Title: A novel keyless cryptosystem based on Latin square and cognitive artificial intelligence for blockchain and covert communications
Authors: Abdelrahman Desoky; Hany Ammar; Gamal Fahmy; Shaker El-Sappagh; Abdeltawab Hendawi; Sameh Hassanien Basha
Addresses: Scired: Scientific Research and Development Corporation, South Carolina, USA; Department of Computer Science, Claflin University, USA ' Faculty of Computer Science and Engineering, Galala University, Egypt ' Faculty of Computer Science and Engineering, Galala University, Egypt ' Faculty of Computer Science and Engineering, Galala University, Egypt ' Computer Science Department, University of Rhode Island, USA ' Faculty of Science, Cairo University, Giza, Egypt; Faculty of Science, Galala University, Suez, Egypt
Abstract: The recent advances in cryptanalysis techniques and the leakage of information about the cryptosystem used are major threats to information systems. An adversary may succeed in decrypting ciphertexts, while users of a particular cryptosystem unknowingly continue using the compromised cryptosystem. Therefore, this paper presents a novel cryptosystem based on Latin square and cognitive AI/ML for blockchain and covert communications. This cryptosystem is capable of operating in quadruple modes keyless, symmetric, asymmetric, and hybrid encryption to cipher in cipher, and hence we call it CipherInCipher. Unlike all contemporary techniques including obscurity, CipherInCipher is a public-based approach that does not depend on the secrecy of any of its related components. It attains a high level of security that protects private information not only by having strong ciphertext but also by preventing an adversary from obtaining the actual ciphertext. The presented validation study demonstrates the robust CipherInCipher capabilities of achieving the cryptographic goal.
Keywords: cryptography; cryptosystem; cipher; ciphertext; security; secure communications; covert communications; blockchain.
DOI: 10.1504/IJACT.2024.138437
International Journal of Applied Cryptography, 2024 Vol.4 No.3/4, pp.219 - 237
Received: 21 Aug 2023
Accepted: 30 Dec 2023
Published online: 03 May 2024 *