17763_CR12) 2019; 21 M Sever (17763_CR5) 2021; 6 NA Azam (17763_CR21) 2019; 20 T Shah (17763_CR26) 2017; 36 Y-H Qiu (17763_CR34) 2021; 6 17763_CR27 AK Farhan (17763_CR11) 2020; 16 AH Zahid (17763_CR18) 2019; 11 AA Alzaidi (17763_CR42) 2018 HS Alhadawi (17763_CR37) 2021; 80 MŞ Açikkapi (17763_CR23) 2019; 7 T Shah (17763_CR59) 2011; 6 AK Farhan (17763_CR13) 2019; 7 Y Wang (17763_CR39) 2012; 376 U Hayat (17763_CR20) 2018; 101 A Rafiq (17763_CR16) 2019; 78 A Razaq (17763_CR10) 2020; 116 SS Jamal (17763_CR15) 2019; 60 J Pieprzyk (17763_CR43) 1988; 135 A Razaq (17763_CR32) 2017 M El-Borhamy (17763_CR22) 2020; 5 B Idrees (17763_CR19) 2020; 79 P Parida (17763_CR7) 2021; 9 17763_CR36 17763_CR35 W Gao (17763_CR30) 2020; 8 C Shannon (17763_CR9) 1949; 28 A Razaq (17763_CR46) 2020; 111 M Khan (17763_CR40) 2013; 73 |
| References_xml | – reference: ZahidAHArshadMJAn innovative design of substitution-boxes using cubic polynomial mappingSymmerty20191143710.3390/sym11030437 – reference: AlzaidiAAAhmadMAhmedHSSolamiEASine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic mapComplexity201810.1155/2018/9389065 – reference: HayatUAzamNAAsifMA method of generating 8× 8 substitution boxes based on elliptic curvesWireless Pers Commun201810143945110.1007/s11277-018-5698-1 – reference: Begum M, Uddin MS (2020) Digital image watermarking techniques: A review. Information 11. https://doi.org/10.3390/info11020110 – reference: RazaqAYousafAShuaibUSiddiquiNUllahAWaheedAA novel construction of substitution box involving coset diagram and a bijective mapSecur Commun Netw201710.1155/2017/5101934 – reference: El-BorhamyMMosalamNOn the existence of periodic solution and the transition to chaos of Rayleigh-Duffing equation with application of gyro dynamicAppl Math Nonlinear Sci2020593108408022410.2478/amns.2020.1.00010 – reference: FarhanAKAliRSNatiqHAl-SaidiNMGA new S-box generation algorithm based on multistability behavior of a plasma perturbation modelIEEE Access2019712491412492410.1109/ACCESS.2019.2938513 – reference: Lambić D, Živković M (2013) Comparison of random s-box generation method. In: Publications de l’institut mathématique nouvelle série, tome, vol 93. pp. 109–115. https://doi.org/10.2298/PIM1307109L – reference: YousafMAAlolaiyanHAhmadMDilbarMRazaqAComparison of pre and post-action of a finite abelian group over certain nonlinear schemesIEEE Access20208397813979210.1109/ACCESS.2020.2975880 – reference: PieprzykJFinkelsteinGTowards effective nonlinear cryptosystem designIEE Proc E - Comput Digit Tech199813532533510.1049/ip-e.1988.0044 – reference: Nyberg K (1991) Perfect nonlinear S-boxes. Berlin, Heidelberg, pp 378–3865 – reference: ShahzadIMushtaqQRazaqAConstruction of new s-box using action of quotient of the modular group for multimedia securityHindawi Secur Commun Netw201920191310.1155/2019/2847801 – reference: ShahTShahDConstruction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over ℤ2Multimed Tools Appl2019781219123410.1007/s11042-018-6250-8 – reference: Webster A, Tavares SE (1985) On the design of S-boxes. In: Proceedings of the conference on the theory and application of cryptographic techniques. pp. 523–534 – reference: Nardo LG, Nepomuceno EG, Bastos GT, Santos TA, Butusov