A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups

The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches. It is because they are solely responsible to decide the robustness of cryptosystem against linear and differential cryptanalyses. With an aim...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 8; pp. 75473 - 75490
Main Authors Razaq, Abdul, Alolaiyan, Hanan, Ahmad, Musheer, Yousaf, Muhammad Awais, Shuaib, Umer, Aslam, Waqar, Alawida, Moatsum
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches. It is because they are solely responsible to decide the robustness of cryptosystem against linear and differential cryptanalyses. With an aim to fulfill the mentioned requirement of robustness, a novel group theoretic and graphical method is proposed to construct S-box with optimal features. Firstly, a strong S-box is generated with the help of orbits of coset graphs and the action of proposed powerful permutation of symmetric group <inline-formula> <tex-math notation="LaTeX">S_{256} </tex-math></inline-formula>. In addition, a specific group is designed the action of whose pairs of permutations has the ability to generate as many as 462422016 strong S-boxes. Few of such proposed S-boxes are reported and assessed against standard performance parameters to validate the effectiveness of proposed findings. The features of proposed S-boxes are compared with most of the recent S-boxes to validate the superior performance. Moreover, they are also applied for image encryption to demonstrate their suitability for multimedia security applications.
AbstractList The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches. It is because they are solely responsible to decide the robustness of cryptosystem against linear and differential cryptanalyses. With an aim to fulfill the mentioned requirement of robustness, a novel group theoretic and graphical method is proposed to construct S-box with optimal features. Firstly, a strong S-box is generated with the help of orbits of coset graphs and the action of proposed powerful permutation of symmetric group <inline-formula> <tex-math notation="LaTeX">S_{256} </tex-math></inline-formula>. In addition, a specific group is designed the action of whose pairs of permutations has the ability to generate as many as 462422016 strong S-boxes. Few of such proposed S-boxes are reported and assessed against standard performance parameters to validate the effectiveness of proposed findings. The features of proposed S-boxes are compared with most of the recent S-boxes to validate the superior performance. Moreover, they are also applied for image encryption to demonstrate their suitability for multimedia security applications.
The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches. It is because they are solely responsible to decide the robustness of cryptosystem against linear and differential cryptanalyses. With an aim to fulfill the mentioned requirement of robustness, a novel group theoretic and graphical method is proposed to construct S-box with optimal features. Firstly, a strong S-box is generated with the help of orbits of coset graphs and the action of proposed powerful permutation of symmetric group S256. In addition, a specific