S-box optimisation using heuristic methods
Algorithms; Cryptography; Heuristic algorithms; Optimization; Redundancy; Security of data; Heuristic; Nonlinearity; Optimisations; Redundancy removal; S-box; S-boxes; Substitution boxes; Heuristic methods
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Conference Paper |
Published: |
Institute for Mathematical Research (INSPEM)
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-22948 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-229482023-05-29T14:13:36Z S-box optimisation using heuristic methods Isa H. Jamil N. Z'Aba M.R. 56432795500 36682671900 24726154700 Algorithms; Cryptography; Heuristic algorithms; Optimization; Redundancy; Security of data; Heuristic; Nonlinearity; Optimisations; Redundancy removal; S-box; S-boxes; Substitution boxes; Heuristic methods Isa et al. (2013, 2016) proposed two heuristic algorithms (redundancy removal and bee waggle dance) to construct cryptographically strong substitution boxes (S-boxes). The resulting S-boxes produced by these algorithms are suitable for cryptographic use. Inspired by their work, this paper explores a new method to optimise an S-box by integrating these two algorithms. Our experiments show that at least three cryptographically strong S-boxes can be produced by the new method. The results also improves upon a previous construction by Mamadolimov et al. (2013) which utilises the redundancy removal algorithm. � 2016, Institute for Mathematical Research (INSPEM). All rights reserved. Final 2023-05-29T06:13:35Z 2023-05-29T06:13:35Z 2016 Conference Paper 2-s2.0-84984604127 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84984604127&partnerID=40&md5=98c657787a8ce54e3ca4e7d22b160582 https://irepository.uniten.edu.my/handle/123456789/22948 120 128 Institute for Mathematical Research (INSPEM) Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
Algorithms; Cryptography; Heuristic algorithms; Optimization; Redundancy; Security of data; Heuristic; Nonlinearity; Optimisations; Redundancy removal; S-box; S-boxes; Substitution boxes; Heuristic methods |
author2 |
56432795500 |
author_facet |
56432795500 Isa H. Jamil N. Z'Aba M.R. |
format |
Conference Paper |
author |
Isa H. Jamil N. Z'Aba M.R. |
spellingShingle |
Isa H. Jamil N. Z'Aba M.R. S-box optimisation using heuristic methods |
author_sort |
Isa H. |
title |
S-box optimisation using heuristic methods |
title_short |
S-box optimisation using heuristic methods |
title_full |
S-box optimisation using heuristic methods |
title_fullStr |
S-box optimisation using heuristic methods |
title_full_unstemmed |
S-box optimisation using heuristic methods |
title_sort |
s-box optimisation using heuristic methods |
publisher |
Institute for Mathematical Research (INSPEM) |
publishDate |
2023 |
_version_ |
1806426023324024832 |
score |
13.214268 |