2022
DOI: 10.3390/sym14020218
|View full text |Cite
|
Sign up to set email alerts
|

Light and Secure Encryption Technique Based on Artificially Induced Chaos and Nature-Inspired Triggering Method

Abstract: Encryption is the de facto method for protecting information, whether this information is locally stored or on transit. Although we have many encryption techniques, they have problems inherited from the computational models that they use. For instance, the standard encryption technique suffers from the substitution box syndrome—the substitution box does not provide enough confusion. This paper proffers a novel encryption method that is both highly secure and lightweight. The proposed technique performs an init… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 43 publications
0
5
0
Order By: Relevance
“… The RSU gets the true value of the vehicle verification key 𝑉 𝑖 according to (23). Therefore, it validates the correctness of the received signatures 𝑆 𝑣 and 𝐶 𝑖 by (24). Any attacker's attempt to alter the values of 𝐾 1 , AID i , 𝐸 𝑖 , and 𝑡 2 leads to a mismatch in (24).…”
Section: A Self-authentication Stagementioning
confidence: 52%
See 4 more Smart Citations
“… The RSU gets the true value of the vehicle verification key 𝑉 𝑖 according to (23). Therefore, it validates the correctness of the received signatures 𝑆 𝑣 and 𝐶 𝑖 by (24). Any attacker's attempt to alter the values of 𝐾 1 , AID i , 𝐸 𝑖 , and 𝑡 2 leads to a mismatch in (24).…”
Section: A Self-authentication Stagementioning
confidence: 52%
“…Therefore, it validates the correctness of the received signatures 𝑆 𝑣 and 𝐶 𝑖 by (24). Any attacker's attempt to alter the values of 𝐾 1 , AID i , 𝐸 𝑖 , and 𝑡 2 leads to a mismatch in (24). If the term of T 𝑔 SP 2 (𝐶 𝑖 ) mod 𝑃 is equal to the term of T 𝑔 SP 3 − 𝜓 (𝑆 𝑣 ) mod 𝑃, the RSU decrypts 𝐸 𝑖 to obtain the private service request PRq that is required by the vehicle according to (25).…”
Section: A Self-authentication Stagementioning
confidence: 60%
See 3 more Smart Citations