group is designed the action of whose pairs of permutations has the ability to generate as many as 462422016 strong S-boxes. Few of such proposed S-boxes are reported and assessed against standard performance parameters to validate the effectiveness of proposed findings. The features of proposed S-boxes are compared with most of the recent S-boxes to validate the superior performance. Moreover, they are also applied for image encryption to demonstrate their suitability for multimedia security applications.
Author Ahmad, Musheer
Yousaf, Muhammad Awais
Alolaiyan, Hanan
Aslam, Waqar
Razaq, Abdul
Alawida, Moatsum
Shuaib, Umer
Author_xml – sequence: 1
  givenname: Abdul
  orcidid: 0000-0002-1898-4082
  surname: Razaq
  fullname: Razaq, Abdul
  organization: Department of Mathematics, Division of Science and Technology, University of Education, Lahore, Pakistan
– sequence: 2
  givenname: Hanan
  orcidid: 0000-0002-7845-7751
  surname: Alolaiyan
  fullname: Alolaiyan, Hanan
  organization: Department of Mathematics, King Saud University, Riyadh, Saudi Arabia
– sequence: 3
  givenname: Musheer
  orcidid: 0000-0002-4915-9325
  surname: Ahmad
  fullname: Ahmad, Musheer
  email: musheer.cse@gmail.com
  organization: Department of Computer Engineering, Jamia Millia Islamia, New Delhi, India
– sequence: 4
  givenname: Muhammad Awais
  orcidid: 0000-0002-3507-9367
  surname: Yousaf
  fullname: Yousaf, Muhammad Awais
  organization: Department of Mathematics, The Islamia University of Bahawalpur, Bahawalpur, Pakistan
– sequence: 5
  givenname: Umer
  orcidid: 0000-0002-8979-0816
  surname: Shuaib
  fullname: Shuaib, Umer
  organization: Department of Mathematics, Government College University Faisalabad, Faisalabad, Pakistan
– sequence: 6
  givenname: Waqar
  orcidid: 0000-0002-8780-0240
  surname: Aslam
  fullname: Aslam, Waqar
  organization: Department of Computer Science and Information Technology, The Islamia University of Bahawalpur, Bahawalpur, Pakistan
– sequence: 7
  givenname: Moatsum
  orcidid: 0000-0001-8146-5843
  surname: Alawida
  fullname: Alawida, Moatsum
  organization: School of Computer Sciences, Universiti Sains Malaysia, Minden, Malaysia
BookMark eNpNUclOwzAQtRBIbP2CXixxTvGa5VgiKEgsh8DZcuMxpGrjYjsI_h6HIMRcZvT0lpHeKTrsXQ8IzSlZUEqqy2VdXzfNghFGFqwqq7zID9AJo3mVccnzw3_3MZqFsCFpygTJ4gTBEj-6D9jiB4hvzmDrPF5BD17HzvXYWdxE7_pX3AzrELs4jHB25T4h4CsdwODEql2AiFde798C1r3BzdduB9F3bQLdsA_n6MjqbYDZ7z5DLzfXz_Vtdv-0uquX91krSBkzW-qW5oLYQoIu121huNQWhCkZo8A4aSmI3ApSUA7r1mpJtAAhmRE58MLyM3Q3-RqnN2rvu532X8rpTv0Azr8q7WPXbkGtR6WWlBsjBRvPFJuSCkok40Ymr4vJa-_d-wAhqo0bfJ_eV0xIQSpGaJlYfGK13oXgwf6lUqLGetRUjxrrUb_1JNV8UnUA8KeoSJETUfFvLD2NDw
CODEN IAECCG
CitedBy_id crossref_primary_10_1016_j_ins_2021_01_014
crossref_primary_10_1109_ACCESS_2021_3052161
crossref_primary_10_1371_journal_pone_0241890
crossref_primary_10_1109_ACCESS_2022_3218643
crossref_primary_10_1007_s11042_023_17399_y
crossref_primary_10_1109_ACCESS_2021_3086717
crossref_primary_10_1007_s13369_021_05666_9
crossref_primary_10_1109_ACCESS_2020_3004449
crossref_primary_10_1109_ACCESS_2022_3209202
crossref_primary_10_1109_ACCESS_2023_3337443
crossref_primary_10_1007_s11277_020_07841_x
crossref_primary_10_1007_s13369_022_06651_6
