This study introduces a novel lightweight encryption scheme for platforms with limited resources utilizing chaotic systems. We employ a dual logistic map, utilizing the first map to determine cyclic rotation step coun...
详细信息
This study introduces a novel lightweight encryption scheme for platforms with limited resources utilizing chaotic systems. We employ a dual logistic map, utilizing the first map to determine cyclic rotation step counts for rows and columns in the confusion phase, and the second map for the XoR operation in the diffusion phase. Input parameters of the first logistic map are derived from only the secret key while the input parameters of the second logistic map are derived from the secret key and hash value of plaintext together. Since we use the hash value of the plaintext to determine the input parameter of the second logistic map, our schema is highly resistant to differential attacks. On average, it produces over %99.57 NPCR value and about %33.45 UACI value in case of one-pixel change in the plaintext. It also produces an information entropy value of over 7.9971 on average. Since we use a double logistic map, our scheme is resistant to brute force attacks via about 196 bits of key length. Firstly, we calculate the hash value of the plaintext which will be used to determine the input parameter of the second logistic map. Then we employ cyclic rotation operation for all rows and all columns utilizing the key stream generated by the first logistic map at the permutation stage. Subsequently, we performed the XoR operation to the output, utilizing the key stream of the second logistic map which is initialized with the hash value and secret key. Since we need the hash value of the plaintext in the decryption process, we need to save it in the ciphertext. So, we add a new row at the bottom of the ciphertext to make room for the hash value. We save and distribute it into the matrix by swapping operations and obtaining final ciphertext. To decrypt the ciphertext, we follow these steps in reverse order. First, we extract the hash value of the original plaintext from the ciphertext. Then, we apply XOR and cyclic rotation operations. Our test and analysis results demonstrate
This paper is devoted to the study of methods for improving the capabilities of measuring large data arrays through the use of optically-controlled transparent and Blockchain technology. The research results are prese...
详细信息
ISBN:
(纸本)9781510630666
This paper is devoted to the study of methods for improving the capabilities of measuring large data arrays through the use of optically-controlled transparent and Blockchain technology. The research results are presented with the help of the developed method, which made it possible to evaluate the effectiveness of the proposed improvements ie the speed of data processing large sizes. In this paper, the main areas of application of the blockchain technology, its main properties are analyzed. During the work, the prospects for the development of this topic were determined, the main principle of the work of blockchain technologies and optically-controlled transparent. It has been determined that one of the main functions of the blockchain is its parallel processing and data analysis. With the help of the technology of the blockchain and with the help of optically controlled banners, a matrix filled with certain information was processed, we transformed each data cell with the hash-function into a hash-code. Also, the processing time and the hash function were investigated.
暂无评论