Redirigiendo al acceso original de articulo en 19 segundos...
Inicio  /  Information  /  Vol: 12 Par: 3 (2021)  /  Artículo
ARTÍCULO
TITULO

A Robust and Hybrid Cryptosystem for Identity Authentication

Ali Takieldeen    
Said H. Abd Elkhalik    
Ahmed S. Samra    
Mohamed A. Mohamed and Fahmi Khalifa    

Resumen

With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending on internet protocol (IP) networks, especially after the COVID-19 pandemic. The huge application domain?s infrastructure, which depends on IoT, requires a trusted connection to guarantee security and privacy while transferring data. This paper proposes a hybrid identity authentication pipeline that integrates three schemes, namely, an elliptic curve cryptography (ECC) scheme is integrated with the Ong, Schnorr, and Shamir (OSS) signature scheme and chaotic maps. The latter satisfies both security and guarantee criteria. The novelty of the proposal is in using chaotic mapping and a cyclic group to deduce a substitution box (S-Box) and a reversible matrix as a portion of the OSS signature equation. The ECC-based security part is an efficient public key cryptography mechanism with less computational cost, which makes it the most convenient to be used in IoT devices for authentication and privacy. The strength of the proposed scheme relies on combining the discrete logarithm problem (DLP) and integer factorization problem (IFP). The proposed approach was simulated using Lab-View and compared with other state-of-the art schemes. Extensive simulation results and analysis of the security and time rendering results confirmed its durability against different types of attacks, such as linear and differential attacks.

 Artículos similares

       
 
Abdullahi T. Sulaiman, Habeeb Bello-Salau, Adeiza J. Onumanyi, Muhammed B. Mu?azu, Emmanuel A. Adedokun, Ahmed T. Salawudeen and Abdulfatai D. Adekale    
The particle swarm optimization (PSO) algorithm is widely used for optimization purposes across various domains, such as in precision agriculture, vehicular ad hoc networks, path planning, and for the assessment of mathematical test functions towards ben... ver más
Revista: Algorithms

 
Yu Wang, Yujie Wang, Yaxin Li and Cheng Ren    
This paper proposes a hybrid propulsion-based small underwater robot for robust trajectory tracking control in a harsh and complex underwater environment. The robot is equipped with a Coanda-effect jet thruster and a pair of propeller-based reconfigurabl... ver más

 
Tzu-Ching Tai, Chen-Cheng Lee and Cheng-Chien Kuo    
This paper proposes a new hybrid algorithm for grey wolf optimization (GWO) integrated with a robust learning mechanism to solve the large-scale economic load dispatch (ELD) problem. The robust learning grey wolf optimization (RLGWO) algorithm imitates t... ver más
Revista: Applied Sciences

 
Soojeong Lee, Gyanendra Prasad Joshi, Anish Prasad Shrestha, Chang-Hwan Son and Gangseong Lee    
Cuffless blood pressure (BP) monitoring is crucial for patients with cardiovascular disease and hypertension. However, conventional BP monitors provide only single-point estimates without confidence intervals. Therefore, the statistical variability in th... ver más
Revista: Applied Sciences

 
Ahmed A. Abdullah, B. M. El-den, Khaled M. Abo-Al-Ez and Tarek M. Hassan    
Advanced Metering Infrastructure (AMI) plays a crucial role in enabling the efficient functioning of Smart Electrical Grids, but its successful implementation hinges on robust cybersecurity measures. To uphold data confidentiality and integrity, the depl... ver más
Revista: Applied Sciences