Lyapunov exponents of the Lorenz system.

<div><p>A close study about the varied anatomies of the S-Box algorithms published in the literature indicates that no attempt has been made using the notion of 3D. To cement the more cryptographic security, this research article ventures to present a novel S-Box algorithm exploiting the...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Nayeem Ahmad Khan (11727377) (author)
مؤلفون آخرون: Abdulbasid Banga (21512013) (author), Taher M. Ghazal (21601229) (author), Bayan Alabdullah (22170837) (author), Nadeem Iqbal (9020726) (author), Ahmad Alshamayleh (22170840) (author), Atif Ikram (18823779) (author), Hossam Diab (21512019) (author)
منشور في: 2025
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1852017064004288512
author Nayeem Ahmad Khan (11727377)
author2 Abdulbasid Banga (21512013)
Taher M. Ghazal (21601229)
Bayan Alabdullah (22170837)
Nadeem Iqbal (9020726)
Ahmad Alshamayleh (22170840)
Atif Ikram (18823779)
Hossam Diab (21512019)
author2_role author
author
author
author
author
author
author
author_facet Nayeem Ahmad Khan (11727377)
Abdulbasid Banga (21512013)
Taher M. Ghazal (21601229)
Bayan Alabdullah (22170837)
Nadeem Iqbal (9020726)
Ahmad Alshamayleh (22170840)
Atif Ikram (18823779)
Hossam Diab (21512019)
author_role author
dc.creator.none.fl_str_mv Nayeem Ahmad Khan (11727377)
Abdulbasid Banga (21512013)
Taher M. Ghazal (21601229)
Bayan Alabdullah (22170837)
Nadeem Iqbal (9020726)
Ahmad Alshamayleh (22170840)
Atif Ikram (18823779)
Hossam Diab (21512019)
dc.date.none.fl_str_mv 2025-09-02T18:01:31Z
dc.identifier.none.fl_str_mv 10.1371/journal.pone.0329024.g003
dc.relation.none.fl_str_mv https://figshare.com/articles/figure/Lyapunov_exponents_of_the_Lorenz_system_/30036894
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Microbiology
Cell Biology
Genetics
Molecular Biology
Neuroscience
Biotechnology
Immunology
Developmental Biology
Cancer
Science Policy
Infectious Diseases
Space Science
Information Systems not elsewhere classified
various cyber threats
smart grid infrastructures
lorenz chaotic system
contemporary cryptographic systems
research article ventures
offering robust protection
box design methodologies
box algorithms published
enhancing cryptographic security
strengthening encryption algorithms
potential cryptanalytic threats
box algorithm exploiting
cryptographic security
research contributes
data protection
algorithm initializes
box strategy
xlink ">
varied anatomies
values placed
rigorous analysis
promising avenue
produce streams
potential real
made using
literature indicates
iot devices
inserted randomly
inherent non
different cells
developed bears
close study
ample promise
1d array
dc.title.none.fl_str_mv Lyapunov exponents of the Lorenz system.
dc.type.none.fl_str_mv Image
Figure
info:eu-repo/semantics/publishedVersion
image
description <div><p>A close study about the varied anatomies of the S-Box algorithms published in the literature indicates that no attempt has been made using the notion of 3D. To cement the more cryptographic security, this research article ventures to present a novel S-Box algorithm exploiting the notion of 3D. First of all, the algorithm initializes a 3D scrambled S-Box with the value of -1. After that, a 1D array is initialized with all the numbers of the potential S-Box. Now, the values placed in the 1D array are inserted randomly to the different cells of the 3D scrambled S-Box until all the numbers from the 1D array are not shifted. The way, the S-Box has been developed bears an ample promise to raise the inherent non-linearity of the required S-Box which, in turn, equips the S-Box to defy the potential cryptanalytic threats from the hackers and other adversaries. Lorenz chaotic system has been employed to produce streams of random numbers. Through rigorous analysis and experimentation, we demonstrate the efficacy of our approach in enhancing cryptographic security, offering robust protection against various cyber threats. Our research contributes to the advancement of S-Box design methodologies, providing a promising avenue for strengthening encryption algorithms in contemporary cryptographic systems. Potential real-world applications include secure communications in IoT devices, encryption in smart grid infrastructures, and data protection in medical imaging systems.</p></div>
eu_rights_str_mv openAccess
id Manara_c5e02c8a9d34e516ae7e571e9621b4ff
identifier_str_mv 10.1371/journal.pone.0329024.g003
network_acronym_str Manara
network_name_str ManaraRepo
oai_identifier_str oai:figshare.com:article/30036894
publishDate 2025
