MS or Mphil
Permanent URI for this community
Browse
Browsing MS or Mphil by Author "AWAIS AHMED QARNI"
Now showing 1 - 1 of 1
Results Per Page
Sort Options
Item An Innovative Design of Substitution Box Using Trigonometric Transformation(UMT, Lahore, 2024) AWAIS AHMED QARNIIn today's highly digitized culture, majority of information is transmitted in the highly digitized culture of the present day. Even though technology simplifies the management of numerous aspects of our lives, it also establishes the conditions for situations that jeopardize our personal information and data. A leak about the vault would do tremendous damage to the CIA triads. Criminals and attackers are on the lookout for this data in hopes of obtaining it. To get around this problem, we are using encryption in new and different ways. A lot of experts a re looking into this and new forms of data encryption are always being considered. This paper addresses the challenge of creating robust replacement boxes for cryptography, offering a novel approach to an established problem. A densely packed 8 × 8 solid S-box satisfying the restrictions of a bijective function is constructed using a chaotic mapping approach when input sequences are employed. The S-box problem is investigated using a variety of instruments, including bijection, linear estimate probability, Nonlinearity, differential uniformity, bit independence, and rigorous avalanche effect. We test its strength by comparing it to a few S-boxes that have been recently investigated. Our research indicates that the method we employed to construct these S-boxes is both innovative and effective in the creation of secure cryptographic substitution boxes. The proliferation of hacking incidents and cyberthreats is making it harder to safeguard our private data and conversations. To make hacking more difficult, our application takes use of trigonometric operations and functions to generate confusion. In all our tests and investigations, we discovered that our algorithm is the fastest and most secure option available. With its straightforward design and use of trigonometric principles, our algorithm has practical applications and offers an effective means of securing data transmitted over the Internet.