• A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes 

      Al-Maadeed, Temadher Alassiry; Hussain, Iqtadar; Anees, Amir; Mustafa, Muhammad Tahir ( Springer , 2021 , Article)
      We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. Nowadays, the chaotic cryptosystems gained more attention due to their efficiency, the assurance of ...
    • Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment 

      Tolba, Zakaria; Derdour, Makhlouf; Ferrag, Mohamed Amine; Muyeen, S. M.; Benbouzid, Mohamed ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block ...
    • Cryptanalysis of nonlinear confusion component based encryption algorithm 

      Munir, Noor; Khan, Majid; Shah, Tariq; Alanazi, Ammar S.; Hussain, Iqtadar ( Elsevier , 2021 , Article)
      Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encryption ...
    • Differential cryptanalysis of diffusion and confusion based information confidentiality mechanism 

      Noor, Munir; Khan, Majid; Hussain, Iqtadar; Amin, Muhammad ( Elsevier , 2022 , Article)
      Wireless multimedia communications have progressed significantly in recent years. As a result, there is an increasing demand for more secure media transmission to protect multimedia information. Image encryption systems ...
    • Towards Information Theoretic Interpretation of Practical Ciphers 

      Abdellatif, Basem; Elfouly, Tarek; Abualsaud, Khalid; Gouissem, Ala; Yaacoub, Elias; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      In spite of the wide spread of practical crypto- systems and ciphers nowadays, they still lack a unique metric to measure the secrecy level they provide. Their strength is measured in an ad-hoc way by exposing them to ...