Research article Special Issues

Heritage and carob trees: Where the monumental and landscape intersect

  • Received: 03 April 2024 Revised: 01 July 2024 Accepted: 18 July 2024 Published: 27 August 2024
  • We aimed to explore the significance of monumental trees as elements of heritage and their role in interpreting landscapes. Monumental carob trees, characterized by their impressive size and long lifespan, serve as valuable sources of information for understanding the territories they inhabit and the human societies that have preserved them over time. Over the centuries, these carob trees narrate the tale of Mediterranean landscapes, akin to stone monuments, making them authentic natural and cultural treasures of the Mediterranean region. Our findings, based on fields observations in Sicily (Italy) and GIS analysis, suggested that the landscape is an enabling medium through which traditional culture is preserved, local identities are transferred, and rural heritage is acknowledged. We unfold a conception of landscape based on visual, inherited traditional agricultural practices, valued rural heritage, and territorial identity.

    Citation: Gianni Petino, Gaetano Chinnici, Donatella Privitera. Heritage and carob trees: Where the monumental and landscape intersect[J]. AIMS Geosciences, 2024, 10(3): 623-640. doi: 10.3934/geosci.2024032

    Related Papers:

    [1] Abdul Razaq, Muhammad Mahboob Ahsan, Hanan Alolaiyan, Musheer Ahmad, Qin Xin . Enhancing the robustness of block ciphers through a graphical S-box evolution scheme for secure multimedia applications. AIMS Mathematics, 2024, 9(12): 35377-35400. doi: 10.3934/math.20241681
    [2] Mohammad Mazyad Hazzazi, Farooq E Azam, Rashad Ali, Muhammad Kamran Jamil, Sameer Abdullah Nooh, Fahad Alblehai . Batch generated strongly nonlinear S-Boxes using enhanced quadratic maps. AIMS Mathematics, 2025, 10(3): 5671-5695. doi: 10.3934/math.2025262
    [3] Adil Waheed, Fazli Subhan, Mazliham Mohd Suud, Muhammad Yasir Hayat Malik, Alina Mirza, Farkhanda Afzal . Construction of nonlinear component of block cipher using coset graph. AIMS Mathematics, 2023, 8(9): 21644-21667. doi: 10.3934/math.20231104
    [4] Dong Wang, Ying Li, Wenxv Ding . The least squares Bisymmetric solution of quaternion matrix equation AXB=C. AIMS Mathematics, 2021, 6(12): 13247-13257. doi: 10.3934/math.2021766
    [5] Florian-Horia Vasilescu . Spectrum and analytic functional calculus in real and quaternionic frameworks: An overview. AIMS Mathematics, 2024, 9(1): 2326-2344. doi: 10.3934/math.2024115
    [6] Ailing Li, Mengting Lv, Yifang Yan . Asymptotic stability for quaternion-valued BAM neural networks via a contradictory method and two Lyapunov functionals. AIMS Mathematics, 2022, 7(5): 8206-8223. doi: 10.3934/math.2022457
    [7] R. Sriraman, P. Vignesh, V. C. Amritha, G. Rachakit, Prasanalakshmi Balaji . Direct quaternion method-based stability criteria for quaternion-valued Takagi-Sugeno fuzzy BAM delayed neural networks using quaternion-valued Wirtinger-based integral inequality. AIMS Mathematics, 2023, 8(5): 10486-10512. doi: 10.3934/math.2023532
    [8] Ai-qun Ma, Lin Chen, Zijie Qin . Jordan semi-triple derivations and Jordan centralizers on generalized quaternion algebras. AIMS Mathematics, 2023, 8(3): 6026-6035. doi: 10.3934/math.2023304
    [9] Anli Wei, Ying Li, Wenxv Ding, Jianli Zhao . Three special kinds of least squares solutions for the quaternion generalized Sylvester matrix equation. AIMS Mathematics, 2022, 7(4): 5029-5048. doi: 10.3934/math.2022280
    [10] Ayman Elsharkawy, Ahmer Ali, Muhammad Hanif, Fatimah Alghamdi . Exploring quaternionic Bertrand curves: involutes and evolutes in E4. AIMS Mathematics, 2025, 10(3): 4598-4619. doi: 10.3934/math.2025213
  • We aimed to explore the significance of monumental trees as elements of heritage and their role in interpreting landscapes. Monumental carob trees, characterized by their impressive size and long lifespan, serve as valuable sources of information for understanding the territories they inhabit and the human societies that have preserved them over time. Over the centuries, these carob trees narrate the tale of Mediterranean landscapes, akin to stone monuments, making them authentic natural and cultural treasures of the Mediterranean region. Our findings, based on fields observations in Sicily (Italy) and GIS analysis, suggested that the landscape is an enabling medium through which traditional culture is preserved, local identities are transferred, and rural heritage is acknowledged. We unfold a conception of landscape based on visual, inherited traditional agricultural practices, valued rural heritage, and territorial identity.



    Cryptography was widely used in military, diplomatic, and government applications until the 1970s. In the 1980s, the telecommunications and financial industries installed hardware cryptographic devices. The mobile phone system was the first cryptographic application in the late 1980s. Nowadays, everyone uses cryptographic applications in their daily lives. Our daily lives commonly depend on the secure transmission of information and data. Online shopping, cell phone messages and calls, ATMs, electronic mail, facsimile, wireless media, and data transfer over the internet all require a system to maintain the secrecy and integrity of private information. Cryptography offers a mechanism for everyone to interact safely in a hostile environment. Sensitive data is significantly aided by cryptography. Communication is encrypted to guarantee that its meaning is hidden, preventing anybody who reads it from understanding something regarding it unless somebody else manages to decrypt it [1].

    Substitution boxes, also known as S-boxes, are a key component of modern cryptographic algorithms. Shannon suggested the notion of an S-box in 1949 [2]. S-boxes are used to replace one group of bits with another group of bits to provide confusion and non-linearity in the encryption process. The substitution boxes are designed to make it difficult for attackers to determine the relationship between the input and output of the encryption algorithm. This makes it harder for attackers to crack the encryption, providing increased security for sensitive data. S-boxes have been used in a wide range of cryptographic algorithms, including the Advanced Encryption Standard (AES), the Data Encryption Standard (DES), and the Blowfish encryption algorithm. The design of S-boxes is critical to the security of these algorithms, and much research has been done to create S-boxes that are resistant to attacks. The design of S-boxes typically involves a combination of mathematical analysis, computational complexity, and heuristics to produce a strong S-box that is difficult to break. One of the key properties of S-boxes is their non-linearity. Non-linearity ensures that small changes in the input produce large changes in the output, making it difficult for attackers to determine the relationship between the input and output of the encryption algorithm. This nonlinearity is achieved through careful design of the S-box, often involving complex mathematical functions that ensure that the output is as different as possible from the input. The security of S-boxes has been the subject of much research, with many attacks developed over the years to break them. One of the most famous attacks on S-boxes is the differential cryptanalysis attack, which was developed in the 1990s. This attack involves analyzing the differences between pairs of inputs to the S-box and the corresponding differences in the output. By analyzing these differences, attackers can learn more about the S-box and potentially break the encryption [3,4,5].

