IEEE Access (Jan 2021)

Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps

  • Noor Munir,
  • Majid Khan,
  • Mohammad Mazyad Hazzazi,
  • Amer Aljaedi,
  • Abd Al Karim Haj Ismail,
  • Adel R. Alharbi,
  • Iqtadar Hussain

DOI
https://doi.org/10.1109/ACCESS.2021.3099004
Journal volume & issue
Vol. 9
pp. 105678 – 105685

Abstract

Read online

Many encryption algorithms are designed to decrease the probability of cyberattacks by assuring data security as well as system and participant authentication. However, in the development of computer resources cryptanalytical techniques have been developed and performed competitively in information security with good results. In this paper, we reported security flaws in the recently offered encryption technique based on a chaotic map for Internet of Health Things (IoHT) security. The scheme was based on a new chaotic map, modified Mandelbrot set, and conditional shift algorithm asserting the encryption algorithm is secure. We have performed some cryptographic attacks to retrieve the key from the understudy cryptosystem. The key was retrieved in little computation by using a chosen-plaintext attack and one known plaintext ciphertext pair. The minimum execution time of performed attacks indicates the vulnerability of the diffusion-based encryption algorithm. To enhance the security of the understudy cryptographic algorithm, we have also suggested certain improvements.

Keywords