crossref_primary_10_32604_cmc_2022_023685
crossref_primary_10_1007_s11042_023_15971_0
crossref_primary_10_1007_s13369_024_09099_y
crossref_primary_10_1016_j_jksuci_2023_03_004
crossref_primary_10_1109_ACCESS_2020_3034832
crossref_primary_10_3390_sym12111896
crossref_primary_10_1007_s40314_023_02545_x
crossref_primary_10_1109_ACCESS_2021_3095618
crossref_primary_10_1109_ACCESS_2020_3016401
crossref_primary_10_1109_ACCESS_2020_3045260
crossref_primary_10_1109_ACCESS_2022_3143096
crossref_primary_10_1109_ACCESS_2022_3183990
crossref_primary_10_1007_s11042_021_11635_z
crossref_primary_10_1016_j_matcom_2023_01_036
crossref_primary_10_1007_s11760_024_03301_2
crossref_primary_10_1109_ACCESS_2021_3077194
crossref_primary_10_1007_s11071_022_07956_9
crossref_primary_10_1007_s11265_022_01744_9
crossref_primary_10_1007_s11277_021_08981_4
crossref_primary_10_1109_ACCESS_2021_3049881
crossref_primary_10_32604_cmc_2022_028272
crossref_primary_10_1016_j_measen_2023_100923
crossref_primary_10_1016_j_eswa_2023_122779
crossref_primary_10_1109_ACCESS_2020_3001868
crossref_primary_10_3390_math11102322
crossref_primary_10_1007_s11042_022_11898_0
crossref_primary_10_1016_j_vlsi_2023_06_004
crossref_primary_10_1155_2023_5767102
crossref_primary_10_1007_s11042_023_14910_3
crossref_primary_10_3390_e22070717
crossref_primary_10_1109_ACCESS_2021_3092512
crossref_primary_10_1109_ACCESS_2021_3113338
crossref_primary_10_1109_ACCESS_2021_3093247
crossref_primary_10_1155_2022_6320243
crossref_primary_10_32604_cmc_2022_021019
Cites_doi 10.1049/ip-e.1988.0044
10.1007/s00521-018-3557-3
10.1109/AICCSA.2014.7073265
10.1007/978-3-642-80350-5_30
10.1007/s11071-018-4478-5
10.1007/s11071-017-3409-1
10.15388/Informatica.2009.235
10.1109/TCYB.2018.2846186
10.1007/978-3-642-04101-3
10.1007/s10773-019-04188-3
10.1016/j.pisc.2016.06.001
10.1007/s00521-015-1887-y
10.1007/s11071-016-3199-x
10.1016/j.amc.2018.03.019
10.1007/s11042-019-08464-6
10.1007/978-3-540-30539-2_6
10.1007/s10773-019-04254-w
10.1016/j.camwa.2012.05.017
10.1080/1023697X.2012.10669006
10.1007/s11277-020-07052-4
10.1155/2017/6969312
10.1109/81.904880
10.1007/s11277-017-5054-x
10.1007/s00521-017-3287-y
10.1109/ACCESS.2019.2956385
10.1007/3-540-39799-X_41
10.1142/S021812749800098X
10.1109/TCSI.2001.972857
10.1504/IJCNDS.2014.057991
10.1007/s11071-016-3295-y
10.3390/e21101004
10.1109/ACCESS.2020.2970806
10.3390/e21030245
10.1109/ACCESS.2019.2911395
10.1109/ICUMT.2012.6459712
10.1007/s11071-012-0675-9
10.1016/j.ijleo.2015.11.221
10.1007/s11277-018-5787-1
10.1109/ACCESS.2019.2906222
10.1109/ACCESS.2020.2973679
10.1080/01611190802653228
10.1109/ACCESS.2020.2975880
10.1109/ACCESS.2018.2871557
10.1016/j.ins.2012.02.030
10.1007/s11071-016-3046-0
10.3390/e20070525
10.1016/j.chaos.2013.11.001
10.1109/7384.963463
10.1007/s11071-020-05503-y
10.3390/e21080790
10.1080/00927879208824389
10.5560/zna.2012-0022
10.1140/epjp/s13360-020-00187-0
10.1155/2018/9389065
10.1016/j.procs.2015.07.394
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2020.2989676
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList

Materials Research Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Mathematics
EISSN 2169-3536
EndPage 75490
ExternalDocumentID oai_doaj_org_article_ba4e4a513dd542e4a50f74d8710523d5