    Many scholars employed diverse algebraic and statistical frameworks to confound data and produce S-boxes. In [6], the authors suggested S-boxes over the permutation of the symmetric group. Javeed and Shah utilized a chaotic dynamical system and symmetric group to construct the non-linear component of a block cipher [7]. Meanwhile, the authors of [8] described an S-box constructed using the subgroup of the Galois field. In [9], the authors proposed a dynamic S-box using novel chaotic map. In [10], a new scheme for constructing S-boxes was presented based on the linear fractional transformation and permutation function. The Mobius group and finite field were used to construct an S-box in [11], while [12] proposed an S-box based on a nonlinear chaotic map. Sajjad and Shah designed a pair of nonlinear components of a block cipher over Gaussian integers in [13], and [14] presented fundamental results of cyclic codes and decoding algorithms over octonion integers. Differential cryptanalysis of DES-like cryptosystems was developed by the authors of [15], while Quiroga and Cantón proposed generating dynamical S-boxes for block ciphers using an extended logistic map in [16]. Tang and Liao designed a new method of dynamical S-boxes based on discretized chaotic maps [17]. While Chen and Liao extended this method to obtain S-boxes based on three-dimensional chaotic Baker maps [18]. A novel approach for strong S-Box generation algorithm design based on a chaotic scaled zhongtang system was presented by Çavuşoğlu and Zengin in [19]. Siddiqui and Naseer developed a novel scheme of substitution-box design based on modified Pascal's triangle and elliptic curve [20]. Farhan and Ali designed a new S-box generation algorithm based on the multistability behavior of a plasma perturbation model [21]. In [22], the authors approached the S-boxes and permutation, substitution-based encryption. The authors constructed block ciphers based on chaotic maps in [23,24].

    Quaternion integers are an extension of complex numbers that have gained significant attention in various fields of physics and engineering due to their unique properties. They are a type of hypercomplex number that can be used to describe rotations in 3D space and have applications in areas such as computer graphics, robotics, and quantum mechanics. The concept of quaternion integers was introduced by the Irish mathematician William Rowan Hamilton in 1843. He famously impressed the fundamental formula for quaternions onto a stone bridge in Dublin. Since then, quaternion algebra has been extensively studied, and its applications have been explored [25,26,27]. In [28], Ozen and Guzeltepe constructed cyclic codes over certain finite quaternion integer rings. Shah and Rasool presented codes over quaternion integers [29]. In [30], the authors constructed cyclic codes over quaternion integers and developed a decoding algorithm. These quaternion structures can be helpful for the construction of S-boxes.

    This article presents a novel approach for designing a pair of nonlinear components for a block cipher over QI. Quaternions are an extension of complex numbers that allow for more complex arithmetic operations, which can enhance the security of the cipher. We demonstrate the effectiveness of our proposed design by implementing it in a block cipher and conducting extensive security analysis. Quaternion integers give pair of substitution boxes (S-boxes) after fixing parameters but other structures give only one S-box after fixing parameters. Our results show that the proposed design provides superior security compared to existing designs, two making a promising approach for future cryptographic applications.

    The rest of this article is organized as follows. Section 2 provides an overview of the background and related work of quaternion integers. Section 3 presents our proposed design for a pair of nonlinear components, including a detailed description of the operations. Analysis of the proposed S-boxes including nonlinearity, bit independence criterion, strict avalanche criterion, linear approximation probability, and differential approximation probability investigated in Section 4. The comparison of the proposed S- boxes with some of the existing S- boxes are given in Section 5. Conclusions and future directions are given in Section 6.

    The important ideas and fundamental conclusions that will be employed in the analysis of subsequent sections are presented in this section. Prior to that, we should review the definition of quaternion integers, their addition and multiplication, their residue class, and other associated findings.

    By following [28, Section 2], let H(R) be the Hamilton Quaternion algebra over the real number R is the non-commutative but associative unital algebra if it satisfies the following conditions.

    H(R)={b0+b1i+b2j+b3k:b0,b1,b2,b3R} is free R module.

    • The multiplicative identity is 1.

    i2=j2=k2=1  and  jk=kj=i,ki=ik=j,ij=ji=k.

    The Quaternion integer ring H(Z)={b0+b1i+b2j+b3k:  for  all  b0,b1,b2,b3Z} contained in H(R), where Z is the ring of integers. If q=b0+b1i+b2j+b3k is a Quaternion integer, then q=b0b1ib2jb3k is the Quaternion conjugate of q. Let N(q)=qq=b20+b21+b22+b23 be the norm of q. A Quaternion integer q has only two parts one is the scalar part (S.P) b0 and the other is the vector part (V.P) b1i+b2j+b3k. In Quaternion integer's commutative property of multiplication does not hold. It is possible only in case of two vector parts of quaternion integers are parallel.

    Define H(K) as: H(K)={a+bU:a,bZ}, Where U is (i+j+k). Hence H(K) is a subring of the Quaternion integer ring H(Z), and also the commutative property of multiplication holds over H(K).

    Let q1=c0+c1i+c2j+c3k and q2=d0+d1i+d2j+d3k be the two quaternion integers then, their sum q1+q2 and product q1q2 will be also a quaternion integer as;

    q1+q2=(c0+c1i+c2j+c3k)+(d0+d1i+d2j+d3k)=(c0+d0)+(c1+d1)i+(c2+d2)j+(c3+d3)k=e0+e1i+e2j+e3=q3q1q2=(c0+c1i+c2j+c3k)(d0+d1i+d2j+d3k)=(c0d0+c0d1i+c0d2j+c0d3k+c1d0ic1d1+c1d2kc1d3j+c2d0jc2d1kc2d2+c2d3i+c3d0k+c3d1jc3d2ic3d3)=(c0d0c1d1c2d2c3d3)+(c0d1+c1d0+c2d3c3d2)i+(c0d2+c2d0+c3d1c1d3)j+(c0d3+c3d0+c1d2c2d1)k=g0+g1i+g2j+g3k=q4

    Theorem: In [28, Section 2], the set of natural numbers for each odd rational prime p, there is a prime δH(Z), such that N(δ)=p=δδ. In particular, p is not prime in H(Z).

    Theorem: In [29, Section 2], let δH(Z) be prime in H(Z) if and only if N(δ) be prime in Z.

    In [30, Section 2], let H(K)δ be the residue class of H(K) modulo δ, where δ=a+bU. Then, the modulo function

    ϕ:H(K)={a+bU:a,bZ}H(K)δ
    ϕ(q)=z(mod  δ)=q[qδp]δ

    Where zH(K)δ. The previous equation involves rounding the number of [.] to the nearest integer. To accomplish QI rounding, it is necessary to round the coefficient of the vector part (C.V.P) and scalar part (S.P) independently to the nearest integer.

    Theorem: In [30, Section 2], let δ be a quaternion prime, and the number of quaternion integers modulo δ is the norm of δ. If α0(mod  δ), then αp11(mod  δ).

    Remark: The group generated by <α> in the above Theorem is named G.

    Multiple methods can be employed to cause confusion inside a security system. The S-box is a nonlinear component of a cryptographic algorithm. The S-boxes are generally formed by the QI class or the multiplicative cyclic group. As a result, it is feasible to create a variety of S-boxes across the residue class of QI, which presents a fantastic outlook for the development of secure and consistent cryptosystems. The subsequent procedures are useful for constructing S-boxes over the residue class of QI as;

    Step 1: Construct a cyclic group G of order p1 over the residue class of QI.

    Step 2: Apply permutation through affine mapping as g(x)=(sx+t)(mod  2n)

    Where tG and s be the unit element of G.

    Step 3: Separate real parts (R.P) and coefficients of the vector parts (C.V.P) of Step 2.

    Step 4: Apply modulo 2n over the separated parts of Step 3.

    Step 5: Select the first 2n non-repeated elements from the elements of Step 4.

    Step 6: Select the first 2n non-repeated elements from the S.P and also select the first 2n non-repeated elements from the C.V.P of Step 3.

    Step 7: Get pair of nonlinear components of a block cipher.

    The construction of S-boxes by Quaternion integers provides us with better performance than instead of S-boxes by using other structures like chaotic maps, elliptic curves, finite fields, Gaussian integers, Eisenstein integers, etc.

