Abstract
Many encryption algorithms are designed to decrease the probability of cyberattacks by assuring data security as well as system and participant authentication. However, in the development of computer resources cryptanalytical techniques have been developed and performed competitively in information security with good results. In this paper, we reported security flaws in the recently offered encryption technique based on a chaotic map for Internet of Health Things (IoHT) security. The scheme was based on a new chaotic map, modified Mandelbrot set, and conditional shift algorithm asserting the encryption algorithm is secure. We have performed some cryptographic attacks to retrieve the key from the understudy cryptosystem. The key was retrieved in little computation by using a chosen-plaintext attack and one known plaintext ciphertext pair. The minimum execution time of performed attacks indicates the vulnerability of the diffusion-based encryption algorithm. To enhance the security of the understudy cryptographic algorithm, we have also suggested certain improvements.
| Original language | English |
|---|---|
| Article number | 9492118 |
| Pages (from-to) | 105678-105685 |
| Number of pages | 8 |
| Journal | IEEE Access |
| Volume | 9 |
| DOIs | |
| State | Published - 2021 |
| Externally published | Yes |
Keywords
- Chaotic map
- chosen-plaintext attack
- conditional shift
- cryptanalysis
- Internet of Health Things
- known-plaintext attack
Fingerprint
Dive into the research topics of 'Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver