all InfoSec news
Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain. (arXiv:2205.13593v1 [cs.CR])
May 30, 2022, 1:20 a.m. | Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla
cs.CR updates on arXiv.org arxiv.org
The protection of confidential information is a global issue and block
encryption algorithms are the most reliable option. The famous information
theorist, Claude Shannon has given two desirable characteristics that should
exist in a strong cipher which are substitution and permutation in their
fundamental research on Communication Theory of Secrecy Systems. block ciphers
strictly follow the substitution and permutation principle to generate a
ciphertext. The actual strength of the block ciphers against several attacks is
entirely based on its substitution …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Cloud Security Engineer
@ Pacific Gas and Electric Company | Oakland, CA, US, 94612
Penetration Tester (Level 2)
@ Verve Group | Pune, Mahārāshtra, India
Senior Security Operations Engineer (Azure)
@ Jamf | US Remote
(Junior) Cyber Security Consultant IAM (m/w/d)
@ Atos | Berlin, DE, D-13353