    Let δ=16+i+j+k=(16,1,1,1), p=N(δ)=162+12+12+12=259, and β=5+i+j+k=(5,1,1,1), then the cyclic group generated by β shown in Table 1.

    Table 1.  Cyclic group generated by β.
    i βi S.P (βi) C.V.P (βi) (S.P (βi))(mod 16) (C.V.P(βi))(mod 16)
    1 (5,1,1,1) 5 1 5 1
    2 (9,7,7,7) 9 7 9 9
    3 (6,8,8,8) 6 8 6 8
    . . . . . .
    . . . . . .
    . . . . . .
    258 (1,0,0,0) 1 0 1 0

     | Show Table
    DownLoad: CSV

    Select the first 16 non-repeated elements from the last two columns of Table 1, then apply the affine permutation mapping, f(x)=(4x+1)(mod16), and get the pair of S-boxes separately in Table 2 and 3.

    Table 2.  4×4 S-box by the S.P of QI.
    4 15 1 14
    0 5 7 12
    2 13 3 6
    10 11 8 9

     | Show Table
    DownLoad: CSV
    Table 3.  4×4 S-box by the C.V.P of QI.
    1 10 2 6
    13 14 11 8
    9 7 0 12
    4 3 5 15

     | Show Table
    DownLoad: CSV

    Let δ=68+31i+31j+31k=(68,31,31,31),p=N(δ)=7507, and β=1+17i+17j+17k=(1,17,17,17), then the cyclic group generated by β shown in Table 4;

    Table 4.  Cyclic group generated by β over QI.
    i βi S.P(βi) C.V.P(βi) (S.P(βi))(mod 256) (C.V.P(βi))(mod 256)
    1 (1,17,17,17) 1 17 1 17
    2 (48,14,14,14) 48 14 208 14
    3 (11,3,3,3) 11 3 11 253
    . . . . . .
    . . . . . .
    . . . . . .
    3916 (1,0,0,0) 1 0 1 0

     | Show Table
    DownLoad: CSV

    Select the first 256 non-repeated elements from the real part of Table 4. Then apply the affine permutation map g(x)=(121x+166)(mod  256), and get the S- box from the scalar part of QI in Table 5.

    Table 5.  A=8×8 S-box by the S.P of QI.
    202 74 193 117 143 136 173 126 132 67 139 122 219 215 200 58
    164 153 221 106 222 251 85 14 142 233 131 68 217 100 80 118
    119 247 8 45 55 152 169 13 97 250 29 244 82 170 176 147
    0 57 185 18 121 197 140 104 240 75 35 177 171 203 54 207
    49 210 2 249 157 213 60 174 105 144 181 40 179 43 137 232
    194 124 125 120 230 20 175 214 150 226 21 66 245 111 236 186
    191 151 246 23 141 165 243 205 241 63 39 110 31 12 190 94
    73 107 99 96 216 162 72 28 231 37 138 145 69 178 6 156
    116 92 9 59 206 11 114 161 65 228 128 192 183 47 76 239
    148 5 77 198 81 208 204 112 89 182 242 83 10 32 52 84
    1 16 158 103 113 108 115 71 53 212 33 17 218 167 195 159
    25 234 209 172 188 211 248 22 46 189 48 155 254 41 253 90
    91 237 223 184 201 163 78 154 26 123 196 19 61 51 187 227
    98 133 135 30 129 146 229 3 95 93 255 87 64 101 34 238
    24 224 70 130 15 27 42 168 134 235 180 109 56 220 160 36
    149 102 166 79 38 7 88 252 4 127 199 225 44 86 62 50

     | Show Table
    DownLoad: CSV

    Select the first 256 non-repeated elements from the imaginary part of Table 4. Then apply the affine permutation map g(x)=(37x+120)(mod  256), and get the S-box for the C.V.P of QI in Table 6.

    Table 6.  B=8×8 S-box by the C. V. P of QI.
    74 202 65 245 15 8 45 254 4 195 11 250 91 87 72 186
    36 25 93 234 94 123 213 142 14 105 3 196 89 228 208 246
    247 119 136 173 183 24 41 141 225 122 157 116 210 42 48 19
    128 185 57 146 249 69 12 232 112 203 163 49 43 75 182 79
    177 82 130 121 29 85 188 46 233 16 53 168 51 171 9 104
    66 252 253 248 102 148 47 86 22 98 149 194 117 239 108 58
    63 23 118 151 13 37 115 77 113 191 167 238 159 140 62 222
    201 235 227 224 88 34 200 156 103 165 10 17 197 50 134 28
    244 220 137 187 78 139 242 33 193 100 0 64 55 175 204 111
    20 133 205 70 209 80 76 240 217 54 114 211 138 160 180 212
    129 144 30 231 241 236 243 199 181 84 161 145 90 39 67 31
    153 106 81 44 60 83 120 150 174 61 176 27 126 169 125 218
    219 109 95 56 73 35 206 26 154 251 68 147 189 179 59 99
    226 5 7 158 1 18 101 131 223 221 127 215 192 229 162 110
    152 96 198 2 143 155 170 40 6 107 52 237 184 92 32 164
    21 230 38 207 166 135 216 124 132 255 71 97 172 214 190 178

     | Show Table
    DownLoad: CSV

    The S-boxes A, and B in 3.1.2 are invertible and bijective. The procedure of inverse S-boxes over the residue class of GI is defined by applying inverse permutation through the following affine mapping h(x)=(ux+v)(mod  2n), where u is the multiplicative inverse of s under modulo 2n and v is the additive inverse of ut under modulo 2n.

    The Inverse S-box of A is defined by the map ,h1(x)=(201x+143)(mod  256) in Table 7.

    Table 7.  C= Inverse S-box of A.
    218 48 160 66 215 248 145 126 245 34 130 156 133 109 39 23
    228 161 171 51 203 85 90 183 99 224 176 200 229 119 42 211
    108 157 170 222 58 239 121 244 106 75 189 230 77 252 35 184
    141 186 64 255 205 158 168 62 36 236 49 15 131 70 204 254
    105 220 136 91 9 27 124 226 167 118 112 1 57 142 146 198
    243 30 148 44 155 159 22 253 219 246 152 191 192 129 217 111
    216 115 40 208 114 29 221 241 163 55 72 19 113 165 235 107
    93 151 164 134 166 128 3 31 32 83 52 11 201 81 82 7
    249 138 212 227 26 8 209 232 210 5 78 122 10 54 100 24
    4 73 123 213 47 144 240 88 97 37 17 199 187 127 68 162
    175 238 135 117 197 16 101 242 173 231 38 45 60 179 6 71
    86 46 59 125 76 234 74 153 140 195 50 95 206 180 185 110
    96 139 2 80 174 202 53 147 250 14 196 0 61 150 103 132
    63 149 178 65 181 169 69 87 13 116 28 172 12 237 18 20
    194 225 251 89 207 137 214 84 120 79 25 177 233 94 193 223
    143 56 104 154 102 43 92 98 33 182 67 41 21 247 190 188

     | Show Table
    DownLoad: CSV

    The inverse S-box of B is defined by the map ,h2(x)=(173x+24)(mod  256) in Table 8.

