Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Unforeseen attacks on ICT systems incurred billions of dollars of losses to public and private communities. The current parametric encryption algorithms suffer the unconventional and paranormal attacks. A search for a new paradigm against the unforeseen and paranormal attacks lead to an invention...
| Main Authors: | Shamsudin, Ahmad Faizul, Suhaimi, Mohd Adam, Makarin, Rusydi Hasan, Jaafar, Abi Dzar |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/23202/ http://irep.iium.edu.my/23202/1/p126.pdf |
Similar Items
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014)
by: AlDabbagh, S.S.M., et al.
Published: (2014)
New DNA based dynamical S-Box for block cipher
by: Chng, Chern Wei, et al.
Published: (2018)
by: Chng, Chern Wei, et al.
Published: (2018)
Polyalphabetic substitution cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Monoalphabetic substitution cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Key dependent dynamic S-Boxes on 3D cellular automata for block cipher
by: Md Yasin, Sharifah, et al.
Published: (2020)
by: Md Yasin, Sharifah, et al.
Published: (2020)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
Exploiting an Elitist Barnacles Mating Optimizer implementation for substitution box optimization
by: Kamal Zuhairi, Zamli, et al.
Published: (2023)
by: Kamal Zuhairi, Zamli, et al.
Published: (2023)
Security of present s-box
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Unravelling the mysteries of the F-Box gene HAWAIIAN SKIRT and its homologs in maize
by: Heatley, Matt
Published: (2020)
by: Heatley, Matt
Published: (2020)
Utilizing the roulette wheel based social network search algorithm for substitution box construction and optimization
by: Kamal Z., Zamli, et al.
Published: (2023)
by: Kamal Z., Zamli, et al.
Published: (2023)
Lightweight block cipher algorithms: review paper
by: Salim, Sufyan, et al.
Published: (2016)
by: Salim, Sufyan, et al.
Published: (2016)
Lightweight block ciphers: A comparative study
by: Salim, Sufya, et al.
Published: (2012)
by: Salim, Sufya, et al.
Published: (2012)
Fault Analysis of the KATAN Family of Block Ciphers
by: Abdul Latip, Shekh Faisal
Published: (2012)
by: Abdul Latip, Shekh Faisal
Published: (2012)
The block cipher algorithm–properties, encryption efficiency analysis and security evaluation
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018)
by: A. Ahmed, Hussam, et al.
Published: (2018)
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
by: Hamdi, Ayman Majid
Published: (2019)
by: Hamdi, Ayman Majid
Published: (2019)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
New IV-Based database encryption scheme
using TS block cipher
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
Wedding planner in a box
by: Peraganathan, Megalah, et al.
Published: (2017)
by: Peraganathan, Megalah, et al.
Published: (2017)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map
by: Alzaidi, Amer Awad, et al.
Published: (2018)
by: Alzaidi, Amer Awad, et al.
Published: (2018)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Development of DNA-based dynamic key-dependent block cipher
by: Saeed, Auday H.
Published: (2015)
by: Saeed, Auday H.
Published: (2015)
Determining The Black-Box Component's Failure.
by: Hilal, Ibrahim, et al.
Published: (2007)
by: Hilal, Ibrahim, et al.
Published: (2007)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005)
by: Phan, Raphael Chung Wei
Published: (2005)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
A new block cipher based on finite automata systems
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
Enhancing lightweight block cipher algorithm OLBCA
through decreasing cost factor
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Learning management system through assignment box alert
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
Bounded Box-Zoning Integrated Approach For Children Handwriting Recognition
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
Similar Items
-
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014) -
New DNA based dynamical S-Box for block cipher
by: Chng, Chern Wei, et al.
Published: (2018) -
Polyalphabetic substitution cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
Monoalphabetic substitution cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
Key dependent dynamic S-Boxes on 3D cellular automata for block cipher
by: Md Yasin, Sharifah, et al.
Published: (2020)