Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "HAIDER ALI BAIG"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    a critical survey of s-box designs based on chaos theory
    (UMT Lahore, 2021) HAIDER ALI BAIG
    The data security, integrity and quality, in modern era of technology are very crucial for everyone whenever data transaction occurs. Various techniques are applied for securing the information and the optimistic way is by constructing of the Substitution Box (S-Box) that provides confusion in the data. Substitution process plays a vital role for constructing a strong cipher. An S-Box which shows high Nonlinearity, and low Linear and Differential Probability is marked as secure in the field of cryptography. For both user and the security related organizations, the main area of interest is on the phase of S-Box construction. As long as the S-Box shows strong properties like Linear Probability, Differential Probability, Non-linearity, Strict Avalanche Criterion and Bit Independent Criterion, it is nearly impossible for hacker to break into the information. By using substitution and permutation processes, which are the main phase of construction of S-Box. In this work, I have analyzed different types of substitution box techniques and provided a comparison between different techniques. Results of these techniques have been observed and a brief explanation is given that which S-box generating technique is best for the security of your message or information.

DSpace software copyright © 2002-2026 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback