Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    A Mathematical Approach for Generating a Highly Non-Linear Substitution Box Using Quadratic Fractional Transformation

    Abid Mahboob1, Muhammad Asif2, Rana Muhammad Zulqarnain3,*, Imran Saddique4, Hijaz Ahmad5, Sameh Askar6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2565-2578, 2023, DOI:10.32604/cmc.2023.040371

    Abstract Nowadays, one of the most important difficulties is the protection and privacy of confidential data. To address these problems, numerous organizations rely on the use of cryptographic techniques to secure data from illegal activities and assaults. Modern cryptographic ciphers use the non-linear component of block cipher to ensure the robust encryption process and lawful decoding of plain data during the decryption phase. For the designing of a secure substitution box (S-box), non-linearity (NL) which is an algebraic property of the S-box has great importance. Consequently, the main focus of cryptographers is to achieve the S-box with a high value of… More >

  • Open Access

    ARTICLE

    Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion

    Musheer Ahmad1, Reem Ibrahim Alkanhel2,*, Naglaa F. Soliman2, Abeer D. Algarni2, Fathi E. Abd El-Samie3, Walid El-Shafai3,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2361-2380, 2023, DOI:10.32604/csse.2023.038439

    Abstract Patient privacy and data protection have been crucial concerns in E-healthcare systems for many years. In modern-day applications, patient data usually holds clinical imagery, records, and other medical details. Lately, the Internet of Medical Things (IoMT), equipped with cloud computing, has come out to be a beneficial paradigm in the healthcare field. However, the openness of networks and systems leads to security threats and illegal access. Therefore, reliable, fast, and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network. This paper… More >

  • Open Access

    ARTICLE

    Novel Scheme for Robust Confusion Component Selection Based on Pythagorean Fuzzy Set

    Nabilah Abughazalah1, Mohsin Iqbal2, Majid Khan3,*, Iqtadar Hussain4,5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6523-6534, 2023, DOI:10.32604/cmc.2022.031859

    Abstract The substitution box, often known as an S-box, is a nonlinear component that is a part of several block ciphers. Its purpose is to protect cryptographic algorithms from a variety of cryptanalytic assaults. A MultiCriteria Decision Making (MCDM) problem has a complex selection procedure because of having many options and criteria to choose from. Because of this, statistical methods are necessary to assess the performance score of each S-box and decide which option is the best one available based on this score. Using the Pythagorean Fuzzy-based Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) method, the major… More >

  • Open Access

    ARTICLE

    Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher

    Hafeez ur Rehman1,*, Tariq Shah1, Mohammad Mazyad Hazzazi2, Ali Alshehri3, Bassfar Zaid4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2913-2930, 2022, DOI:10.32604/cmc.2022.028765

    Abstract Elliptic curves (ECs) are deemed one of the most solid structures against modern computational attacks because of their small key size and high security. In many well-known cryptosystems, the substitution box (S-box) is used as the only nonlinear portion of a security system. Recently, it has been shown that using dynamic S-boxes rather than static S-boxes increases the security of a cryptosystem. The conferred study also extends the practical application of ECs in designing the nonlinear components of block ciphers in symmetric key cryptography. In this study, instead of the Mordell elliptic curve (MEC) over the prime field, the Galois… More >

  • Open Access

    ARTICLE

    Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms

    Muhammad Fahad Khan1,2,*, Khalid Saleem1, Mohammed Alotaibi3, Mohammad Mazyad Hazzazi4, Eid Rehman2, Aaqif Afzaal Abbasi2, Muhammad Asif Gondal5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2679-2696, 2022, DOI:10.32604/cmc.2022.027655

    Abstract Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In this regard, block cipher has been one of the most reliable options through which data security is accomplished. The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes. For the… More >

  • Open Access

    ARTICLE

    Construction of Key-dependent S-box for Secure Cloud Storage

    A. Indumathi*, G. Sumathi

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1509-1524, 2022, DOI:10.32604/iasc.2022.022743

    Abstract As cloud storage systems have developed and been applied in complex environments, their data security has become more prevalent in recent years. The issue has been approached through many models. Data is encrypted and stored in these models. One of the most widely used encryption methods is the Advanced Encryption Standard (AES). In AES, the Substitution box(S-box) is playing a significant part in imparting the job of confusion. The security of the entire cryptosystem depends on its nonlinearity. In this work, a robust and secure S-box is constructed using a novel method, i.e., fingerprint features-based permutation function. Two stages are… More >

Displaying 1-10 on page 1 of 6. Per Page