The design of a substitution box determines the confusion ability of the cipher; therefore, many different types of boxes have been proposed by various authors in literature. In this paper, we present a novel method to design a new substitution box and compare its characteristics with some ...
Any real cryptographic device provides more information to a determined adversary than just the input plaintext and output ciphertext. This side-channel information is available as the timing of operations [1], power con- sumption of the devices [2], electromagnetic emanations [3], etc. Very ...
This table is slightly imperfect. For each of the first eighteen letters in the alphabet, when they occur in the plaintext, there is one letter that no key letter will cause to be its ciphertext equivalent, and there is another letter that will be that plaintext letter's ciphertext equiva...
For enciphering an image pixel, a random number is chosen dependently to the previous cipher pixel. Thus, the key stream used in diffusion process is highly dependent on the image. Experimental results on various types of security analysis indicate that the proposed scheme is robust against ...