10_1109_ACCESS_2020_2989676
9076049
Genre orig-research
GrantInformation_xml – fundername: Research Center of the Center for Female Scientific and Medical Colleges, Deanship of Scientific Research, King Saud University
  funderid: 10.13039/501100011665
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABVLG
ACGFS
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IFIPE
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RIG
RNS
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-f8ac1640f75ea8bc7d35afe4d8221e230c1e46f40713ebcfa50a4e452d46e37f3
IEDL.DBID RIE
ISSN 2169-3536
IngestDate Thu Sep 05 15:45:30 EDT 2024
Fri Sep 13 04:12:07 EDT 2024
Fri Aug 23 03:24:48 EDT 2024
Wed Jun 26 19:27:09 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-f8ac1640f75ea8bc7d35afe4d8221e230c1e46f40713ebcfa50a4e452d46e37f3
ORCID 0000-0002-3507-9367
0000-0002-8979-0816
0000-0002-1898-4082
0000-0001-8146-5843
0000-0002-4915-9325
0000-0002-8780-0240
0000-0002-7845-7751
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9076049
PQID 2454092018
PQPubID 4845423
PageCount 18
ParticipantIDs proquest_journals_2454092018
doaj_primary_oai_doaj_org_article_ba4e4a513dd542e4a50f74d8710523d5
ieee_primary_9076049
crossref_primary_10_1109_ACCESS_2020_2989676
PublicationCentury 2000
PublicationDate 20200000
2020-00-00
20200101
2020-01-01
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – year: 2020
  text: 20200000
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2020
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref57
ref13
ref56
ref12
ref59
ref15
ref58
ref14
ref53
ref52
ref55
ref11
ref54
ref10
ref17
ref16
ref19
ref18
ref51
ref50
matsui (ref35) 1993
hussain (ref61) 2011; 48
ref46
ref48
ref47
ref42
ref41
ref44
ref43
ref49
ref8
ref7
tian (ref45) 0; 1
ref9
ref4
ref3
higman (ref29) 1983; 1
ref6
ref5
ref40
daemen (ref39) 2002
ref34
ref37
ref33
ref32
ref2
ref1
ref38
yi (ref62) 1997; 2
lyndon (ref31) 2015; 89
cameron (ref30) 2013
ref24
ref23
ref26
ref25
ref64
ref20
ref63
burnett (ref36) 2005
ref22
ref21
ref28
ref27
ref60
References_xml – ident: ref33
  doi: 10.1049/ip-e.1988.0044
– ident: ref48
  doi: 10.1007/s00521-018-3557-3
– ident: ref43
  doi: 10.1109/AICCSA.2014.7073265
– ident: ref38
  doi: 10.1007/978-3-642-80350-5_30
– ident: ref55
  doi: 10.1007/s11071-018-4478-5
– year: 2005
  ident: ref36
  article-title: Heuristic optimization of Boolean functions and substitution boxes for cryptography
  contributor:
    fullname: burnett
– ident: ref52
  doi: 10.1007/s11071-017-3409-1
– ident: ref13
  doi: 10.15388/Informatica.2009.235
– volume: 2
  start-page: 689
  year: 1997
  ident: ref62
  article-title: A method for obtaining cryptographically strong $8\times8$ S-boxes
  publication-title: Proc IEEE Globe Telecommun Conf (GLOBECOM)
  contributor:
    fullname: yi
– ident: ref12
  doi: 10.1109/TCYB.2018.2846186
– ident: ref9
  doi: 10.1007/978-3-642-04101-3
– ident: ref11
  doi: 10.1007/s10773-019-04188-3
– ident: ref46
  doi: 10.1016/j.pisc.2016.06.001
– ident: ref41
  doi: 10.1007/s00521-015-1887-y
– ident: ref51
  doi: 10.1007/s11071-016-3199-x
– ident: ref56
  doi: 10.1016/j.amc.2018.03.019
– ident: ref24
  doi: 10.1007/s11042-019-08464-6
– ident: ref10
  doi: 10.1007/978-3-540-30539-2_6