DN, Arias-Garcia J (2021) A reliable chaos-based cryptography using Galois field. Chaos 31. https://doi.org/10.1063/5.0061639 – reference: ArshadBSiddiquiNHussainZEhatisham-ul-HaqMA novel scheme for designing secure substitution boxes (S-boxes) based on Mobius group and finite fieldWireless Pers Commun20221243527354810.1007/s11277-022-09524-1 – reference: FarahMABGuesmiRKachouriASametMA new design of cryptosystem based on S-box and chaotic permutationMultimed Tools Appl202079191291915010.1007/s11042-020-08718-8 – reference: AzamNAHayatUUllahIEfficient construction of a substitution box based on a Mordell elliptic curve over a finite fieldFront Inf Technol Electron Eng2019201378138910.1631/FITEE.1800434 – reference: RafiqAKhanMConstruction of new s-boxes based on triangle groups and its applications in copyright protectionMultimed Tools Appl201978155271554410.1007/s11042-018-6953-x – reference: GünerhanHÇelikEAnalytical and approximate solutions of fractional partial differential-algebraic equationsAppl Math Nonlinear Sci20205109120409291010.2478/amns.2020.1.00011 – reference: ShahTJahangirSAndradeAADDesign of new 4×4 S-box from finite commutative chain ringsComput Appl Math201736843857364205710.1007/s40314-015-0265-9 – reference: ShahTQamarAHussainISubstitution box on maximal cyclic subgroup of units of a Galois ringZ Naturforsch A20136856757210.5560/zna.2013-0021 – reference: BozdumanHÇGAfacanESimulation of a homomorphic encryption systemAppl Math Nonlinear Sci20205479484409546410.2478/AMNS.2020.1.00046 – reference: Seberry J, Zhang X-M, Zheng Y (1993) Systematic generation of cryptographically robust s-boxes (extended abstract). In Proceedings of the 1st ACM Conference on Computer and Communications Security. pp. 171–182 – reference: RazaqAUllahAWaheedAA novel technique to improve nonlinearity of substitution box without disturbing its mathematical propertiesWireless Pers Commun20201112091210510.1007/s11277-019-06973-z – reference: SunZNonlinear relationship based on range quadratic loss functionAppl Math Nonlinear Sci20205483492419169210.2478/amns.2020.2.00024 – reference: Shah T, Qureshi A (2019) S-box on subgroup of galois field. Cryptography 3. https://doi.org/10.3390/cryptography3020013 – reference: GaoWIdreesBZafarSRashidTConstruction of nonlinear component of block cipher by action of modular group PSL (2, Z) on projective line PL (GF (2 8))IEEE Access2020813673613674910.1109/ACCESS.2020.3010615 – reference: BihamEShamirADifferential cryptanalysis of DES-like cryptosystemsJ Cryptol19914372120278610.1007/BF00630563 – reference: ParidaPPradhanCGaoX-ZRoyDSBarikRKImage encryption and authentication with elliptic curve cryptography and multidimensional chaotic mapsIEEE Access20219761917620410.1109/ACCESS.2021.3072075 – reference: ShannonCCommunication theory of secrecy systemBell Syst Tech J1949286567153213310.1002/j.1538-7305.1949.tb00928.x – reference: AhmedHAZolkipliMFAhmadMA novel efficient substitution-box design based on firefly algorithm and discrete chaotic mapNeural Comput Appl2019317201721010.1007/s00521-018-3557-3 – reference: PieprzykJFinkelsteinGTowards effective nonlinear cryptosystem designIEE Proc E - Comput Digit Tech198813532533510.1049/ip-e.1988.0044 – reference: SiddiquiNYousafFMurtazaFEhatisham-ul-HaqMAshrafMUAlghamdiAMAlfakeehASA highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite fieldPLos One202015e024189010.1371/journal.pone.0241890 – reference: FarhanAKAliRSYasseinHRAl-SaidiNMGAbdul-MajeedGHA new approach to generate multi S-boxes based on RNA computingInt J Innov Comput Inf Control20201633134810.24507/ijicic.16.01.331 – reference: AkgandüllerÖAtmacaSPDiscrete normal vector field approximation via time scale calculusAppl Math Nonlinear Sci20205349360409291510.2478/amns.2020.1.00033 – reference: BhattiUAYuZLiJNawazSAMehmoodAZhangKYuanLHybrid watermarking algorithm using clifford algebra with arnold scrambling and chaotic encryptionIEEE Access20208763867639810.1109/ACCESS.2020.2988298 – reference: ShahTHussainIGondalMAMahmoodHStatistical analysis of s-box in image encryption applications based on majority logic criterionInt J Phys Sci201164110412710.5897/IJPS11.531 – reference: Gallian JA (2017) Contemporary abstract algebra. Cengage Learning – reference: AçikkapiMŞÖzkaynakFÖzerABSide-channel analysis of chaos-based substitution box structuresIEEE Access20197790307904310.1109/ACCESS.2019.2921708 – reference: SeverMÖzdemirASNTRU over Galois ringsAppl Math Nonlinear Sci20216499506428172610.2478/AMNS.2020.2.00041 – reference: IdreesBZafarSRashidTGaoWImage encryption algorithm using s-box and dynamic hénon bit level permutationMultimed Tools Appl2020796135616210.1007/s11042-019-08282-w – reference: BhattiUAYuanLYuZLiJNawazSAMehmoodAZhangKNew watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryptionMultimed Tools Appl202180133671338710.1007/s11042-020-10257-1 – reference: Wilson RA (2009) The classical groups. In: Axler S, Ribet KA (eds) The finite simple groups. Springer-Verlag – reference: WangYWongK-WLiCLiYA novel method to design S-box based on chaotic map and genetic algorithmPhys Lett A201237682783310.1016/j.physleta.2012.01.009 – reference: QiuY-HYangXLiZ-ZZhangCChenS-XInvestigating the impacts of artificial intelligence technology on technological innovation from a patent perspectiveAppl Math Nonlinear Sci2021612914010.2478/amns.2021.1.00015 – reference: Matsui M (1993) Linear cryptanalysis method for DES cipher. In: Proceedings of the workshop on the theory and application of of cryptographic techniques. pp 386–397 – reference: Meier W, Staffelbach O (1990) Nonlinearity criteria for cryptographic functions. Berlin, Heidelberg, pp. 549–562 – reference: Kam JB, Davida GI (1979) Structured design of substitution-permutation encryption networks. IEEE Trans Comput 747–753 – reference: AlhadawiHSMajidMALambićDAhmadMA novel method of S-box design based on discrete chaotic maps and cuckoo search algorithmMultimed Tools Appl2021807333735010.1007/s11042-020-10048-8 – reference: JamalSSAttaullahShahTAlKhaldiAHTufailMNConstruction of new substitution boxes using linear fractional transformation and enhanced chaosChin J Phys201960564572397951110.1016/j.cjph.2019.05.038 – reference: HorstFCryptography and computer privacySci Am1973228152310.1038/scientificamerican0573-15 – reference: RazaqAUllahAAlolaiyanHYousafAA novel group theoretic and graphical approach for designing cryptographically strong nonlinear components