Title: A novel keyless cryptosystem based on Latin square and cognitive artificial intelligence for blockchain and covert communications

Authors: Abdelrahman Desoky; Hany Ammar; Gamal Fahmy; Shaker El-Sappagh; Abdeltawab Hendawi; Sameh Hassanien Basha

Addresses: Scired: Scientific Research and Development Corporation, South Carolina, USA; Department of Computer Science, Claflin University, USA ' Faculty of Computer Science and Engineering, Galala University, Egypt ' Faculty of Computer Science and Engineering, Galala University, Egypt ' Faculty of Computer Science and Engineering, Galala University, Egypt ' Computer Science Department, University of Rhode Island, USA ' Faculty of Science, Cairo University, Giza, Egypt; Faculty of Science, Galala University, Suez, Egypt

Abstract: The recent advances in cryptanalysis techniques and the leakage of information about the cryptosystem used are major threats to information systems. An adversary may succeed in decrypting ciphertexts, while users of a particular cryptosystem unknowingly continue using the compromised cryptosystem. Therefore, this paper presents a novel cryptosystem based on Latin square and cognitive AI/ML for blockchain and covert communications. This cryptosystem is capable of operating in quadruple modes keyless, symmetric, asymmetric, and hybrid encryption to cipher in cipher, and hence we call it CipherInCipher. Unlike all contemporary techniques including obscurity, CipherInCipher is a public-based approach that does not depend on the secrecy of any of its related components. It attains a high level of security that protects private information not only by having strong ciphertext but also by preventing an adversary from obtaining the actual ciphertext. The presented validation study demonstrates the robust CipherInCipher capabilities of achieving the cryptographic goal.

Keywords: cryptography; cryptosystem; cipher; ciphertext; security; secure communications; covert communications; blockchain.

DOI: 10.1504/IJACT.2024.138437

International Journal of Applied Cryptography, 2024 Vol.4 No.3/4, pp.219 - 237

Received: 21 Aug 2023
Accepted: 30 Dec 2023

Published online: 03 May 2024 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article