    Table 8.  D= Inverse S-box of B.
    120 37 200 237 180 60 209 49 41 251 225 226 175 107 133 42
    128 132 122 11 142 242 168 212 151 240 56 144 2 236 164 155
    186 51 95 109 230 18 138 29 68 91 47 77 202 6 1 220
    31 241 130 103 75 110 188 174 94 35 177 0 80 149 53 98
    250 72 139 196 113 15 246 167 117 44 17 162 10 234 21 34
    85 252 245 215 229 26 214 55 76 213 66 163 185 172 197 183
    135 170 65 105 5 97 156 179 187 182 194 146 87 52 59 169
    208 238 231 4 112 227 33 158 176 148 61 62 74 106 28 206
    147 81 204 7 64 58 181 136 232 173 54 254 127 108 159 137
    45 247 233 19 191 223 101 111 216 189 219 118 8 116 100 114
    253 84 141 24 152 71 255 184 198 199 210 244 27 211 89 221
    119 70 129 154 143 123 165 32 43 67 16 46 36 239 83 96
    153 201 160 190 23 93 161 79 218 39 157 90 25 140 145 222
    217 63 124 134 126 203 9 40 115 50 82 92 249 205 3 88
    192 131 166 86 235 193 57 125 20 195 22 99 224 14 121 48
    150 78 69 12 228 104 73 13 178 243 207 102 248 30 38 171

     | Show Table
    DownLoad: CSV

    The analysis of S-boxes is a crucial part of cryptanalysis, ensuring the security of encrypted data. Nonlinearity, output distribution, and resistance to attacks are all important aspects of S-box design, and their analysis requires mathematical and statistical tools to measure their effectiveness [31,32,33,34,35,36,37,38,39,40]. There is the following analysis.

    Nonlinearity (NL) is a fundamental property of many natural and artificial systems, and it describes the behavior of a system that is not proportional to its inputs. In other words, small changes in inputs may lead to significant changes in outputs, and the relationship between input and output is not a straight line. Nonlinearity is observed in a wide range of phenomena, such as fluid dynamics, electrical circuits, and signal processing. Nonlinear systems can exhibit complex behavior, including chaotic dynamics, oscillations, and bifurcations, and they are often more difficult to analyze and control than linear systems. Nonlinearity is a critical concept in many fields, including physics, engineering, economics, and biology, and it plays a crucial role in understanding the behavior of complex systems and designing effective control strategies. The upper bound of NL for the S-box is N(f)=2n12n21 [26]. The optimal value of the NL of the S-box is 120. The NL results of the proposed 8×8 S- boxes A, and B are given in Table 9.

    Table 9.  Nonlinearity of 8×8 proposed S-boxes.
    Primes Proposed S-boxes f1 f2 f3 f4 f5 f6 f7 f8 Average
    7507 A 108 108 106 108 106 106 108 106 107.00
    B 108 108 106 108 106 106 108 106 107.00

     | Show Table
    DownLoad: CSV

    The proposed S-boxes A and B exhibit a maximum nonlinearity of 108, as well as a minimum nonlinearity of 106. Additionally, the average nonlinearity of both S-boxes A and B is calculated to be 107.00.

    The bit-independent criterion (BIC) is a measure used in cryptanalysis to evaluate the security of substitution boxes, or S-boxes, used in block ciphers. The criterion is designed to assess the strength of an S-box against differential cryptanalysis, which is a type of attack used by cryptanalysts to recover the key used in encryption. The bit-independent criterion measures the ability of an S-box to satisfy certain properties that make it resistant to differential cryptanalysis. Specifically, the criterion evaluates whether the S-box is balanced, has high nonlinearity, and is immune to linear attacks. A balanced S-box ensures that for any input, there is an equal number of output bits with a value of 1 and 0. High nonlinearity ensures that small changes in input bits result in significant changes in output bits, making it difficult for attackers to deduce the key used in encryption. Finally, immunity to linear attacks ensures that the S-box cannot be easily broken using linear equations. To evaluate an S-box using the bit-independent criterion, a differential characteristic is chosen, and the expected value of the characteristic is computed. Next, the number of pairs of inputs that satisfy the differential characteristic is counted, and the difference between this value and the expected value is measured. If this difference is close to zero, the S-box is said to satisfy the bit-independent criterion [26]. The average value of BIC is 12. The BIC analysis with the pair of proposed S-boxes A and B are given in Tables 10 and 11. The BIC of the proposed S-boxes generated by QI is up to the standard in the sense of encryption strength.

    Table 10.  BIC of S-box A.
    0.0 0.484375 0.5 0.49609375 0.521484375 0.501953125 0.5 0.490234375
    0.484375 0.0 0.51953125 0.48828125 0.51953125 0.505859375 0.509765625 0.4921875
    0.5 0.51953125 0.0 0.501953125 0.521484375 0.50390625 0.533203125 0.494140625
    0.49609375 0.48828125 0.501953125 0.0 0.494140625 0.505859375 0.50390625 0.494140625
    0.521484375 0.51953125 0.521484375 0.494140625 0.0 0.53125 0.513671875 0.50390625
    0.501953125 0.505859375 0.50390625 0.505859375 0.53125 0.0 0.51953125 0.5
    0.5 0.509765625 0.533203125 0.50390625 0.513671875 0.51953125 0.0 0.501953125
    0.490234375 0.4921875 0.494140625 0.494140625 0.50390625 0.5 0.501953125 0.0

     | Show Table
    DownLoad: CSV
    Table 11.  BIC of S-box B.
    0.0 0.484375 0.5 0.49609375 0.521484375 0.501953125 0.5 0.490234375
    0.484375 0.0 0.51953125 0.48828125 0.51953125 0.505859375 0.509765625 0.4921875
    0.5 0.51953125 0.0 0.501953125 0.521484375 0.50390625 0.533203125 0.494140625
    0.49609375 0.48828125 0.501953125 0.0 0.494140625 0.505859375 0.50390625 0.494140625
    0.521484375 0.51953125 0.521484375 0.494140625 0.0 0.53125 0.513671875 0.50390625
    0.501953125 0.505859375 0.50390625 0.505859375 0.53125 0.0 0.51953125 0.5
    0.5 0.509765625 0.533203125 0.50390625 0.513671875 0.51953125 0.0 0.501953125
    0.490234375 0.4921875 0.494140625 0.494140625 0.50390625 0.5 0.501953125 0.0

     | Show Table
    DownLoad: CSV

    The proposed S-boxes (A, B) have been evaluated using the bit-independent criterion (BIC), which measures the S-box's resistance to differential cryptanalysis. The BIC values of the S-boxes have been calculated as follows: the maximum BIC value for both S-boxes A and B is 0.6094, while the minimum BIC value for both is 0.375. The average BIC value for both S-boxes A and B is 0.5054.

    Linear approximation probability (LAP) is a measure used in cryptanalysis to evaluate the security of substitution boxes, or S-boxes, used in block ciphers. The measure evaluates the probability of a linear approximation of an S-box being satisfied, where the linear approximation is a linear equation that approximates the behavior of the S-box. Linear approximation probability is based on the idea that a good S-box should not be easily modeled using linear equations. If an S-box can be modeled using a linear equation, it is vulnerable to linear attacks, where an attacker can use the linear equation to recover the key used in encryption. To evaluate the linear approximation probability of an S-box, a linear approximation is chosen, and the expected value of the linear approximation is computed. Next, the number of pairs of inputs that satisfy the linear approximation is counted, and the difference between this value and the expected value is measured. If this difference is close to zero, the S-box is said to have a low linear approximation probability and is considered to be resistant to linear attacks. The linear approximation probability of an S-box is closely related to its nonlinearity, which is another measure used to evaluate the security of S-boxes. A high nonlinearity implies a low linear approximation probability, and vice versa. However, nonlinearity measures the S-box's resistance to all types of attacks, while linear approximation probability focuses specifically on linear attacks [26]. The maximum values of LAP of proposed S-boxes are given in Table 12, which are not so bad against linear attacks.

    Table 12.  LAP of S-boxes over QI.
    Primes Proposed S-boxes LAP values
    3917 A 0.1328125
    B 0.1328125

     | Show Table
    DownLoad: CSV

    The proposed S-boxes have been evaluated using differential approximation probability (DAP), which is a measure used in cryptanalysis to evaluate the security of substitution boxes (S-boxes) against differential attacks. The DAP value of an S-box measures the probability of a differential approximation of the S-box being satisfied. In the case of the proposed S-boxes, the DAP values were computed by selecting a differential approximation and counting the number of input-output pairs that satisfy the differential approximation. This count was then divided by the total number of possible input-output pairs, giving the DAP value. The DAP values of the proposed S-boxes were compared with those of existing S-boxes from the literature. The results showed that the proposed S-boxes have a lower DAP value than some existing S-boxes, indicating that they are more resistant to differential attacks. The DAP results of proposed S-boxes A and B are given in Tables 13 and 14.

    Table 13.  DAP of S-box A.
    0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.039 0.023 0.023 0.031 0.031 0.031 0.016 0.031 0.023
    0.023 0.023 0.023 0.031 0.031 0.023 0.023 0.023 0.031 0.023 0.039 0.023 0.023 0.023 0.023 0.023
    0.023 0.023 0.031 0.031 0.023 0.023 0.016 0.023 0.023 0.031 0.031 0.031 0.031 0.031 0.031 0.023
    0.023 0.016 0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.031 0.023 0.023 0.039 0.023 0.023 0.023
    0.023 0.023 0.031 0.023 0.031 0.016 0.023 0.023 0.023 0.031 0.031 0.031 0.023 0.023 0.023 0.031
    0.023 0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.039 0.023 0.023 0.023 0.031 0.023 0.023
    0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.031 0.023 0.023 0.039 0.031 0.039 0.023 0.023
    0.023 0.031 0.023 0.031 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.031 0.023 0.031 0.023 0.023
    0.023 0.023 0.023 0.023 0.031 0.023 0.031 0.023 0.023 0.023 0.039 0.023 0.031 0.031 0.023 0.031
    0.023 0.016 0.023 0.023 0.023 0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.016 0.023 0.023
    0.023 0.023 0.023 0.031 0.023 0.023 0.031 0.023 0.031 0.023 0.023 0.031 0.023 0.023 0.031 0.023
    0.023 0.039 0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.023 0.023 0.023 0.023 0.031 0.023
    0.023 0.031 0.023 0.023 0.031 0.031 0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.023 0.023
    0.023 0.023 0.023 0.031 0.023 0.031 0.023 0.023 0.031 0.031 0.031 0.023 0.023 0.023 0.039 0.023
    0.023 0.023 0.031 0.031 0.023 0.023 0.031 0.031 0.031 0.023 0.023 0.023 0.023 0.023 0.023 0.023
    0.023 0.023 0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.023 0.023 0.023 0.031 0.031 0

     | Show Table
    DownLoad: CSV
    Table 14.  DAP of S-box B.
    0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.039 0.023 0.023 0.031 0.031 0.031 0.016 0.031 0.023
    0.023 0.023 0.023 0.031 0.031 0.023 0.023 0.023 0.031 0.023 0.039 0.023 0.023 0.023 0.023 0.023
    0.023 0.023 0.031 0.031 0.023 0.023 0.016 0.023 0.023 0.031 0.031 0.031 0.031 0.031 0.031 0.023
    0.023 0.016 0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.031 0.023 0.023 0.039 0.023 0.023 0.023
    0.023 0.023 0.031 0.023 0.031 0.016 0.023 0.023 0.023 0.031 0.031 0.031 0.023 0.023 0.023 0.031
    0.023 0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.039 0.023 0.023 0.023 0.031 0.023 0.023
    0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.031 0.023 0.023 0.039 0.031 0.039 0.023 0.023
    0.023 0.031 0.023 0.031 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.031 0.023 0.031 0.023 0.023
    0.023 0.023 0.023 0.023 0.031 0.023 0.031 0.023 0.023 0.023 0.039 0.023 0.031 0.031 0.023 0.031
    0.023 0.016 0.023 0.023 0.023 0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.016 0.023 0.023
    0.023 0.023 0.023 0.031 0.023 0.023 0.031 0.023 0.031 0.023 0.023 0.031 0.023 0.023 0.031 0.023
    0.023 0.039 0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.023 0.023 0.023 0.023 0.031 0.023
    0.023 0.031 0.023 0.023 0.031 0.031 0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.023 0.023
    0.023 0.023 0.023 0.031 0.023 0.031 0.023 0.023 0.031 0.031 0.031 0.023 0.023 0.023 0.039 0.023
    0.023 0.023 0.031 0.031 0.023 0.023 0.031 0.031 0.031 0.023 0.023 0.023 0.023 0.023 0.023 0.023
    0.023 0.023 0.023 0.023 0.023 0.023 0.023 0.031 0.023 0.023 0.023 0.023 0.023 0.031 0.031 0

     | Show Table
    DownLoad: CSV

    The maximum DAP values of the proposed S-boxes A and B are 0.039. The comparison of the DAP values of the proposed S-boxes with the S-boxes on different structures from the literature is presented in the comparison section.

    The strict avalanche criterion (SAC) is an important concept in the field of cryptography and information theory. It is a mathematical property that measures the sensitivity of a cryptographic function to small changes in the input. In other words, it determines how much the output of the function changes when a single bit of the input is flipped. The SAC is a fundamental requirement for the security of cryptographic algorithms. A function that satisfies the SAC is said to be an "avalanche effect" because the output of the function changes drastically (like an avalanche) when the input is changed even slightly. This means that an attacker cannot predict the output of the function even if they know a small part of the input. The SAC is typically measured using a metric called the "avalanche distance, " which is the proportion of output bits that change when a single input bit is flipped. A function that satisfies the SAC should have an avalanche distance of at least 50% (i.e., half of the output bits should change when a single input bit is flipped). This ensures that the function is highly sensitive to input changes and provides a high level of security. There are several techniques for evaluating the SAC of a cryptographic function, including statistical testing and algebraic analysis. These techniques are used to ensure that the function meets the strict avalanche criterion and is secure against attacks. The SAC results of the proposed S-boxes A and B are given in Tables 15 and 16. We have come to a close that the value of the proposed S-boxes is approximately equal to 12. So, we conclude that we can make use of proposed S-boxes in block cipher for secure communication.

    Table 15.  SAC of S-box A.
    0.53125 0.46875 0.4375 0.4375 0.484375 0.59375 0.484375 0.5625
    0.53125 0.515625 0.4375 0.5 0.5 0.515625 0.4375 0.5
    0.515625 0.515625 0.453125 0.484375 0.53125 0.546875 0.5 0.46875
    0.5 0.515625 0.5 0.53125 0.546875 0.46875 0.515625 0.46875
    0.5 0.5 0.484375 0.546875 0.59375 0.453125 0.5 0.453125
    0.484375 0.484375 0.5625 0.484375 0.515625 0.578125 0.46875 0.53125
    0.40625 0.546875 0.421875 0.53125 0.53125 0.484375 0.5625 0.515625
    0.453125 0.546875 0.5625 0.46875 0.546875 0.484375 0.5625 0.484375

     | Show Table
    DownLoad: CSV
    Table 16.  SAC of S-box B.
    0.53125 0.46875 0.4375 0.4375 0.484375 0.59375 0.484375 0.5625
    0.53125 0.515625 0.4375 0.5 0.5 0.515625 0.4375 0.5
    0.515625 0.515625 0.453125 0.484375 0.53125 0.546875 0.5 0.46875
    0.5 0.515625 0.5 0.53125 0.546875 0.46875 0.515625 0.46875
    0.5 0.5 0.484375 0.546875 0.59375 0.453125 0.5 0.453125
    0.484375 0.484375 0.5625 0.484375 0.515625 0.578125 0.46875 0.53125
    0.40625 0.546875 0.421875 0.53125 0.53125 0.484375 0.5625 0.515625
    0.453125 0.546875 0.5625 0.46875 0.546875 0.484375 0.5625 0.484375

     | Show Table
    DownLoad: CSV

    The proposed S-boxes A and B have maximum Strict Avalanche Criterion (SAC) values of 0.594 each, and minimum SAC values of 0.406 each. On average, the SAC values of S-boxes A and B are 0.504 each. These results indicate that the proposed S-boxes are very close to achieving the optimal possible SAC value. Therefore, we can conclude that the SAC of the proposed S-boxes meets the required criteria.

