This research proposes the idea of double encryption, which is the combination of chaos synchronization of non-identical multi-fractional-order neural networks with multi-time-delays (FONNSMD) and symmetric encryption. Symmetric encryption is well known to be outstanding in speed and accuracy but less effective. Therefore, to increase the strength of data protection effectively, we combine both methods where the secret keys are generated from the third part of the neural network systems (NNS) and used only once to encrypt and decrypt the message. In addition, a fractional-order Lyapunov direct function (FOLDF) is designed and implemented in sliding mode control systems (SMCS) to maintain the convergence of approximated synchronization errors. Finally, three examples are carried out to confirm the theoretical analysis and find which synchronization is achieved. Then the result is combined with symmetric encryption to increase the security of secure communication, and a numerical simulation verifies the method's accuracy.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9249245 | PMC |
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0270402 | PLOS |
Sci Rep
March 2025
School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur, 613401, India.
In the age of digital communication, safeguarding the security and integrity of transmitted images is crucial, especially for online and real-time applications where data privacy is paramount. This paper addresses the problem of protecting sensitive medical images during transmission by proposing a robust, lightweight encryption scheme. The proposed method uses keys derived from the Lorentz attractor for diffusion and a 16-bit Linear Feedback Shift Register (LFSR) for pseudo-random confusion.
View Article and Find Full Text PDFNat Commun
February 2025
National Key Laboratory of Advanced Micro and Nano Manufacturing Technology, Department of Micro/Nano Electronics, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China.
Organic memories, with small dimension, fast speed and long retention features, are considered as promising candidates for massive data archiving. In order to satisfy the requirements for ultra-low power and high-security information storage, we design a conceptual molecular hard-disk (HDD) logic scheme that is capable to execute in-situ encryption of massive data in pW/bit power-consumption range. Beneficial from the coupled mechanism of counter-balanced redox reaction and local ion drifting, the basic HDD unit consisting of ~200 self-assembled RuLPH molecules in a monolayer (SAM) configuration undergoes unique conductance modulation with continuous, symmetric and low-power switching characteristics.
View Article and Find Full Text PDFSci Rep
February 2025
Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing, 100070, China.
With the rise of IoT technology, remote medical services have gained increasing attention. These services became particularly popular during the COVID-19 pandemic due to their convenience, privacy, and ability to transcend geographical boundaries. In remote medical networks, identity authentication protocols are a crucial component, playing a vital role in ensuring that healthcare providers can operate in a secure and efficient environment.
View Article and Find Full Text PDFACS Omega
February 2025
Department of Environmental Toxicology, The Institute for Forensic Science, Texas Tech University, 1207 Gilbert Drive, Lubbock, Texas 79416, United States.
Bioaffinity interactions allow antibodies and antigens to bind and were shown to successfully produce cryptographic keys for encryption in this research. This straightforward immune-system-based construct has shown that data obtained from immunoassay interactions may be utilized to create symmetrical key ciphers. The Advanced Encryption Standard (AES), the current standard method to encrypt and decrypt data, was implemented to show that biomolecules from immune systems can be applied to cryptography for security enhancements.
View Article and Find Full Text PDFSci Rep
February 2025
Czestochowa University of Technology, Czestochowa, 42-201, Poland.
The Internet of Things refers to networks of physical, technological devices connected via the Internet, allowing them to communicate and exchange data. Such environments face security issues like verifying users using Internet of Things devices, for example, in a company or hospital or properly securing user communication. Communication security largely relies on the security of symmetric keys, which we use to encrypt messages.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!