CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management

Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and distribution of the right product(s) to the end user at the right time with more economical way. In this regard, information or data security is a must in s...

Full description

Saved in:
Bibliographic Details
Published in:Multimedia tools and applications Vol. 84; no. 13; pp. 12371 - 12394
Main Authors: Kumbhakar, Dulal, Adhikari, Subhajit, Karforma, Sunil
Format: Journal Article
Language:English
Published: New York Springer US 01.04.2025
Springer Nature B.V
Subjects:
ISSN:1573-7721, 1380-7501, 1573-7721
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and distribution of the right product(s) to the end user at the right time with more economical way. In this regard, information or data security is a must in supply chain management between participants to increase efficiency and effectiveness. For the purpose of data security in SCM environment, a novel Chaos based Tiny Encryption Algorithm named as CTEA is designed with the help of Elliptic Curve Diffie–Hellman (ECDH) and a Tinkerbell chaotic map in this work. Firstly, shared secret key is generated and exchanged through ECDH key exchange protocol using brainpoolP256r1 curve. Then, the shared secret key is XORed with the key number which is generated from the points of the Tinkerbell chaotic map to obtain the final secret key. Then the secret key is fed into Tiny Encryption Algorithm (TEA) to produce an encrypted text and this encrypted text is also decoded in the decryption phase with the same key. A novel framework for data security in SCM is proposed using CTEA where the data will be encrypted in the local machines before uploading to the cloud server. Users like analysts, managers and data scientists, who request the data, only be able to decrypt it. So, our encryption method can be used to secure data that will be helpful for accurate data analysis and prediction in SCM to improve the business strategies. Again, for the performance measurement of this work, the different security parameters like histogram, information entropy, PSNR, and avalanche effect have been examined. By experiment, it is found that the key space is about 10 105  ≈ 2 348.80245 , avalanche effect on the taken text files more than 50%, entropy value of the encrypted files is 7.99499, PSNR value is 6.8073 which indicates very low corresponding to the taken data files and also encryption & decryption time of the proposed technique is very less compared to other related works. Thereby, our work is more secure and robust against security attacks compared to other existing works. Further, the proposed work can also be applied in resource constrained applications of SCM with IoT network in which faster computation with minimal resource requirement is required.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1573-7721
1380-7501
1573-7721
DOI:10.1007/s11042-024-19443-x