    The former tests are performed on well-known S-boxes over EC, chaotic maps, etc presented in [18,19,20,21,22,23,24] in order to compare them with the proposed S-boxes A and B over QI. Table 17 shows the results of the EC, CM, and QI analyses for the various parameters. It is discovered that the proposed S-boxes have a higher nonlinearity value than EC, CM, and other S-boxes. The intriguing features of the proposed technique provide S-boxes pair at a time by fixing three parameters a,b, and p. However, the other structures have one S-box at a time by fixing three parameters a,b, and p. Table 17 and Figure 1 show the nonlinearity of the proposed S-box. The proposed S-box LAP results are lower than those presented in [18,19,20,21,22,23,24] and Figure 2. As a result, the proposed S-boxes generate more data confusion and are more resistant to linear attack than [18,19,20,21,22,23,24]. The proposed S-boxes' SAC and BIC results are comparable to those of other S-boxes used in Table 17 and Figure 2. As a result, the S-box generated by the proposed technique and the S-boxes shown in Table 17 cause equal magnitude diffusion in the data. The proposed DAP is comparable to the DAP of S-boxes in [18,19,20,21,22,23,24] and Figure 2. Thus, when compared to the others, the proposed technique generates an S-box with high resistance to differential cryptanalysis.

    Table 17.  Proposed S-boxes comparison with existing techniques S-boxes.
    Sboxes Type NL LAP DAP SAC
    Max
    SAC
    Ave
    SAC
    Min
    BIC
    Max
    BIC
    Ave
    BIC
    Min
    A (Proposed) QI 107.0 0.133 0.039 0.594 0.504 0.406 0.609 0.505 0.375
    B (Proposed) QI 107.0 0.133 0.039 0.594 0.504 0.406 0.609 0.505 0.375
    [18] EC 104.00 0.148 0.047 0.610 0.516 0.422 0.543 0.503 0.463
    [19] CM 104.00 0.148 0.039 0.625 0.508 0.391 0.531 0.501 0.471
    [20] EC 104.00 0.145 0.039 0.610 0.5 0.390 0.531 0.501 0.471
    [21] CM 106.00 0.148 0.039 0.641 0.5235 0.406 0.537 0.504 0.471
    [22] CM 106.00 0.148 0.047 0.625 0.5155 0.406 0.539 0.505 0.471
    [23] CM 106.00 0.188 0.039 0.610 0.508 0.406 0.527 0.496 0.465
    [24] CM 106.00 0.148 0.023 0.609 0.5 0.391 0.525 0.499 0.473

     | Show Table
    DownLoad: CSV
    Figure 1.  Comparison of NL of proposed work with existing techniques works.
    Figure 2.  Comparison of BIC, SAC, and LAP of proposed work with existing techniques works.

    The proposed design methodology for the nonlinear substitution function of a block cipher based on quaternion integers has shown promising results in terms of enhancing the security of cryptographic applications. The use of quaternions in the design allows for more complex arithmetic operations, improving the cipher's confusion and diffusion properties. The implementation of the proposed design in a block cipher and extensive security analysis confirms its superiority over existing designs.

    Future research directions could involve investigating the impact of varying parameters of the proposed design, such as the number of rounds and key size, on the cipher's security. Additionally, exploring the potential of combining the proposed design with other cryptographic techniques, such as key exchange or digital signatures, could lead to the development of more secure and versatile cryptographic systems.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    Researchers supporting project number (RSP 2023R472), King Saud University, Riyadh, Saudi Arabia.

    The authors declared that they had no conflict of interest.



