General Chaos Implementation as a Construction Element of Primitive Cryptography

Ikhwanul Hakim Masri, B. H. Susanti
{"title":"General Chaos Implementation as a Construction Element of Primitive Cryptography","authors":"Ikhwanul Hakim Masri, B. H. Susanti","doi":"10.1109/IAICT59002.2023.10205692","DOIUrl":null,"url":null,"abstract":"In recent years, the development of Industry 4.0 has accelerated. In their implementation, various primitive cryptography methods such as block cipher, stream cipher, hash function, and pseudo-random number generator are used in this development. These primitive cryptography algorithms, for example, are used in Internet of Things technology to improve security, as well as in cloud computing technology to improve security. Furthermore, hash functions are heavily used as primitive cryptography in blockchain technology to provide the necessary security services. To provide good results in their implementation, the primitive cryptography algorithms used must have good properties. The confusion and diffusion properties of an encryption algorithm can help determine whether or not it is good. If the confusion and diffusion properties are good, the results of their implementation will be good as well. Chaos functions, which have deterministic but chaotic properties, are suitable for designing primitive cryptography algorithms with good confusion and diffusion properties. In this paper, a general implementation of chaos functions is proposed as a building block of primitive cryptography algorithms. The proposed general implementation of chaos will be evaluated based on its confusion and diffusion properties using various chaos functions to ensure that if this proposal is used in the construction of cryptographic algorithms, it will produce algorithms with good confusion and diffusion properties. The evaluation results indicate that the proposed algorithm exhibits good confusion and diffusion characteristics and has a linear time complexity.","PeriodicalId":339796,"journal":{"name":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAICT59002.2023.10205692","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In recent years, the development of Industry 4.0 has accelerated. In their implementation, various primitive cryptography methods such as block cipher, stream cipher, hash function, and pseudo-random number generator are used in this development. These primitive cryptography algorithms, for example, are used in Internet of Things technology to improve security, as well as in cloud computing technology to improve security. Furthermore, hash functions are heavily used as primitive cryptography in blockchain technology to provide the necessary security services. To provide good results in their implementation, the primitive cryptography algorithms used must have good properties. The confusion and diffusion properties of an encryption algorithm can help determine whether or not it is good. If the confusion and diffusion properties are good, the results of their implementation will be good as well. Chaos functions, which have deterministic but chaotic properties, are suitable for designing primitive cryptography algorithms with good confusion and diffusion properties. In this paper, a general implementation of chaos functions is proposed as a building block of primitive cryptography algorithms. The proposed general implementation of chaos will be evaluated based on its confusion and diffusion properties using various chaos functions to ensure that if this proposal is used in the construction of cryptographic algorithms, it will produce algorithms with good confusion and diffusion properties. The evaluation results indicate that the proposed algorithm exhibits good confusion and diffusion characteristics and has a linear time complexity.
作为原始密码学构造元素的一般混沌实现
近年来,工业4.0的发展加速。在其实现中,使用了各种原始加密方法,如分组密码、流密码、哈希函数和伪随机数生成器。例如,这些原始加密算法用于物联网技术以提高安全性,也用于云计算技术以提高安全性。此外,哈希函数在区块链技术中被大量用作原始加密,以提供必要的安全服务。为了在实现中提供良好的结果,所使用的原始加密算法必须具有良好的特性。加密算法的混淆和扩散特性可以帮助确定它是否好。如果混淆和扩散特性好,它们的实现效果也会很好。混沌函数具有确定性和混沌性,适合设计具有良好混淆和扩散特性的原始密码算法。本文提出了混沌函数的一般实现,作为原始密码算法的构建块。本文将利用各种混沌函数对所提出的混沌通用实现进行混沌混淆和扩散特性的评估,以确保如果将该方案用于密码算法的构造中,将产生具有良好混淆和扩散特性的算法。评价结果表明,该算法具有良好的混淆和扩散特性,具有线性时间复杂度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信