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Lyapunov exponents of the Lorenz system.Nayeem Ahmad Khan (11727377)Abdulbasid Banga (21512013)Taher M. Ghazal (21601229)Bayan Alabdullah (22170837)Nadeem Iqbal (9020726)Ahmad Alshamayleh (22170840)Atif Ikram (18823779)Hossam Diab (21512019)MicrobiologyCell BiologyGeneticsMolecular BiologyNeuroscienceBiotechnologyImmunologyDevelopmental BiologyCancerScience PolicyInfectious DiseasesSpace ScienceInformation Systems not elsewhere classifiedvarious cyber threatssmart grid infrastructureslorenz chaotic systemcontemporary cryptographic systemsresearch article venturesoffering robust protectionbox design methodologiesbox algorithms publishedenhancing cryptographic securitystrengthening encryption algorithmspotential cryptanalytic threatsbox algorithm exploitingcryptographic securityresearch contributesdata protectionalgorithm initializesbox strategyxlink ">varied anatomiesvalues placedrigorous analysispromising avenueproduce streamspotential realmade usingliterature indicatesiot devicesinserted randomlyinherent nondifferent cellsdeveloped bearsclose studyample promise1d array<div><p>A close study about the varied anatomies of the S-Box algorithms published in the literature indicates that no attempt has been made using the notion of 3D. To cement the more cryptographic security, this research article ventures to present a novel S-Box algorithm exploiting the notion of 3D. First of all, the algorithm initializes a 3D scrambled S-Box with the value of -1. After that, a 1D array is initialized with all the numbers of the potential S-Box. Now, the values placed in the 1D array are inserted randomly to the different cells of the 3D scrambled S-Box until all the numbers from the 1D array are not shifted. The way, the S-Box has been developed bears an ample promise to raise the inherent non-linearity of the required S-Box which, in turn, equips the S-Box to defy the potential cryptanalytic threats from the hackers and other adversaries. Lorenz chaotic system has been employed to produce streams of random numbers. Through rigorous analysis and experimentation, we demonstrate the efficacy of our approach in enhancing cryptographic security, offering robust protection against various cyber threats. Our research contributes to the advancement of S-Box design methodologies, providing a promising avenue for strengthening encryption algorithms in contemporary cryptographic systems. Potential real-world applications include secure communications in IoT devices, encryption in smart grid infrastructures, and data protection in medical imaging systems.</p></div>2025-09-02T18:01:31ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0329024.g003https://figshare.com/articles/figure/Lyapunov_exponents_of_the_Lorenz_system_/30036894CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/300368942025-09-02T18:01:31Z
spellingShingle Lyapunov exponents of the Lorenz system.
Nayeem Ahmad Khan (11727377)
Microbiology
Cell Biology
Genetics
Molecular Biology
Neuroscience
Biotechnology
Immunology
Developmental Biology
Cancer
Science Policy
Infectious Diseases
Space Science
Information Systems not elsewhere classified
various cyber threats
smart grid infrastructures
lorenz chaotic system
contemporary cryptographic systems
research article ventures
offering robust protection
box design methodologies
box algorithms published
enhancing cryptographic security
strengthening encryption algorithms
potential cryptanalytic threats
box algorithm exploiting
cryptographic security
research contributes
data protection
algorithm initializes
box strategy
xlink ">
varied anatomies
values placed
rigorous analysis
promising avenue
produce streams
potential real
made using
literature indicates
iot devices
inserted randomly
inherent non
different cells
developed bears
close study
ample promise
1d array
status_str publishedVersion
title Lyapunov exponents of the Lorenz system.
title_full Lyapunov exponents of the Lorenz system.
title_fullStr Lyapunov exponents of the Lorenz system.
title_full_unstemmed Lyapunov exponents of the Lorenz system.
title_short Lyapunov exponents of the Lorenz system.
title_sort Lyapunov exponents of the Lorenz system.
topic Microbiology
Cell Biology
Genetics
Molecular Biology
Neuroscience
Biotechnology
Immunology
Developmental Biology
Cancer
Science Policy
Infectious Diseases
Space Science
Information Systems not elsewhere classified
various cyber threats
smart grid infrastructures
lorenz chaotic system
contemporary cryptographic systems
research article ventures
offering robust protection
box design methodologies
box algorithms published
enhancing cryptographic security
strengthening encryption algorithms
potential cryptanalytic threats
box algorithm exploiting
cryptographic security
research contributes
data protection
algorithm initializes
box strategy
xlink ">
varied anatomies
values placed
rigorous analysis
promising avenue
produce streams
potential real
made using
literature indicates
iot devices
inserted randomly
inherent non
different cells
developed bears
close study
ample promise
1d array