    [1] Hou H, Zhang L, Bi H, et al. (2022) Differential characteristics and driving forces of the spatial distribution of heritage trees in Luoyang, an ancient capital of China. Front Environ Sci 10: 993333. https://doi.org/10.3389/fenvs.2022.993333 doi: 10.3389/fenvs.2022.993333
    [2] Nolan V, Reader T, Gilbert F, et al. (2020) The ancient tree inventory: A summary of the results of a 15 years citizen science project recording ancient, veteran and notable trees across the UK. Biodivers Conserv 29: 3103–3129. https://doi.org/10.1007/s10531-020-02033-2 doi: 10.1007/s10531-020-02033-2
    [3] Abbate R, Menconi ME, Grohmann D (2023) Local Community's Perception of Agrobiodiversity as Cultural Heritage and the Role of Ceratonia Siliqua L.. In: Ferro V, Giordano G, Orlando S, et al. (eds), Characterizing the Rural Landscape Identity of Modica and Rosolini (Sicily-Italy). AⅡA 2022: Biosystems Engineering Towards the Green Deal, Lecture Notes in Civil Engineering 337, 1019–1027. https://doi.org/10.1007/978-3-031-30329-6_105
    [4] Schicchi R, Speciale C, Amato F, et al. (2021) The Monumental Olive Trees as Biocultural Heritage of Mediterranean Landscapes: The Case Study of Sicily. Sustainability 13: 6767. https://doi.org/10.3390/su13126767 doi: 10.3390/su13126767
    [5] Wolf KL, Lam ST, McKeen JK, et al. (2020) Urban trees and human health: a scoping review. Int J Environ Res Public Health 17:4371. https://doi.org/10.3390/ijerph17124371 doi: 10.3390/ijerph17124371
    [6] Yin RK (2017) Case study research and applications: Design and methods. London: SAGE Publications.
    [7] Wu Z, Hou S (2015) Heritage and Discourse. In: Waterton E, Watson S (eds), The Palgrave Handbook of Contemporary Heritage Research, New York: Palgrave Macmillan, 37–51.
    [8] Butler B (2006) Heritage and the Present Past. In: Tilley C, Keane W, Keuchler S, Rowlands M, Spyer P (eds.), Handbook of Material Culture, London: Sage Publications, 463–479. https://doi.org/10.4135/9781848607972
    [9] DeSilvey C, Harrison R (2020) Anticipating loss: rethinking endangerment in heritage futures. Int J Heritage Stud 26: 1–7. https://doi.org/10.1080/13527258.2019.1644530 doi: 10.1080/13527258.2019.1644530
    [10] Harrison R (2015) Beyond 'natural' and 'cultural' heritage: toward an ontological politics of heritage in the age of Anthropocene. Heritage Soc 8: 24–42. https://doi.org/10.1179/2159032X15Z.00000000036 doi: 10.1179/2159032X15Z.00000000036
    [11] Albert M, Bernecker R, Rudolff B (2013) Understanding Heritage. Perspectives in Heritage Studies, de Gruyter GmbH, Berlin. https://doi.org/10.1515/9783110308389
    [12] Fowler PJ (2003) World Heritage Cultural Landscapes 1992–2002, Paris: UNESCO World Heritage Centre.
    [13] Townsend JB, Barton S (2018) The impact of ancient tree form on modern landscape preferences. Urban For Urban Green 34: 205–216. https://doi.org/10.1016/j.ufug.2018.06.004 doi: 10.1016/j.ufug.2018.06.004
    [14] Käyhkö N, Granö O, Häyrynen M (2004) Finnish landscape studies – a mixture of traditions and recent trends in the analysis of nature-human interactions. Belgeo 2–3. https://doi.org/10.4000/belgeo.13676
    [15] Messina G, Terranova G (2024) Starting from the landscape to read conflicts. AIMS Geosci 10: 43–46. https://doi.org/10.3934/geosci.2024003 doi: 10.3934/geosci.2024003
    [16] Waterton E, Watson S (eds) The Palgrave Handbook of Contemporary Heritage Research, New York: Palgrave Macmillan.
    [17] Erikstad L, Uttakleiv LA, Halvorsen R (2015) Characterisation and mapping of landscape types, a case study from Norway. Belgeo 3. https://doi.org/10.4000/belgeo.17412
    [18] Swanwick C (2002) Landscape Character Assessment, Guidance for England and Scotland, Cheltenham (Gloucestershire). The Countryside Agency, Scottish Natural Heritage.
    [19] Paniagua A (2021) Countryside, landscape and heritage in (new) historical Geography: Some considerations in the current geographical tendencies. AIMS Geosci 7: 291–299. https://doi.org/10.3934/geosci.2021017 doi: 10.3934/geosci.2021017
    [20] Scazzosi L (2018) Rural Landscape as Heritage: Reasons for and Implications of Principles Concerning Rural Landscapes as Heritage ICOMOS-IFLA 2017. Built Heritage 2: 39–52, https://doi.org/10.1186/BF03545709 doi: 10.1186/BF03545709
    [21] Ivona A, Privitera D (2022) The rediscovery of characteristic rural landscapes. An opportunity to create new activities? Belgeo 4. https://doi.org/10.4000/belgeo.57360
    [22] Harwood C, Ruuska AK (2013) The Personhood of Trees: Living Artifacts in the Upper Peninsula of Michigan. Time Mind 6: 133–156. https://doi.org/10.2752/175169713X13589680081812 doi: 10.2752/175169713X13589680081812
    [23] Stoffle R, Naranjo A, Sittler C, et al. (2018) 'Grandfather Tree': Ute Horror at the Killing of a Heritage Tree. Int J Intangible Heritage 13: 35–49.
    [24] Phillips C, Atchison J (2018) Seeing the trees for the (urban) forest: more-than-human geographies and urban greening. Aust Geogr 51: 155–168. https://doi.org/10.1080/00049182.2018.1505285 doi: 10.1080/00049182.2018.1505285
    [25] Phillips C, Straughan E, Atchison J (2024) Gratitude for and to nature: insights from emails to urban trees. Soc Cultural Geogr 25: 363–384. https://doi.org/10.1080/14649365.2023.2177715 doi: 10.1080/14649365.2023.2177715
    [26] Smith J (2013) Cultural Landscape Theory and Practice. Moving from Observation to Experience. In: Albert M, Bernecker R, Rudolff B (eds), Understanding Heritage. Perspectives in Heritage Studies, Berlin: de Gruyter GmbH, 49–68.
    [27] Schmitz MF, Jáuregui CH (2021) Cultural Landscape Preservation and Social–Ecological Sustainability. Sustainability 13: 2593. https://doi.org/10.3390/su13052593 doi: 10.3390/su13052593
    [28] Carpiano RM (2009) Come take a walk with me: The "Go-Along" interview as a novel method for studying the implications of place for health and well-being. Health Place 15: 263–272. https://doi.org/10.1016/j.healthplace.2008.05.003 doi: 10.1016/j.healthplace.2008.05.003
    [29] Garner A (2004) Living history: Trees and metaphors of identity in an English forest. J Mater Culture 9: 87–100. https://doi.org/10.1177/1359183504041091 doi: 10.1177/1359183504041091
    [30] Jones O, Cloke P (2020) Tree-places. In: Cloke P, Jones O (eds), Tree cultures: the place of trees and trees in their place, London: Routledge. https://doi.org/10.4324/9781003103226
    [31] Edensor T (2023) Heritage assemblages, maintenance and futures: Stories of entanglement on Hampstead Heath, London. J Hist Geogr 79: 1–12. https://doi.org/10.1016/j.jhg.2022.12.001 doi: 10.1016/j.jhg.2022.12.001
    [32] Geraldes A (2024) Food and celebrations: The fanid as a food heritage. In: Bonacho R, Eidler M, Massari S, et al. (eds.), Experiencing and Envisioning Food: Designing for Change, 148–152. https://doi.org/10.1201/9781003386858-21
    [33] Wearing S, Wearing M, Mcdonald M. (2012) Slow'n down the town to let nature grow: ecotourism, social justice and sustainability. In: Ful-Lagar S, Markwell K, Wilson E, (eds.), Slow Tourism. Channel View Publications. Bristol: Blue Ridge Summit, 36–51.
    [34] Sorbello M (2023) Un ecomuseo per gli alberi monumentali dell'Etna. In: Cannizzaro S, Corinto G, Ecomusei in Sicilia, Esperienze, proposte, progetti, Firenze: Angelo Pontecorboli Editore.
    [35] Farina A, Canini L (2023) Alberi Monumentali d'Italia. 100 esempi di monumentalità ai sensi della legge 14 gennaio 2013, n. 10. Roma: Masaf, Ministero delle politiche agricole alimentari, forestali e del turismo. Available from: https://www.politicheagricole.it/Agg_Alberi_monumentali.
    [36] Sornsena S, Apirating P, Suksamran S (2021) The Beliefs and Aesthetics of Isaan Heritage Trees, Acad J Interdiscip Stud 10: 158–167. https://doi.org/10.36941/ajis-2021-0072
    [37] Chaaban J, Makhzoumi J, Zurayk R, et al. (2008) Carob Agro-forestry for Sustainable Livelihoods and Conservation in Rural Arid Lebanon, Libano: ILS LEDA.
    [38] Bartolozzi G (2022) Il carrubo, una risorsa per gli agroecosistemi mediterranei. Available from: www.georgofili.info.
    [39] Tzatzani T, Ouzounidou G (2023) Carob as an Agrifood Chain Product of Cultural, Agricultural and Economic Importance in the Mediterranean Region. J Innovation Econ Manage 42: 127–147. https://doi.org/10.3917/jie.pr1.0140 doi: 10.3917/jie.pr1.0140
    [40] Battle I, Tous J (1997) Promoting the conservation and use of underutilized and neglected crops: Carob tree, Rome: Ed. IPGRI and IPK.
    [41] Hehn V (1892) Piante coltivate ed animali domestici, Firenze: Ed. Le Monnier.
    [42] Licitra GC (1996) The carob market in Sicily. Production, prices and market structure. In: Proceedings of the Ⅲ International Carob Symposium, Portugal: Cabanas-Tavira.
    [43] Kumazawa S, Taniguchi M, Suzuki Y, et al. (2002) Antioxidant activity of polyphenols in carob pods. J Agric Food Chem 50: 373–377.
    [44] Louca A, Papas A (1973) The effect of different proportions of carob pod meal in the diet on the performance of calves and goats. Anim Sci 17: 139–146. https://doi.org/10.1017/S0003356100016871 doi: 10.1017/S0003356100016871
    [45] Sahle M, Coleou J, Haas C (1992) Carob pod (Ceratonia siliqua) meal in geese diets. Br Poult Sci 33: 531–541. https://doi.org/10.1080/00071669208417492 doi: 10.1080/00071669208417492
    [46] Attardo A, Baratto G, Monreale F (2003) La via del carrubo: passato, presente e futuro di una pianta del Mediterraneo, Siracusa: Ente Fauna Siciliana.
    [47] Castro F (1952) Il carrubo, Ragusa: Ed. Associazione Carrubicoltori Siciliani.
    [48] Balsamo P (1851) Agricoltura teorico-pratica, Palermo: Ed. Biondo.
    [49] Craig WJ, Nguyen TT (1984) Caffeine and Theobromine Levels in Cocoa and Carob Products. J Food Sc 49: 302–303. https://doi.org/10.1111/j.1365-2621.1984.tb13737.x doi: 10.1111/j.1365-2621.1984.tb13737.x
    [50] Macho-Gonzáleza A, Garcimartínb A, López-Olivac ME, et al. (2020) Carob-fruit-extract-enriched meat modulates lipoprotein metabolism and T insulin signaling in diabetic rats induced by high-saturated-fat diet. J Funct Foods 64: 103600, https://doi.org/10.1016/j.jff.2019.103600 doi: 10.1016/j.jff.2019.103600
    [51] Lanfranchi M, Zirilli A, Alfano S, et al. (2019) The Carob as a Substitute for Cocoa in the Production of Chocolate: Sensory Analysis with Bivariate Association, Calitatea 20: 148–153.
    [52] Gentile A, Inglese P, Tagliavini M (2022), Arboricoltura speciale, Milano: Edagricole.
    [53] Ramón-Laca L, Mabberley DJ (2004) The ecological status of the carob-tree (Ceratonia siliqua, Leguminosae) in the Mediterranean. Bot J Linn Soc 144: 431–436. https://doi.org/10.1111/j.1095-8339.2003.00254.x doi: 10.1111/j.1095-8339.2003.00254.x
    [54] Viruel J, Le Galliot N, Pironon S, et al. (2020) A strong east-west Mediterranean divergence supports a new phylogeographic history of the carob tree (Ceratonia siliqua, Leguminosae) and multiple domestications from native populations. J Biogeogr 47: 460–471. https://doi.org/10.1111/jbi.13726 doi: 10.1111/jbi.13726
    [55] Guarino R, Pasta S, Bazan G, et al. (2021) Relevant habitats neglected by the Directive 92/43 EEC: the contribution of Vegetation Science for their reappraisal in Sicily. Plant Sociol 58: 49–63. https://doi.org/10.3897/pls2021582/05 doi: 10.3897/pls2021582/05
    [56] D'Amato A (2018) L'uomo e l'albero di carrubo. Un esempio di convivenza transculturale. Dialoghi Mediterranei 33, Istituto Euro-Arabo. https://www.printfriendly.com/p/g/JgUksm
    [57] Blangiforti C, D'Amato A, La Malfa S (2022) Il carrubo è l'uomo. Memoria, storia e storie attorno a un albero emblematico, Ragusa: Abulafia.
    [58] Petino G, Wilson J, Torre S (2022) La fascia trasformata siciliana: il territorio tra crisi socioecologica e vulnerabilità, In: Amato F, Amato V, de Falco S, et al. (a cura di), Catene/Chains, Società di Studi Geografici. Memorie geografiche NS 21: 489–494.
    [59] Evans J, Jones P (2011) The walking interview: Methodology, mobility and place. Appl Geogr 31: 849–858.
    [60] Amit V, Salazar NB (2020) Why and how does the pacing of mobilities matter? In: Amit V, Salazar NB (eds), Pacing mobilities: timing, intensity, tempo and duration of human movements, New York: Berghahn Books, 1–17.
    [61] Gasparini P, Di Cosmo L, Floris A, De Laurentis D (2022) Italian National Forest Inventory-Methods and Results of the Third Survey, Cham: Springer. https://doi.org/10.1007/978-3-030-98678-0
    [62] La Malfa S, Brugaletta M (2023) Il Carrubo. Caratteristiche, coltivazione e utilizzi, Milano: Edagricole.
    [63] Durazzo A, Turfani V, Narducci V, et al. (2014) Nutritional characterisation and bioactive components of commercial carobs flours. Food Chem 153: 109–113. https://doi.org/10.1016/j.foodchem.2013.12.045 doi: 10.1016/j.foodchem.2013.12.045
    [64] Brand E (1984) Carob. Nutr Food Sci 91: 22–24. https://doi.org/10.1108/eb059043 doi: 10.1108/eb059043
    [65] Nyerges C (1978) The chocolate that is good for you. Organic Gard ening 12: 122–126.
    [66] Yousilf AK, Alghzawi HM (2000). Processing and characterization of carob powder. Food Chem 69: 283–287. https://doi.org/10.1016/S0308-8146(99)00265-4. doi: 10.1016/S0308-8146(99)00265-4
    [67] Basharat Z, Afzaal M, Saeed F, et al. (2023) Nutritional and functional profile of carob bean (Ceratonia siliqua): a comprehensive review. Int J Food Prop 26: 389–413. https://doi.org/10.1080/10942912.2022.2164590 doi: 10.1080/10942912.2022.2164590
    [68] Vodenska M (2020) Factors for (Un) Sustainable Tourism Development. Cent Eur J Geogr Sustainable Dev 2: 16–29. https://doi.org/10.47246/CEJGSD.2020.2.1.2 doi: 10.47246/CEJGSD.2020.2.1.2
    [69] Hou S (2019) Remembering trees as heritage: Guji discourse and the meaning-making of trees in Hangzhou, Qing China. Int J Heritage Stud 25: 455–468 https://doi.org/10.1080/13527258.2018.1509229 doi: 10.1080/13527258.2018.1509229
    [70] Petino G, Privitera D (2023) Uncovering the local foodscapes. Exploring the Etna volcano case study, Italy. AIMS Geosci 9: 392–408. https://doi.org/10.3934/geosci.2023021
    [71] Caravello E (2023) Preserving cultural landscapes in the face of globalization. The musealization of Sicilian heritage. AIMS Geosci 9: 697–712. https://doi.org/10.3934/geosci.2023037
    [72] Mousavi S, Pandolfi S, Lo Conte A, et al. (2024) The ancient olive trees of Capri Island renaissance of an abandoned treasure. Sci Hortic 328: 112930. https://doi.org/10.1016/j.scienta.2024.112930 doi: 10.1016/j.scienta.2024.112930
  • This article has been cited by:

