scholarly journals Algebraic Construction of Powerful Substitution Box

The development of wireless transmission, day by day contacts the new statures of innovation. Cryptography is one of the procedures used to give security to information streaming over the system by encryption and decryption. Substitution box (S-box) is a one of a kind nonlinear activity in Advanced Encryption Standard (AES), this paper proposed a new algebraic approach to build the multifaceted nature of S-box by changing the affine transformation. This builds the affine change period to end up 102 and expands the security of the S-box against algebraic attacks and interpolation attacks. Further examination has uncovered that the Operational multifaceted nature of the power S-box is higher than the essential S-box. the proposed powerful S-box satisfies the ideal property of Avalanche's impact and has more prominent security towards linear and differential cryptanalysis. New S-box acquires all focal points and efficiency of any current advanced usage of AES S-box

2021 ◽  
Vol 7 (1) ◽  
pp. 1-10
Author(s):  
Md Moniruzzaman ◽  
Md Eanamul Haque Nizam ◽  
Md Tanjubul Hasan ◽  
Md Ahosanul Karim ◽  
Maria Afrin Shammi ◽  
...  

Now a day, fashion design and clothing manufacturing is going to update day by day. Modern fashion designers are interested to work with the new color, trend, design, pattern, cutline. “Motif Design" and its application may have been a positive way to deal with the ideal tasteful look, while social confirmation and diversification have been considered as key factors. In this study, the author tries to investigate the cultural elements motif between Bangladesh and china (Han). The author investigates different Blogs, magazines, journals, and websites used for the analysis. In order to make this research authentic and credible different local and international published books and articles have been studied. Different websites helped by representing historical progress and reference of the information which adorned in this research. Few Bangladeshi and Chinese apparel fashion brands those who worked with traditional costume were also a way to understand today's influence of Cultural elements. After the analysis, the author finds some features of motif like style, positioning, color and pattern. The research team analyzes those points from the view of two sides. Then the authors finally find out the key similarities from the analysis between the two countries. From the finding, the author designs (flat sketch) a series of dresses for the Contemporary market for future sustainability.


2017 ◽  
Vol 60 (4) ◽  
pp. 791-806 ◽  
Author(s):  
Chunlan Jiang

AbstractA C*-algebra Ahas the ideal property if any ideal I of Ais generated as a closed two-sided ideal by the projections inside the ideal. Suppose that the limit C*-algebra A of inductive limit of direct sums of matrix algebras over spaces with uniformly bounded dimension has the ideal property. In this paper we will prove that A can be written as an inductive limit of certain very special subhomogeneous algebras, namely, direct sum of dimension-drop interval algebras and matrix algebras over 2-dimensional spaces with torsion H2 groups.


1951 ◽  
Vol 44 (5) ◽  
pp. 302-306
Author(s):  
Henry W. Syer

Teachers have long been advised to build and use objective-type test items in their classroom tests in addition to the use of standardized tests which have been constructed and sold by outside authorities. Our own classroom tests reflect the particular topics which we, as teachers, and our students have found interesting and important for our particular class during a particular year. Purchased tests can never fully replace the class tests made and used by the teacher who has carried the class along through the day-by-day development of the subject. However, all who have tried know the time and energy which is required to formulate worthwhile test items in mathematics. Sometimes items which seemed good do not work out in practice at all. If we all had time the ideal procedure would be to use, analyze, revise, use, analyze and discard items in a growing file which would thus be constantly refined and improved. Few teachers have time to follow through such a procedure individually. The purpose of this report is to indicate a procedure which might facilitate the exchange of items concocted by individual teachers of secondary mathematics through the country so that these items could be used by others. The suggested plan is to establish a regular department in The Mathematics Teacher which will collect, classify and publish items supplied by teachers who have written and used them. There is no thought of standardizing the topics or procedure in the teaching of mathematics; the items will be displayed for use, but no teacher is urged to use them if they do not meet the objectives of a particular class. As time goes by this pool of items may contain many which test the same concepts, skills or other objectives. This is all to the good for the bigger the selection, the more interesting the shopping tour.


2018 ◽  
Vol 44 (2) ◽  
pp. 35-40
Author(s):  
Tanya jabor ◽  
Hiba Taresh ◽  
Alaa Raheema

All the important information is exchanged between facilities using the internet and networks, all these data should besecret and secured probably, the personal information of person in each of these institutions day by day need to organized secretlyand the need of the cryptography systems is raised which can easily encrypt the personal and critical data and it can be shared withother centers via internet without and concerns about privacy. Chaotic performance is added to different phases of AES but very few apply it on key generation and choosing ChebyshevPolynomial will provide a chaotic map which will led to random strong key. our system based on modified advanced encryptionstandard (AES) , with encryption and decryption in real time taking to consideration the criticality of data images that beenencrypted the main encryption algorithm is the same the modification is done by replacing the key generation algorithm byChebyshev Polynomial to generate key with the required key size.


2017 ◽  
Author(s):  
Sankhanil Dey ◽  
Ranjan Ghosh

Substitution Box or S-Box had been generated using 4-bit Boolean Functions (BFs) for Encryption and Decryption Algorithm of Lucifer and Data Encryption Standard (DES) in late sixties and late seventies respectively. The S-Box of Advance Encryption Standard have also been generated using Irreducible Polynomials over Galois field GF(28) adding an additive constant in early twenty first century. In this paper Substitution Boxes have been generated from Irreducible or Reducible Polynomials over Galois field GF(pq). Binary Galois fields have been used to generate Substitution Boxes. Since the Galois Field Number or the Number generated from coefficients of a polynomial over a particular Binary Galois field (2q) is similar to log2q+1 bit BFs. So generation of log2q+1 bit S-Boxes is possible. Now if p = prime or non-prime number then generation of S-Boxes is possible using Galois field GF (pq ), where q = p-1.


2017 ◽  
Vol 2018 (24) ◽  
pp. 7606-7641 ◽  
Author(s):  
Guihua Gong ◽  
Chunlan Jiang ◽  
Liangqing Li ◽  
Cornel Pasnicu

Author(s):  
Alperen Pekdemir ◽  
Ali Bekir Yildiz

Purpose This paper aims to propose a new unified and non-ideal switch model for analysis of switching circuits. Design/methodology/approach The model has a single unified structure that includes all possible states (on, off) of the switches. The analysis with the proposed switch model requires only one topology and uses the single system equation regardless of states of switches. Moreover, to improve accuracy, the model contains the on-state resistance and capacitive effect of switches. The system equations and the states of switches are updated by control variables, used in the model. Findings There are no restrictions on circuit topology and switch connections. Switches can be internally and externally controlled. The non-ideal nature of the model allows the switch to be modeled more realistically and eliminates the drawbacks of the ideal switch concept. After modeling with the proposed switch model, a linear circuit is obtained. Two examples related to switching circuits are included into the study. The results confirm the accuracy of the model. Originality/value This paper contributes a different switch model for analysis of switching converters to the literature. The main advantage of the model is that it has a unified and non-ideal property. With the proposed switch model, the transient events, like voltage spikes and high-frequency noises, caused by inductor and capacitor elements at switching instants can be observed properly.


Sign in / Sign up

Export Citation Format

Share Document