of block ciphersWireless Pers Commun20201163165319010.1007/s11277-020-07841-x – reference: Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A. Image steganography: A review of the recent advances. IEEE Access 9:23409–23423. https://doi.org/10.1109/ACCESS.2021.3053998 – reference: Hussain I, Anees A, Al-Maadeed TA, Mustafa MT (2019) Construction of S-box based on chaotic map and algebraic structures. MDPI, Symmetry 11. https://doi.org/10.3390/sym11030351 – reference: JahangirSShahTDesigning S-boxes triplet over a finite chain ring and its application in RGB image encryptionMultimed Tools Appl202079268852691110.1007/s11042-020-08995-3 – reference: ZahidAHArshadMJAhmadMA novel construction of efficient substitution-boxes using cubic fractional transformationMDPI, Entropy201921245394322810.3390/e21030245 – reference: KhanMShahTGondalMAAn efficient technique for the construction of substitution box with chaotic partial differential equationNonlinear Dyn20137317951801308382110.1007/s11071-013-0904-x – reference: Wu W-l, Feng D-g, ZhangW-t (2009) Design and analysis of block cipher – volume: 6 start-page: 129 year: 2021 ident: 17763_CR34 publication-title: Appl Math Nonlinear Sci doi: 10.2478/amns.2021.1.00015 – ident: 17763_CR51 doi: 10.1109/TC.1979.1675242 – volume: 135 start-page: 325 year: 1998 ident: 17763_CR54 publication-title: IEE Proc E - Comput Digit Tech doi: 10.1049/ip-e.1988.0044 – volume: 78 start-page: 1219 year: 2019 ident: 17763_CR33 publication-title: Multimed Tools Appl doi: 10.1007/s11042-018-6250-8 – volume: 7 start-page: 79030 year: 2019 ident: 17763_CR23 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2921708 – ident: 17763_CR44 doi: 10.1007/3-540-46416-6_32 – ident: 17763_CR2 doi: 10.1109/ACCESS.2021.3053998 – volume: 16 start-page: 331 year: 2020 ident: 17763_CR11 publication-title: Int J Innov Comput Inf Control doi: 10.24507/ijicic.16.01.331 – volume: 4 start-page: 3 year: 1991 ident: 17763_CR55 publication-title: J Cryptol doi: 10.1007/BF00630563 – volume: 5 start-page: 109 year: 2020 ident: 17763_CR24 publication-title: Appl Math Nonlinear Sci doi: 10.2478/amns.2020.1.00011 – volume: 68 start-page: 567 year: 2013 ident: 17763_CR25 publication-title: Z Naturforsch A doi: 10.5560/zna.2013-0021 – volume: 8 start-page: 76386 year: 2020 ident: 17763_CR3 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2988298 – volume: 2019 start-page: 13 year: 2019 ident: 17763_CR17 publication-title: Hindawi Secur Commun Netw doi: 10.1155/2019/2847801 – volume: 21 start-page: 245 year: 2019 ident: 17763_CR12 publication-title: MDPI, Entropy doi: 10.3390/e21030245 – volume: 31 start-page: 7201 year: 2019 ident: 17763_CR41 publication-title: Neural Comput Appl doi: 10.1007/s00521-018-3557-3 – volume: 78 start-page: 15527 year: 2019 ident: 17763_CR16 publication-title: Multimed Tools Appl doi: 10.1007/s11042-018-6953-x – volume: 135 start-page: 325 year: 1988 ident: 17763_CR43 publication-title: IEE Proc E - Comput Digit Tech doi: 10.1049/ip-e.1988.0044 – volume: 6 start-page: 4110 year: 2011 ident: 17763_CR59 publication-title: Int J Phys Sci doi: 10.5897/IJPS11.531 – volume: 5 start-page: 479 year: 2020 ident: 17763_CR6 publication-title: Appl Math Nonlinear Sci doi: 10.2478/AMNS.2020.1.00046 – volume: 79 start-page: 26885 year: 2020 ident: 17763_CR29 publication-title: Multimed Tools Appl doi: 10.1007/s11042-020-08995-3 – volume: 5 start-page: 483 year: 2020 ident: 17763_CR48 publication-title: Appl Math Nonlinear Sci doi: 10.2478/amns.2020.2.00024 – volume: 11 start-page: 437 year: 2019 ident: 17763_CR18 publication-title: Symmerty doi: 10.3390/sym11030437 – volume: 9 start-page: 76191 year: 2021 ident: 17763_CR7 publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3072075 – ident: 17763_CR52 doi: 10.1007/3-540-39799-X_41 – ident: 17763_CR36 doi: 10.1007/978-1-84800-988-2 – ident: 17763_CR58 doi: 10.1007/3-540-48285-7_33 – year: 2018 ident: 17763_CR42 publication-title: Complexity doi: 10.1155/2018/9389065 – volume: 73 start-page: 1795 year: 2013 ident: 17763_CR40 publication-title: Nonlinear Dyn doi: 10.1007/s11071-013-0904-x – volume: 28 start-page: 656 year: 1949 ident: 17763_CR9 publication-title: Bell Syst Tech J doi: 10.1002/j.1538-7305.1949.tb00928.x – ident: 17763_CR45 doi: 10.1007/3-540-46885-4_53 – volume: 228 start-page: 15 year: 1973 ident: 17763_CR50 publication-title: Sci Am doi: 10.1038/scientificamerican0573-15 – volume: 7 start-page: 124914 year: 2019 ident: 17763_CR13 publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2938513 – ident: 17763_CR56 doi: 10.1145/168588.168610 – volume: 79 start-page: 6135 year: 2020 ident: 17763_CR19 publication-title: Multimed Tools Appl doi: 10.1007/s11042-019-08282-w – volume: 79 start-page: 19129 year: 2020 ident: 17763_CR38 publication-title: Multimed Tools Appl doi: 10.1007/s11042-020-08718-8 – volume: 376 start-page: 827 year: 2012 ident: 17763_CR39 publication-title: Phys Lett A doi: 10.1016/j.physleta.2012.01.009 – volume: 6 start-page: 499 year: 2021 ident: 17763_CR5 publication-title: Appl Math Nonlinear Sci doi: 10.2478/AMNS.2020.2.00041 – volume: 124 start-page: 3527 year: 2022 ident: 17763_CR28 publication-title: Wireless Pers Commun doi: 10.1007/s11277-022-09524-1 – volume: 116 start-page: 3165 year: 2020 ident: 17763_CR10 publication-title: Wireless Pers Commun doi: 10.1007/s11277-020-07841-x – volume: 20 start-page: 1378 year: 2019 ident: 17763_CR21 publication-title: Front Inf Technol Electron Eng doi: 10.1631/FITEE.1800434 – volume: 36 start-page: 843 year: 2017 ident: 17763_CR26 publication-title: Comput Appl Math doi: 10.1007/s40314-015-0265-9 – volume: 8 start-page: 39781 year: 2020 ident: 17763_CR57 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2975880 – ident: 17763_CR35 – volume: 8 start-page: 136736 year: 2020 ident: 17763_CR30 publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3010615 – volume: 80 start-page: 13367 year: 2021 ident: 17763_CR4 publication-title: Multimed Tools Appl doi: 10.1007/s11042-020-10257-1 – year: 2017 ident: 17763_CR32 publication-title: Secur Commun Netw doi: 10.1155/2017/5101934 – volume: 111 start-page: 2091 year: 2020 ident: 17763_CR46 publication-title: Wireless Pers Commun doi: 10.1007/s11277-019-06973-z – ident: 17763_CR49 – ident: 17763_CR53 doi: 10.2298/PIM1307109L – volume: 60 start-page: 564 year: 2019 ident: 17763_CR15 publication-title: Chin J Phys doi: 10.1016/j.cjph.2019.05.038 – volume: 80 