    1. Muhammad Sajjad, Tariq Shah, Qin Xin, Bander Almutairi, Eisenstein field BCH codes construction and decoding, 2023, 8, 2473-6988, 29453, 10.3934/math.20231508
    2. Muhammad Sajjad, Tariq Shah, Tanveer ul Haq, Bander Almutairi, Qin Xin, SPN based RGB image encryption over Gaussian integers, 2024, 10, 24058440, e30353, 10.1016/j.heliyon.2024.e30353
    3. Ala’a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi, Symmetry Analysis in Construction Two Dynamic Lightweight S-Boxes Based on the 2D Tinkerbell Map and the 2D Duffing Map, 2024, 16, 2073-8994, 872, 10.3390/sym16070872
    4. Muhammad Sajjad, Tariq Shah, Rafik Hamza, Bander Almutairi, Robinson Julian Serna, Multiple color images security by SPN over the residue classes of Gaussian integer Z[i]h
    , 2025, 15, 2045-2322, 10.1038/s41598-025-89993-z
    5. Shabieh Farwa, Farwa Noor, Bushra Nawaz, An Improved Algebraic Structure of Nonlinear Dynamical Systems, 2024, 19, 1793-0480, 329, 10.1142/S1793048024400010
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1342) PDF downloads(73) Cited by(1)

Figures and Tables

Figures(7)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog