Lyapunov exponents of the Lorenz system.
<div><p>A close study about the varied anatomies of the S-Box algorithms published in the literature indicates that no attempt has been made using the notion of 3D. To cement the more cryptographic security, this research article ventures to present a novel S-Box algorithm exploiting the...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , , , , , , |
| منشور في: |
2025
|
| الموضوعات: | |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1852017064004288512 |
|---|---|
| author | Nayeem Ahmad Khan (11727377) |
| author2 | Abdulbasid Banga (21512013) Taher M. Ghazal (21601229) Bayan Alabdullah (22170837) Nadeem Iqbal (9020726) Ahmad Alshamayleh (22170840) Atif Ikram (18823779) Hossam Diab (21512019) |
| author2_role | author author author author author author author |
| author_facet | Nayeem Ahmad Khan (11727377) Abdulbasid Banga (21512013) Taher M. Ghazal (21601229) Bayan Alabdullah (22170837) Nadeem Iqbal (9020726) Ahmad Alshamayleh (22170840) Atif Ikram (18823779) Hossam Diab (21512019) |
| author_role | author |
| dc.creator.none.fl_str_mv | Nayeem Ahmad Khan (11727377) Abdulbasid Banga (21512013) Taher M. Ghazal (21601229) Bayan Alabdullah (22170837) Nadeem Iqbal (9020726) Ahmad Alshamayleh (22170840) Atif Ikram (18823779) Hossam Diab (21512019) |
| dc.date.none.fl_str_mv | 2025-09-02T18:01:31Z |
| dc.identifier.none.fl_str_mv | 10.1371/journal.pone.0329024.g003 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/figure/Lyapunov_exponents_of_the_Lorenz_system_/30036894 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Microbiology Cell Biology Genetics Molecular Biology Neuroscience Biotechnology Immunology Developmental Biology Cancer Science Policy Infectious Diseases Space Science Information Systems not elsewhere classified various cyber threats smart grid infrastructures lorenz chaotic system contemporary cryptographic systems research article ventures offering robust protection box design methodologies box algorithms published enhancing cryptographic security strengthening encryption algorithms potential cryptanalytic threats box algorithm exploiting cryptographic security research contributes data protection algorithm initializes box strategy xlink "> varied anatomies values placed rigorous analysis promising avenue produce streams potential real made using literature indicates iot devices inserted randomly inherent non different cells developed bears close study ample promise 1d array |
| dc.title.none.fl_str_mv | Lyapunov exponents of the Lorenz system. |
| dc.type.none.fl_str_mv | Image Figure info:eu-repo/semantics/publishedVersion image |
| description | <div><p>A close study about the varied anatomies of the S-Box algorithms published in the literature indicates that no attempt has been made using the notion of 3D. To cement the more cryptographic security, this research article ventures to present a novel S-Box algorithm exploiting the notion of 3D. First of all, the algorithm initializes a 3D scrambled S-Box with the value of -1. After that, a 1D array is initialized with all the numbers of the potential S-Box. Now, the values placed in the 1D array are inserted randomly to the different cells of the 3D scrambled S-Box until all the numbers from the 1D array are not shifted. The way, the S-Box has been developed bears an ample promise to raise the inherent non-linearity of the required S-Box which, in turn, equips the S-Box to defy the potential cryptanalytic threats from the hackers and other adversaries. Lorenz chaotic system has been employed to produce streams of random numbers. Through rigorous analysis and experimentation, we demonstrate the efficacy of our approach in enhancing cryptographic security, offering robust protection against various cyber threats. Our research contributes to the advancement of S-Box design methodologies, providing a promising avenue for strengthening encryption algorithms in contemporary cryptographic systems. Potential real-world applications include secure communications in IoT devices, encryption in smart grid infrastructures, and data protection in medical imaging systems.</p></div> |
| eu_rights_str_mv | openAccess |
| id | Manara_c5e02c8a9d34e516ae7e571e9621b4ff |
| identifier_str_mv | 10.1371/journal.pone.0329024.g003 |
| network_acronym_str | Manara |
| network_name_str | ManaraRepo |
| oai_identifier_str | oai:figshare.com:article/30036894 |
