Table 4 Proposed S-box.
From: A study of text-theoretical approach to S-box construction with image encryption applications
5 | 248 | 146 | 244 | 85 | 251 | 110 | 225 | 187 | 138 | 254 | 84 | 30 | 208 | 109 | 125 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
130 | 46 | 54 | 64 | 238 | 186 | 234 | 103 | 29 | 49 | 74 | 45 | 7 | 188 | 68 | 79 |
193 | 212 | 95 | 222 | 194 | 209 | 76 | 176 | 111 | 61 | 156 | 215 | 112 | 159 | 62 | 48 |
128 | 23 | 38 | 55 | 195 | 150 | 213 | 116 | 224 | 184 | 19 | 50 | 20 | 12 | 148 | 131 |
1 | 240 | 182 | 202 | 33 | 100 | 80 | 121 | 77 | 214 | 206 | 189 | 171 | 169 | 134 | 221 |
203 | 26 | 11 | 86 | 155 | 114 | 137 | 247 | 241 | 123 | 31 | 154 | 0 | 42 | 65 | 83 |
2 | 219 | 218 | 39 | 249 | 151 | 250 | 235 | 129 | 126 | 236 | 59 | 16 | 135 | 205 | 97 |
37 | 227 | 34 | 216 | 117 | 157 | 18 | 140 | 67 | 71 | 149 | 13 | 168 | 73 | 4 | 22 |
63 | 53 | 105 | 28 | 106 | 166 | 255 | 118 | 115 | 204 | 226 | 179 | 211 | 43 | 185 | 165 |
231 | 99 | 120 | 158 | 9 | 102 | 239 | 133 | 3 | 15 | 75 | 245 | 58 | 101 | 72 | 57 |
232 | 66 | 40 | 10 | 132 | 41 | 246 | 180 | 230 | 210 | 78 | 196 | 220 | 88 | 198 | 181 |
162 | 229 | 98 | 94 | 81 | 199 | 174 | 124 | 217 | 25 | 153 | 122 | 191 | 167 | 127 | 177 |
104 | 32 | 197 | 142 | 119 | 252 | 253 | 160 | 56 | 21 | 96 | 173 | 92 | 200 | 145 | 44 |
136 | 228 | 89 | 90 | 143 | 201 | 163 | 242 | 70 | 172 | 93 | 233 | 183 | 113 | 192 | 35 |
69 | 82 | 223 | 139 | 27 | 36 | 47 | 141 | 91 | 175 | 108 | 14 | 144 | 52 | 60 | 237 |
207 | 24 | 170 | 243 | 51 | 147 | 8 | 164 | 17 | 190 | 107 | 152 | 6 | 161 | 87 | 178 |