start-page: 7333 year: 2021 ident: 17763_CR37 publication-title: Multimed Tools Appl doi: 10.1007/s11042-020-10048-8 – volume: 5 start-page: 349 year: 2020 ident: 17763_CR47 publication-title: Appl Math Nonlinear Sci doi: 10.2478/amns.2020.1.00033 – ident: 17763_CR14 doi: 10.3390/sym11030351 – volume: 101 start-page: 439 year: 2018 ident: 17763_CR20 publication-title: Wireless Pers Commun doi: 10.1007/s11277-018-5698-1 – volume: 5 start-page: 93 year: 2020 ident: 17763_CR22 publication-title: Appl Math Nonlinear Sci doi: 10.2478/amns.2020.1.00010 – ident: 17763_CR1 doi: 10.3390/info11020110 – volume: 15 start-page: e0241890 year: 2020 ident: 17763_CR31 publication-title: PLos One doi: 10.1371/journal.pone.0241890 – ident: 17763_CR8 doi: 10.1063/5.0061639 – ident: 17763_CR27 doi: 10.3390/cryptography3020013 |
| SSID | ssj0016524 |
| Score | 2.3661146 |
| Snippet | In block encryption algorithms the only nonlinear component, which creates confusion and diffusion, is substitution box (S-Box). Therefore, carefully selection... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 56347 |
| SubjectTerms | Algebra Algorithms Computer Communication Networks Computer Science Construction Cryptography Data encryption Data Structures and Information Theory Diffusion barriers Multimedia Multimedia Information Systems Nonlinearity Polynomials Special Purpose and Application-Based Systems Substitutes |
| SummonAdditionalLinks | – databaseName: SpringerLINK - Czech Republic Consortium dbid: AGYKE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB60XvTgW6xWycGDoluafWS7xyJ9oOjJgp6WJJtose5Ku4L1F_iznezD1aKClyUhyRKSmcw3ZOYLwJGyI6mpRidH29oyBF1WwH0s-VrpNvOcVmASnK-u2WDoXtx6t0VS2LSMdi-vJLOTukp2oyaVBG2MRX3UCmu2CEsZ31YNljr9u8vu5-0B82y3SJD5eeR3I1Qhy7nL0MzG9NZgWM4uDy15bL6koinf5ogb_zv9dVgtQCfp5FKyAQsq3oS18kEHUuj3Jqx8YSfcgvdOTPj4PpmM0ocnguCWyKTimyWJJlM8dbJQA1MXySsxNjEiWMGWLDbO9EIblIymJK_3e8c2ZSeExxGJZjF_GklikC6fED3JkyxwpukXOJ3E2zDsdW_OB1bxcIMlUaNTS7RtRGG8ZajqPen6bhQJ29foyynH5K4qGnmu36Jt7fhCMCdqKfRDXTxrAkcIyp0dqMVJrHaBeA5TzNOccabcQAohPRSuth0IgV_K60DLnQxlwWpuHtcYhxUfs1n4EBc-zBY-nNXh9HPMc87p8WfvRikgYaHf0xAdLQOuEB3W4azc76r597_t_a_7PizbiKLy2LQG1HCP1QGioFQcFkL_AbVfAJ4 priority: 102 providerName: Springer Nature |
| Title | An algorithm for construction of substitution box based on subfield of galois field GF(216) and dynamic linear fractional transformation |
| URI | https://link.springer.com/article/10.1007/s11042-023-17763-y https://www.proquest.com/docview/3060078125 |
| Volume | 83 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1573-7721 dateEnd: 20241105 omitProxy: false ssIdentifier: ssj0016524 issn: 1573-7721 databaseCode: ADMLS dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1573-7721 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016524 issn: 1573-7721 databaseCode: AFBBN dateStart: 19970101 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1573-7721 dateEnd: 20241105 omitProxy: true ssIdentifier: ssj0016524 issn: 1573-7721 databaseCode: BENPR dateStart: 20240101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1573-7721 dateEnd: 20241105 omitProxy: true ssIdentifier: ssj0016524 issn: 1573-7721 databaseCode: 8FG dateStart: 19970101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1573-7721 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016524 issn: 1573-7721 databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1573-7721 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0016524 issn: 1573-7721 databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3BbtQwEB21uxc4tFBALJSVDxxAEBE7iZMcENpFm61ArBBipXKK7NimldqkdPdA_6CfzUziNAWJXpJYdqwk4_E8xzNvAF5aYSrHHS5ynHABEXQFuUrxKnXWZTKJwpwCnL-s5NE6_nScHO_Aqo-FIbfKfk5sJ2rTVPSP_B1CWzJnaI8_XPwKKGsU7a72KTSUT61g3rcUY7swFsSMNYLxfLH6-u1mX0EmPs1tFgZoK7kPo-mC6TiFqqANC3iKWhdc_W2qBvz5z5Zpa4mKB7DnISSbdTJ_CDu2PoD9Pj0D89p6APdvcQ0-gutZzdTZT3yl7ck5Q6jKqmZgj2WNYxucQ1rHASrr5jcjC2cYFrCm9XSjVmhRmtMN68rL4pXg8jVTtWGmy23PCLeqS-Yuu5AJfNLtLXDc1I9hXSy-fzwKfBqGoEL93AY6E4ipVEjE80kVp7ExWqQOV2Y2okhUy00SpyHPXJRqLSMTWlxVxjhz5JHWXEVPYFQ3tX0KLImklYlTUkkb55XWVYJDJRO51njkagK8_-Jl5TnKKVXGWTmwK5OUSpRS2UqpvJrAm5t7LjqGjjtbH_aCLL22bsphbE3gbS_cofr_vT27u7fncE8gBuo8yw5hhDK1LxDDbPUUdrNiOYXxrJjPV3Re_vi8mPrhirVrMfsD717zBg |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtQwEB6V9gAcSikgFtriA0ggsIidxEkOFerfsqXtCqFW6i34Fyq1SdtdCfYNeCqejXHiNAWJ3nqJYjmxIs945pvY8w3AS8uNdsxhkOO4o56gixYyw7vMWZeLNI4Kn-B8MBajo-TTcXo8B7-7XBh_rLKziY2hNrX2_8jfI7T17gz98YfzC-qrRvnd1a6EhgylFcx6QzEWEjv27OwHhnCT9d1tlPcrzoc7h1sjGqoMUI3qN6Uq5wgZZOR51VOdZIkximcOAw8b-0RLy0yaZBHLXZwpJWITWQyaElwYRawUkzGOewcWkjgpMPhb2NwZf_5ytY8h0lBWN48o-mYW0nba5D3mU2PQZ1KW4Sqns79dY493_9mibTzfcAkWA2QlG62OPYQ5Wy3Dg64cBAnWYRnuX-M2fAS_NioiT7_hFE6_nxGExkTXPVstqR2ZoM1qDir4tqp_Eu9RDcEG9jQn6_xT6MHqkwlp2x-HrzkTb4isDDGzSp6daOJxsrwk7rJN0cAvnV4D43X1GI5uRSBPYL6qK_sUSBoLK1InhRQ2KbRSOkXVzHmhFF6ZHADrZrzUgRPdl-Y4LXs2Zy-lEqVUNlIqZwN4e_XOecsIcuPTK50gy2AdJmWvywN41wm37_7_aM9uHu0F3B0dHuyX-7vjvedwjyP-ak-1rcA8yteuIn6aqrWgpAS-3va6-AM95ih0 |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9VAFD5BTIwufKDGq6Cz0ESjEzrTdtouCCFiAVHiQhJ2ZZ5KAi1yb6L3H_ib_HWc0wdFE9mxaTqZdtLMeX2ncx4AL710NoiATk6QgVOBLl7oDO-y4EOu0jgqKMH5857a3k8-HqQHC_BnyIWhsMpBJ7aK2jWW_pGvIrQlc4b2eDX0YRFfNsv10x-cOkjRSevQTqNjkV0__4nu23RtZxNp_UrK8sPX99u87zDALbLejJtcIlzQEdVUT22SJc4ZmQV0OnxMSZZeuDTJIpGHODNGxS7y6DAlKBRFbIzQMa57A25mVMWdstTLrYsTDJX2DXXziKNVFn3CTpe2JygpBq0lFxnKN5__bRRHpPvP4Wxr88r7cLcHq2yj464HsODrJbg3NIJgvV5YgjuXqho-hN8bNdPH33DDZt9PGIJiZpuxTi1rApuitmpDFGhsml-MbKljOMCZNqaOnkLb1RxNWTfeKl9Lod4wXTvm5rU-ObKMELI-Y-GsS87AL51dguFN_Qj2r4Ucj2Gxbmr_BFgaK6_SoJVWPimsMTZFpsxlYQxehZ6AGHa8sn01dGrKcVyNdZyJShVSqWqpVM0n8PbindOuFsiVTy8PhKx6vTCtRi6ewLuBuOP0_1d7evVqL-AWSkP1aWdv9xnclgi8unC2ZVhE8voVBE4z87zlUAaH1y0S5wzFJg4 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+algorithm+for+construction+of+substitution+box+based+on+subfield+of+galois+field+%24%24GF%28%7B2%7D%5E%7B16%7D%29%24%24+and+dynamic+linear+fractional+transformation&rft.jtitle=Multimedia+tools+and+applications&rft.au=Zafar%2C+Sohail&rft.au=Idrees%2C+Bazgha&rft.au=Rashid%2C+Tabasam&rft.date=2024-06-01&rft.issn=1573-7721&rft.eissn=1573-7721&rft.volume=83&rft.issue=19&rft.spage=56347&rft.epage=56368&rft_id=info:doi/10.1007%2Fs11042-023-17763-y&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11042_023_17763_y |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1573-7721&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1573-7721&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1573-7721&client=summon |