Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security
نویسندگان
چکیده
Several efforts have been seen claiming the lightweight block ciphers as a necessarily suitable substitute in securing Internet of Things. Currently, it has able to envisage pervasive frame reference almost all across privacy preserving smart and sensor-oriented appliances. Different approaches are likely be inefficient, bringing desired degree security considering easiness surely process simplicity but security. Strengthening well-known symmetric key dependent algorithm using either chaos motivated logistic map or elliptic curve shown far-reaching potential discretion secure real-time communication. The popular feature maps, such un-foreseeability randomness often expected used dynamic key-propagation sync with scheduling technique towards data integrity. As bit alternation keys, come up oversize deviation, also would consequence leverage confidentiality. Henceforth may proximity time consumption, which lead challenge make sure instant exchange between participating node entities. In consideration delay latency required both encryption decryption, proposed approach suggests modification on key-origination matrix along S-box. It plausibly taken us this point that proportionate plain-text sent while disproportionate probability happening letter message made. line effort so far sought how apparent escalates key-initiation before transmission.
منابع مشابه
Route to Chaos in Generalized Logistic Map
We postulate a generalization of well-known logistic map to open the possibility of optimization the modelling process of the population evolution. For proposed generalized equation we illustrate the character of the transition from regularity to chaos for the whole spectrum of model parameters. As an example we consider specific cases for both periodic and chaotic regime. We focus on the chara...
متن کاملUniversality In Chaos - The Logistic Map
In this seminar, we are going to look at the period-doubling approach to chaos. It is indeed a remarkable fact that all systems which make a transition from order to disorder by the period-doubling route, irrespective of the exact functional forms that represent these systems, display common properties. It turns out that given certain qualitative constraints on the system considered, thus allow...
متن کاملComputational information for the logistic map at the chaos threshold
We study the logistic map f(x) = λx(1 − x) on the unit square at the chaos threshold. By using the methods of symbolic dynamics, the information content of an orbit of a dynamical system is defined as the Algorithmic Information Content (AIC) of a symbolic sequence. We give results for the behaviour of the AIC for the logistic map. Since the AIC is not a computable function we use, as approxima...
متن کاملMetadata Driven Efficient Key Generation and Distribution in Cloud Security
With rapid development of cloud computing to a greater extent IT industries outsource their sensitive data at cloud data storage location. To keep the stored data confidential against untrusted cloud service providers, a natural way is to store only encrypted data in the cloud severs and providing an efficient access control mechanism using a competent cipher key-Cmxn, which is becoming a promi...
متن کاملUnbelievable Security. Matching AES Security Using Public Key Systems
The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching public key sizes for RSA and the ElGamal family of protocols. For the latter both traditional multiplicative groups of finite fields and elliptic curve groups are considered. The practicality of the resulting systems is co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-91424-0_11