Light and Secure Encryption Technique Based on Artificially Induced Chaos and Nature-Inspired Triggering Method

被引:1
作者
Al-Muhammed, Muhammed J. [1 ]
Abu Zitar, Raed [2 ]
机构
[1] Amer Univ Madaba, Fac Informat Technol, Madaba 11622, Jordan
[2] Sorbonne Univ Abu Dhabi, Ctr Artificial Intelligence, Abu Dhabi 38044, U Arab Emirates
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 02期
关键词
chaotic key expansion; encryption technique; key expansion; key round; key-echo code generation; NEURAL-NETWORK; ALGORITHM; AES; GENERATOR; SEQUENCE; SCHEME; TEXT;
D O I
10.3390/sym14020218
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Encryption is the de facto method for protecting information, whether this information is locally stored or on transit. Although we have many encryption techniques, they have problems inherited from the computational models that they use. For instance, the standard encryption technique suffers from the substitution box syndrome-the substitution box does not provide enough confusion. This paper proffers a novel encryption method that is both highly secure and lightweight. The proposed technique performs an initial preprocessing on its input plaintext, using fuzzy substitutions and noising techniques to eliminate relationships to the input plaintext. The initially encrypted plaintext is next concealed in enormously complicated codes that are generated using a chaotic system, whose behavior is controlled by a set of operations and a nature-inspired triggering technique. The effectiveness of the security of the proposed technique is analyzed using rigorous randomness tests and entropy.
引用
收藏
页数:26
相关论文
共 51 条
[1]  
Akgül A, 2013, 2013 8TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ELECO), P320
[2]  
Al-Muhammed Muhammed Jassem, 2020, Intelligent Computing. Proceedings of the 2020 Computing Conference. Advances in Intelligent Systems and Computing (AISC 1230), P278, DOI 10.1007/978-3-030-52243-8_21
[3]  
Al-Muhammed Muhammed Jassem, 2019, Intelligent Computing. Proceedings of the 2019 Computing Conference. Advances in Intelligent Systems and Computing (AISC 998), P771, DOI 10.1007/978-3-030-22868-2_54
[4]   Efficient algorithm for big data clustering on single machine [J].
Alguliyev, Rasim M. ;
Aliguliyev, Ramiz M. ;
Sukhostat, Lyudmila, V .
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2020, 5 (01) :9-14
[5]  
[Anonymous], 2009, CHAOTIC MODELLING SI
[7]  
Cui JE, 2011, INT J INNOV COMPUT I, V7, P2291
[8]  
Daemen J., 1999, 1 CANDIDATE C AES1, P343
[9]   Perfect secrecy cryptography via mixing of chaotic waves in irreversible time-varying silicon chips [J].
Di Falco, A. ;
Mazzone, V. ;
Cruz, A. ;
Fratalocchi, A. .
NATURE COMMUNICATIONS, 2019, 10 (1)
[10]   Feature selection approach using ensemble learning for network anomaly detection [J].
Doreswamy ;
Hooshmand, Mohammad Kazim ;
Gad, Ibrahim .
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2020, 5 (04) :283-293