– ident: ref14
  doi: 10.1007/s10773-019-04254-w
– ident: ref28
  doi: 10.1016/j.camwa.2012.05.017
– ident: ref42
  doi: 10.1080/1023697X.2012.10669006
– ident: ref22
  doi: 10.1007/s11277-020-07052-4
– ident: ref16
  doi: 10.1155/2017/6969312
– ident: ref4
  doi: 10.1109/81.904880
– volume: 89
  year: 2015
  ident: ref31
  publication-title: Combinatorial Group Theory
  contributor:
    fullname: lyndon
– ident: ref53
  doi: 10.1007/s11277-017-5054-x
– ident: ref54
  doi: 10.1007/s00521-017-3287-y
– ident: ref25
  doi: 10.1109/ACCESS.2019.2956385
– ident: ref34
  doi: 10.1007/3-540-39799-X_41
– ident: ref1
  doi: 10.1142/S021812749800098X
– ident: ref2
  doi: 10.1109/TCSI.2001.972857
– ident: ref8
  doi: 10.1504/IJCNDS.2014.057991
– year: 2002
  ident: ref39
  publication-title: The Design of Rijndael AES The Advanced Encryption Standard
  contributor:
    fullname: daemen
– start-page: 386
  year: 1993
  ident: ref35
  article-title: Linear cryptanalysis method for DES cipher
  publication-title: Proc Workshop Theory Appl Cryptograph Techn
  contributor:
    fullname: matsui
– ident: ref47
  doi: 10.1007/s11071-016-3295-y
– ident: ref18
  doi: 10.3390/e21101004
– volume: 1
  start-page: 232
  year: 0
  ident: ref45
  article-title: S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm
  publication-title: J Syst Eng Electron 27 no
  contributor:
    fullname: tian
– volume: 1
  start-page: 159
  year: 1983
  ident: ref29
  article-title: Coset diagrams and relations for PSL (2, Z)
  publication-title: Arab Gulf J Sci Res
  contributor:
    fullname: higman
– ident: ref19
  doi: 10.1109/ACCESS.2020.2970806
– ident: ref15
  doi: 10.3390/e21030245
– ident: ref57
  doi: 10.1109/ACCESS.2019.2911395
– ident: ref27
  doi: 10.1109/ICUMT.2012.6459712
– ident: ref49
  doi: 10.1007/s11071-012-0675-9
– ident: ref7
  doi: 10.1016/j.ijleo.2015.11.221
– ident: ref5
  doi: 10.1007/s11277-018-5787-1
– ident: ref26
  doi: 10.1109/ACCESS.2019.2906222
– ident: ref59
  doi: 10.1109/ACCESS.2020.2973679
– ident: ref63
  doi: 10.1080/01611190802653228
– ident: ref23
  doi: 10.1109/ACCESS.2020.2975880
– ident: ref40
  doi: 10.1109/ACCESS.2018.2871557
– ident: ref37
  doi: 10.1016/j.ins.2012.02.030
– ident: ref64
  doi: 10.1007/s11071-016-3046-0
– ident: ref3
  doi: 10.3390/e20070525
– ident: ref50
  doi: 10.1016/j.chaos.2013.11.001
– ident: ref6
  doi: 10.1109/7384.963463
– start-page: 1
  year: 2013
  ident: ref30
  article-title: Encyclopaedia of design theory
  publication-title: Cayley Graphs and Coset Diagrams
  contributor:
    fullname: cameron
– ident: ref21
  doi: 10.1007/s11071-020-05503-y
– ident: ref17
  doi: 10.3390/e21080790
– ident: ref32
  doi: 10.1080/00927879208824389
– ident: ref60
  doi: 10.5560/zna.2012-0022
– ident: ref20
  doi: 10.1140/epjp/s13360-020-00187-0
– ident: ref58
  doi: 10.1155/2018/9389065
– volume: 48
  start-page: 111
  year: 2011
  ident: ref61
  article-title: Some analysis of S-box based on residue of prime number
  publication-title: Proc Pakistan Acad Sci
  contributor:
    fullname: hussain
– ident: ref44
  doi: 10.1016/j.procs.2015.07.394
SSID ssj0000816957
Score 2.4509804
Snippet The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches....
