CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management
Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and distribution of the right product(s) to the end user at the right time with more economical way. In this regard, information or data security is a must in s...
Saved in:
| Published in: | Multimedia tools and applications Vol. 84; no. 13; pp. 12371 - 12394 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
Springer US
01.04.2025
Springer Nature B.V |
| Subjects: | |
| ISSN: | 1573-7721, 1380-7501, 1573-7721 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and distribution of the right product(s) to the end user at the right time with more economical way. In this regard, information or data security is a must in supply chain management between participants to increase efficiency and effectiveness. For the purpose of data security in SCM environment, a novel Chaos based Tiny Encryption Algorithm named as CTEA is designed with the help of Elliptic Curve Diffie–Hellman (ECDH) and a Tinkerbell chaotic map in this work. Firstly, shared secret key is generated and exchanged through ECDH key exchange protocol using brainpoolP256r1 curve. Then, the shared secret key is XORed with the key number which is generated from the points of the Tinkerbell chaotic map to obtain the final secret key. Then the secret key is fed into Tiny Encryption Algorithm (TEA) to produce an encrypted text and this encrypted text is also decoded in the decryption phase with the same key. A novel framework for data security in SCM is proposed using CTEA where the data will be encrypted in the local machines before uploading to the cloud server. Users like analysts, managers and data scientists, who request the data, only be able to decrypt it. So, our encryption method can be used to secure data that will be helpful for accurate data analysis and prediction in SCM to improve the business strategies. Again, for the performance measurement of this work, the different security parameters like histogram, information entropy, PSNR, and avalanche effect have been examined. By experiment, it is found that the key space is about 10
105
≈ 2
348.80245
, avalanche effect on the taken text files more than 50%, entropy value of the encrypted files is 7.99499, PSNR value is 6.8073 which indicates very low corresponding to the taken data files and also encryption & decryption time of the proposed technique is very less compared to other related works. Thereby, our work is more secure and robust against security attacks compared to other existing works. Further, the proposed work can also be applied in resource constrained applications of SCM with IoT network in which faster computation with minimal resource requirement is required. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 1573-7721 1380-7501 1573-7721 |
| DOI: | 10.1007/s11042-024-19443-x |