Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "FARRAH FAREED"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Design of a cipher using cubic dynamic substitution box
    (UMT, Lahore, 2022) FARRAH FAREED
    Nowadays, many organizations, companies, and an individual person share their data online through unreliable mediums ignoring that there are many hackers sitting outside to hack their data and misuse it. A cipher in cryptography is a set of predetermined procedures that may be used as a technique to achieve encryption and decryption. Cryptosystems are employed to demonstrate the security of private communication and information networks. Various permutation and substitution techniques are employed for this purpose. S-Box is in charge of the substitution procedure. Modern ciphers employ dynamic, key-dependent S-Box. In this work, we suggested a way for creating dynamic S-Boxes with strong cryptographic features. Techniques, such as bijectivity, nonlinearity, strict avalanche criteria, and linear probability, are used to assess the strength of the S-Box. After the creation of a dynamic S-Box, it is used in a novel cipher designed in this research thesis. Novel cipher consists of three phases such as key generation, encryption, and decryption. A different S-Box is generated using values taken from the key and employed in a cipher round to make things more difficult for the attackers.

DSpace software copyright © 2002-2026 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback