A Unified Framework for Cyber Oriented Digital Engineering using Integration of Explainable Chaotic Cryptology on Pervasive Systems

Qeios Pub Date : 2024-05-03 DOI:10.32388/60nk7h
D. Tiwari, Bhaskar Mondal
{"title":"A Unified Framework for Cyber Oriented Digital Engineering using Integration of Explainable Chaotic Cryptology on Pervasive Systems","authors":"D. Tiwari, Bhaskar Mondal","doi":"10.32388/60nk7h","DOIUrl":null,"url":null,"abstract":"Cyber Oriented Digital Engineering (CODE) aims to safeguard pervasive systems, cyber physical systems (CPS), internet of things (IoT) and embedded systems (ES) against advanced cyberattacks. Cyber oriented digital engineering pilots are earnestly required to secure transmission and credential exchanges during machine to machine (M2M) zero trust (ZT) communication. In order to construct the CODE pilot as a pivot of zero trust (ZT) communication, systems engineering employing chaotic cryptology primitives has been investigated. The empirical results with analysis of findings on its integration on real life platforms are presented as a pervasive framework, in this work. The focus was bestowed in developing an explainable approach, addressing both ante hoc and post hoc explanation needs. Ante hoc explanation ensures transparency in the encryption process, fostering user trust, while post hoc explanation facilitates the understanding of decryption outcomes.\n\nThe properties of explainable approaches are investigated, emphasizing the balance between security and interpretability. Chaotic systems are employed to introduce a dynamic layer of complexity, enhancing encryption robustness. \nThe article aims to contribute to the evolving field of explainable chaotic cryptology, bridging the gap between cryptographic strength and user comprehension in CODE pilot based zero trust (ZT) exchanges in multimedia content protection.\n\nThus, this research is a communication brief case containing significant early findings and groundbreaking results studied as a part of a longer, multi-year analysis. Innovative techniques and pragmatic investigations have been discussed as a part of result dissemination in the empirical findings.\n","PeriodicalId":500839,"journal":{"name":"Qeios","volume":"56 3","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Qeios","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.32388/60nk7h","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cyber Oriented Digital Engineering (CODE) aims to safeguard pervasive systems, cyber physical systems (CPS), internet of things (IoT) and embedded systems (ES) against advanced cyberattacks. Cyber oriented digital engineering pilots are earnestly required to secure transmission and credential exchanges during machine to machine (M2M) zero trust (ZT) communication. In order to construct the CODE pilot as a pivot of zero trust (ZT) communication, systems engineering employing chaotic cryptology primitives has been investigated. The empirical results with analysis of findings on its integration on real life platforms are presented as a pervasive framework, in this work. The focus was bestowed in developing an explainable approach, addressing both ante hoc and post hoc explanation needs. Ante hoc explanation ensures transparency in the encryption process, fostering user trust, while post hoc explanation facilitates the understanding of decryption outcomes. The properties of explainable approaches are investigated, emphasizing the balance between security and interpretability. Chaotic systems are employed to introduce a dynamic layer of complexity, enhancing encryption robustness.  The article aims to contribute to the evolving field of explainable chaotic cryptology, bridging the gap between cryptographic strength and user comprehension in CODE pilot based zero trust (ZT) exchanges in multimedia content protection. Thus, this research is a communication brief case containing significant early findings and groundbreaking results studied as a part of a longer, multi-year analysis. Innovative techniques and pragmatic investigations have been discussed as a part of result dissemination in the empirical findings.
利用可解释混沌密码学在普适系统上的集成,建立面向网络的数字工程统一框架
面向网络的数字工程(CODE)旨在保护普适系统、网络物理系统(CPS)、物联网(IoT)和嵌入式系统(ES)免受高级网络攻击。面向网络的数字工程试点项目亟需确保机器对机器(M2M)零信任(ZT)通信期间的传输和凭证交换安全。为了构建作为零信任(ZT)通信枢纽的 CODE 试点,研究人员对采用混沌密码学基元的系统工程进行了研究。在这项工作中,对其在现实生活平台上的集成结果进行了实证分析,并将其作为一个普遍性框架加以介绍。重点是开发一种可解释的方法,同时满足事前和事后解释的需要。事前解释可确保加密过程的透明度,促进用户信任,而事后解释则有助于理解解密结果。文章研究了可解释方法的特性,强调了安全性和可解释性之间的平衡。文章采用混沌系统引入动态复杂性层,增强了加密的鲁棒性。文章旨在为不断发展的可解释混沌密码学领域做出贡献,弥补多媒体内容保护中基于 CODE 试点的零信任(ZT)交换中密码强度与用户理解之间的差距。作为实证研究成果传播的一部分,对创新技术和务实调查进行了讨论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信