Publication: S-box optimisation using heuristic methods
| dc.contributor.author | Isa H. | en_US |
| dc.contributor.author | Jamil N. | en_US |
| dc.contributor.author | Z'Aba M.R. | en_US |
| dc.contributor.authorid | 56432795500 | en_US |
| dc.contributor.authorid | 36682671900 | en_US |
| dc.contributor.authorid | 24726154700 | en_US |
| dc.date.accessioned | 2023-05-29T06:13:35Z | |
| dc.date.available | 2023-05-29T06:13:35Z | |
| dc.date.issued | 2016 | |
| dc.description | Algorithms; Cryptography; Heuristic algorithms; Optimization; Redundancy; Security of data; Heuristic; Nonlinearity; Optimisations; Redundancy removal; S-box; S-boxes; Substitution boxes; Heuristic methods | en_US |
| dc.description.abstract | Isa et al. (2013, 2016) proposed two heuristic algorithms (redundancy removal and bee waggle dance) to construct cryptographically strong substitution boxes (S-boxes). The resulting S-boxes produced by these algorithms are suitable for cryptographic use. Inspired by their work, this paper explores a new method to optimise an S-box by integrating these two algorithms. Our experiments show that at least three cryptographically strong S-boxes can be produced by the new method. The results also improves upon a previous construction by Mamadolimov et al. (2013) which utilises the redundancy removal algorithm. � 2016, Institute for Mathematical Research (INSPEM). All rights reserved. | en_US |
| dc.description.nature | Final | en_US |
| dc.identifier.epage | 128 | |
| dc.identifier.scopus | 2-s2.0-84984604127 | |
| dc.identifier.spage | 120 | |
| dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84984604127&partnerID=40&md5=98c657787a8ce54e3ca4e7d22b160582 | |
| dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/22948 | |
| dc.publisher | Institute for Mathematical Research (INSPEM) | en_US |
| dc.source | Scopus | |
| dc.sourcetitle | Proceedings of the 5th International Cryptology and Information Security Conference 2016, CRYPTOLOGY 2016 | |
| dc.title | S-box optimisation using heuristic methods | en_US |
| dc.type | Conference Paper | en_US |
| dspace.entity.type | Publication |