| publishDate | 2025 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Lyapunov exponents of the Lorenz system.Nayeem Ahmad Khan (11727377)Abdulbasid Banga (21512013)Taher M. Ghazal (21601229)Bayan Alabdullah (22170837)Nadeem Iqbal (9020726)Ahmad Alshamayleh (22170840)Atif Ikram (18823779)Hossam Diab (21512019)MicrobiologyCell BiologyGeneticsMolecular BiologyNeuroscienceBiotechnologyImmunologyDevelopmental BiologyCancerScience PolicyInfectious DiseasesSpace ScienceInformation Systems not elsewhere classifiedvarious cyber threatssmart grid infrastructureslorenz chaotic systemcontemporary cryptographic systemsresearch article venturesoffering robust protectionbox design methodologiesbox algorithms publishedenhancing cryptographic securitystrengthening encryption algorithmspotential cryptanalytic threatsbox algorithm exploitingcryptographic securityresearch contributesdata protectionalgorithm initializesbox strategyxlink ">varied anatomiesvalues placedrigorous analysispromising avenueproduce streamspotential realmade usingliterature indicatesiot devicesinserted randomlyinherent nondifferent cellsdeveloped bearsclose studyample promise1d array<div><p>A close study about the varied anatomies of the S-Box algorithms published in the literature indicates that no attempt has been made using the notion of 3D. To cement the more cryptographic security, this research article ventures to present a novel S-Box algorithm exploiting the notion of 3D. First of all, the algorithm initializes a 3D scrambled S-Box with the value of -1. After that, a 1D array is initialized with all the numbers of the potential S-Box. Now, the values placed in the 1D array are inserted randomly to the different cells of the 3D scrambled S-Box until all the numbers from the 1D array are not shifted. The way, the S-Box has been developed bears an ample promise to raise the inherent non-linearity of the required S-Box which, in turn, equips the S-Box to defy the potential cryptanalytic threats from the hackers and other adversaries. Lorenz chaotic system has been employed to produce streams of random numbers. Through rigorous analysis and experimentation, we demonstrate the efficacy of our approach in enhancing cryptographic security, offering robust protection against various cyber threats. Our research contributes to the advancement of S-Box design methodologies, providing a promising avenue for strengthening encryption algorithms in contemporary cryptographic systems. Potential real-world applications include secure communications in IoT devices, encryption in smart grid infrastructures, and data protection in medical imaging systems.</p></div>2025-09-02T18:01:31ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0329024.g003https://figshare.com/articles/figure/Lyapunov_exponents_of_the_Lorenz_system_/30036894CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/300368942025-09-02T18:01:31Z |
| spellingShingle | Lyapunov exponents of the Lorenz system. Nayeem Ahmad Khan (11727377) Microbiology Cell Biology Genetics Molecular Biology Neuroscience Biotechnology Immunology Developmental Biology Cancer Science Policy Infectious Diseases Space Science Information Systems not elsewhere classified various cyber threats smart grid infrastructures lorenz chaotic system contemporary cryptographic systems research article ventures offering robust protection box design methodologies box algorithms published enhancing cryptographic security strengthening encryption algorithms potential cryptanalytic threats box algorithm exploiting cryptographic security research contributes data protection algorithm initializes box strategy xlink "> varied anatomies values placed rigorous analysis promising avenue produce streams potential real made using literature indicates iot devices inserted randomly inherent non different cells developed bears close study ample promise 1d array |
| status_str | publishedVersion |
| title | Lyapunov exponents of the Lorenz system. |
| title_full | Lyapunov exponents of the Lorenz system. |
| title_fullStr | Lyapunov exponents of the Lorenz system. |
| title_full_unstemmed | Lyapunov exponents of the Lorenz system. |
| title_short | Lyapunov exponents of the Lorenz system. |
| title_sort | Lyapunov exponents of the Lorenz system. |
| topic | Microbiology Cell Biology Genetics Molecular Biology Neuroscience Biotechnology Immunology Developmental Biology Cancer Science Policy Infectious Diseases Space Science Information Systems not elsewhere classified various cyber threats smart grid infrastructures lorenz chaotic system contemporary cryptographic systems research article ventures offering robust protection box design methodologies box algorithms published enhancing cryptographic security strengthening encryption algorithms potential cryptanalytic threats box algorithm exploiting cryptographic security research contributes data protection algorithm initializes box strategy xlink "> varied anatomies values placed rigorous analysis promising avenue produce streams potential real made using literature indicates iot devices inserted randomly inherent non different cells developed bears close study ample promise 1d array |