2021
DOI: 10.3991/ijim.v15i02.19961
|View full text |Cite
|
Sign up to set email alerts
|

A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System

Abstract: The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems and opportunities, thus paving the way for several exciting industries applications.  In cryptography a range of main characteristics of chaotic systems such as non-linearity, initial condition sensitivity, and mixing properties are available. These characteri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…There are two types of "f-function & g-function" in the Twofish algorithm, each having four boxes of 8x8 bits, a fixed 4x4 (Maximum distance separable) over GF (28), flips of the bits, and a (Pseudo-Hadamard Transform (PHT)) mechanism that occurs inside the algorithm, all of which is powered by a 16-round Feistel network [15]. It can be seen in Figure (1) how the Twofish technique performs to guarantee that the regular text size is 128 bits in the algorithm and split into four sections where a four-key XOR-ED technique is designated by whitening and introducing some complicated processes explained in two parts under the terms "Twofish and components" [13]. Twofish has eight sub-keys (Key0-Key7) that are repeatedly numbered and used to XOR the output and input data.…”
Section: Twofish Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…There are two types of "f-function & g-function" in the Twofish algorithm, each having four boxes of 8x8 bits, a fixed 4x4 (Maximum distance separable) over GF (28), flips of the bits, and a (Pseudo-Hadamard Transform (PHT)) mechanism that occurs inside the algorithm, all of which is powered by a 16-round Feistel network [15]. It can be seen in Figure (1) how the Twofish technique performs to guarantee that the regular text size is 128 bits in the algorithm and split into four sections where a four-key XOR-ED technique is designated by whitening and introducing some complicated processes explained in two parts under the terms "Twofish and components" [13]. Twofish has eight sub-keys (Key0-Key7) that are repeatedly numbered and used to XOR the output and input data.…”
Section: Twofish Algorithmmentioning
confidence: 99%
“…Frequently, the terms "security" and "concept" are used interchangeably. These sectors are interconnected and have the common goal of safeguarding information access, trustworthiness, and privacy [1].…”
Section: Introductionmentioning
confidence: 99%
“…The Bivariate Shrink is a new shrinking function that depends on two factors, the parent and the coefficient, for producing a good result of multi-wavelet image denoising. It is based on the Bayesian estimation to compute the dependency between the parent and coefficient [16,17]. For the following equation, z 2 refers to the parent of z 1 (z 2 is the coefficient of multi-wavelet at the same position as z 1 ), then…”
Section: Bivariate Shrinkmentioning
confidence: 99%
“…There are many proposed encryption schemes some of them have been adopted and standardized in the world; however, they are not suitable for a 3D model such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES) because the problem of 3D model encryption due to the application requirements and the data structure such as format compliance, content usability, complexity, security level and real-time performance [8], to overcome these problems, various encryption methods based on chaotic cryptography have been implemented. Chaotic systems are attracted and adopted in cryptosystems by the researcher because they have excellent properties such as sensitivity to initial condition and control parameter, ergodicity, randomness, deterministic, and periodicity [9][10][11]. In this paper, the encryption algorithm of the 3D model will be introduced based on the key generated from the chaotic map.…”
Section: Introductionmentioning
confidence: 99%