首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   1篇
化学工业   2篇
无线电   4篇
一般工业技术   2篇
自动化技术   4篇
  2023年   1篇
  2022年   3篇
  2021年   3篇
  2018年   2篇
  2017年   1篇
  2016年   1篇
  1991年   1篇
排序方式: 共有12条查询结果,搜索用时 15 毫秒
1.
A substitution box (S-Box) is a crucial component of contemporary cryptosystems that provide data protection in block ciphers. At the moment, chaotic maps are being created and extensively used to generate these S-Boxes as a chaotic map assists in providing disorder and resistance to combat cryptanalytical attempts. In this paper, the construction of a dynamic S-Box using a cipher key is proposed using a novel chaotic map and an innovative tweaking approach. The projected chaotic map and the proposed tweak approach are presented for the first time and the use of parameters in their working makes both of these dynamic in nature. The tweak approach employs cubic polynomials while permuting the values of an initial S-Box to enhance its cryptographic fort. Values of the parameters are provided using the cipher key and a small variation in values of these parameters results in a completely different unique S-Box. Comparative analysis and exploration confirmed that the projected chaotic map exhibits a significant amount of chaotic complexity. The security assessment in terms of bijectivity, nonlinearity, bits independence, strict avalanche, linear approximation probability, and differential probability criteria are utilized to critically investigate the effectiveness of the proposed S-Box against several assaults. The proposed S-Box’s cryptographic performance is comparable to those of recently projected S-Boxes for its adaption in real-world security applications. The comparative scrutiny pacifies the genuine potential of the proposed S-Box in terms of its applicability for data security.  相似文献   
2.
Multimedia Tools and Applications - Substitution-boxes have significant role in block ciphers as they are the only component which offers nonlinearity in the anticipated symmetric encryption...  相似文献   
3.
Bio-/environment-friendly cationic gemini surfactant, ethane-1,2-diyl bis(N,N-dimethyl-N-hexadecylammoniumacetoxy)dichloride, referred to as 16-E2-16, was synthesized and characterized. Corrosion inhibition effects of 16-E2-16 on mild steel (MS) surface in 1 M HCl solution at 30, 40, 50 and 60 °C were evaluated using gravimetric analysis, potentiodynamic polarisation and electrochemical impedance spectroscopy measurements. The nature of the protective inhibitor film formed on the MS surface was analysed by SEM, EDAX and FT-IR, while TGA was used to assure the thermal behaviour and stability of the film at high temperature. The formation of [inhibitor-Fe2+] on the surface of MS was confirmed by UV–visible spectroscopy. The inhibition efficiency of the studied inhibitor increased with increasing concentration and solution temperature. The compound behaved as a mixed type inhibitor and acted by blocking the electrode surface by means of adsorption obeying the Langmuir adsorption isotherm. Surface active properties and corrosion inhibition effects of 16-E2-16 in the presence of inorganic (NaI) and organic (NaSal) salts were also investigated and are discussed. Density functional theory calculations have been carried out to correlate the efficiency of the compound with its intrinsic molecular parameters.  相似文献   
4.

Substitution box is the most significant component of block cipher. The property of nonlinearity is of great importance for the design of secure substitution boxes. Therefore, it is necessary to develop new methods for the production of substitution boxes with a high non-linearity score. In this paper, we have introduced a novel group theoretic method to construct a robust S-box with non-linearity score 113.75 greater than that of AES S-box. The performance of generated S-box is found to be excellent, when examined through various other well-known algebraic criteria such as strict avalanche criterion, bit independence criterion, differential uniformity and linear approximation probability. The suitability of proposed S-box is tested for image encryption applications through different statistical analyses. We got very encouraging outcomes from all these examinations which certify that the generated S-box meets all the criteria needed to be reliable for secure communication and image encryption.

  相似文献   
5.
The Journal of Supercomputing - With the fast growth of technologies like cloud computing, big data, the Internet of Things, artificial intelligence, and cyber-physical systems, the demand for data...  相似文献   
6.
Recently, chaos based pseudo-random number generator (PRNG) for video encryption was proposed. Security analysis presented in this paper reveals serious problems. Chaotic maps used in analyzed PRNG do not enhance its security due to a considerable number of initial values that lead to fixed points. Also, based on 6 known iterations, an attacker can reconstruct a secret key used in the working stage of the analyzed PRNG based on attack whose complexity is much smaller than the estimated key space. Therefore, security of the analyzed PRNG is much lower than expected and it should be used with caution. Some potential improvements of the analyzed PRNG are proposed which could eliminate perceived shortcomings of the original version.  相似文献   
7.
Wireless Personal Communications - Modern block ciphers have been used to design security schemes to fulfil the security requirements in different areas of applications. The substitution boxes,...  相似文献   
8.
Multimedia Tools and Applications - Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to achieve the property of confusion in modern symmetric ciphers and offer resistance...  相似文献   
9.
Telecommunication Systems - Internet of Energy (IoE) provides two-way communication for reform of energy utilization between service providers and consumers. To provide secure, efficient, and...  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号