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Publisher
StartPage 75473
SubjectTerms block ciphers
Boxes
Ciphers
coset graphs
Cryptography
Encryption
Graphical methods
Graphs
Group theory
Mathematics
modular symmetric group
Multimedia
Permutations
Robustness
Substitutes
Substitution-boxes
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELUQEwwIKIhCQR4YCY0TOx9jW_EhpLJApW6WY59ZaINIQfDvuXMCqsTAwhZZVhK_S-7una13jJ0LVRiSjYqURboqHfrByqU2AjAYLEufphXVIaf32e1M3s3VfK3VF50Ja-WBW-CGlZEgjRKpc0omdBn7XDrM86mg6Vr1UqHWyFTwwYXISpV3MkMiLoejyQRXhIQwiS9JdTwjlZG1UBQU-7sWK7_8cgg217tsp8sS-ah9uz22Act9tr2mHdhjMOL39Ts882noAc0x-eSthjRBzWvPH6jK_cTJNYTzADgcjesPaPgYQ5fjOGtSN7DiNyRa3XCzdPzhc7GgHluWh6JUc8Bm11ePk9uo65kQWRkXq8gXxiIDQowUmKKyuUuV8YCAJYkA5BtWgMw80bgUKusRTgJYJU5mkOY-PWSby3oJR4y7xJcJbQErYWXufUFiZZhvgKH26UL02cU3fPqllcbQgVLEpW7R1oS27tDuszFB_DOVdK3DAFpbd9bWf1m7z3pkoJ-blLSxKMs-G3wbTHf_YKMTEhcsMcEpjv_j0Sdsi5bTll8GbHP1-ganmJCsqrPw7X0B2NXZiw
  priority: 102
  providerName: Directory of Open Access Journals
Title A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups
URI https://ieeexplore.ieee.org/document/9076049
https://www.proquest.com/docview/2454092018/abstract/
https://doaj.org/article/ba4e4a513dd542e4a50f74d8710523d5
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T-QwEB4BFRTc8RJ7B8gFJVnysDdJubs6QEhLA0h0kWOPKYANItnTwa-_GScbIaCgcywnGmdsz3xj-xuA40hlmmmjAmUIrkpL62BpExMgajKWuUuSkuOQs6vRxa28vFN3K3DS34VBRH_4DIdc9Hv5tjILDpWd5ryNJPNVWM3CuL2r1cdTOIFErtKOWCgK89PxdEp9IAgYh0PmGR8xr8g74-M5-rukKp9WYm9ezn7AbClYe6rkYbhoyqF5-8DZ-F3Jf8Jm52eKcTswtmAF59uw8Y59kJ5mPWVrvQM4FlfVX3wUM59TWpAzK1pOaladqJy45qj5veClxp8voOpgUv3DWkzIFFpBraZVjY04ZxLsWui5FdevT0-cs8sIH-Sqd-H27M_N9CLocjAERoZZE7hMG0JUoUsV6qw0qU2UdigtORYREn4xEcqRY1iYYGmcVqGWKFVs5QiT1CV7sDav5rgPwsYuj3lLWUVGps5lTH5G_gtqTsceRQM4WSqneG6pNgoPUcK8aHVZsC6LTpcDmLAC-6bMk-0r6McX3bQjV4CE0SpKrFUy5iL1hIQnv4oQuFUD2GFl9R_p9DSAg-VwKLo5XRcxkxXm5DBlv75-6zess4BtgOYA1pqXBR6Sy9KURx7qH_kR-x_CHOjw
link.rule.ids 315,786,790,802,870,2115,4043,27956,27957,27958,55109
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VcoAeeBXEQgEfODbbPOxNctxdURZo9tJW6s1y7DEH6AY1WQT8emacbFQBB25O4kTjjO35Zmx_A_A2UYVh2qhIWXJXpaN5sHaZjRANGcvSZ1nNcchqPVtdyo9X6moPjsezMIgYNp_hlIthLd81dsuhspOSl5FkeQfukp2Py_601hhR4RQSpcoHaiF6fjJfLqkV5ASm8ZSZxmfMLHLL_ASW_iGtyl9zcTAwpw-h2onW7yv5Mt129dT--oO18X9lfwQPBqQp5n3XeAx7uHkCB7f4B-mqGklb20PAuVg33_GrqEJWaUFwVvSs1Kw80XhxznHzz4Inm7DDgG5Hi-YHtmJBxtAJqrVsWuzEe6bBboXZOHH-8_qas3ZZEcJc7VO4PH13sVxFQxaGyMq46CJfGEs-Vexzhaaobe4yZTxKR9AiQfJgbIJy5tkxzLC23qjYSJQqdXKGWe6zZ7C_aTb4HIRLfZnyorJKrMy9L5j-jBAMGk7IniQTON4pR3_ryTZ0cFLiUve61KxLPehyAgtW4FiVmbLDDfrxehh4BAZIGKOSzDklUy5SS0h4Qlbkgzs1gUNW1viRQU8TONp1Bz2M6lanTFdYEmQqXvz7rTdwb3VRnemzD-tPL-E-C9uHa45gv7vZ4isCMF39OvTb37MD61E
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Method+for+Generation+of+Strong+Substitution-Boxes+Based+on+Coset+Graphs+and+Symmetric+Groups&rft.jtitle=IEEE+access&rft.au=Razaq%2C+Abdul&rft.au=Alolaiyan%2C+Hanan&rft.au=Ahmad%2C+Musheer&rft.au=Yousaf%2C+Muhammad+Awais&rft.date=2020&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=8&rft.spage=75473&rft.epage=75490&rft_id=info:doi/10.1109%2FACCESS.2020.2989676&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2020_2989676
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon