Negi Deepak, Kumar Rajiv, Kumar Vijay, Dhaka Arvind
Faculty of Technology and Computer Applications (FTCA), Amrapali University, Haldwani, India.
Computer Science and Engineering, UIT, Uttaranchal University, Dehradun, India.
Sci Rep. 2025 Jul 1;15(1):22206. doi: 10.1038/s41598-025-04700-2.
The data must be protected from cyber-attacks that benefit from the weaknesses of the databases. Our traditional techniques are unstable. They are not strong enough to withstand the sophisticated and advanced criminal methods that attackers are developing and using to access confidential information. To prevent these kinds of activities, we must use encryption techniques. The most common Brute force encryption method, which can easily break encryption that is not very strong, is one of the many encryption and decryption techniques used by cyber attackers to break unsafe techniques during data transformation over a network. This paper addresses these challenges and provides a strong and effective encryption technique. Fractals are indefinite parameters and functions that can be used to enhance encryption techniques, and one of them we used in our study was to optimize the encryption technique. In this paper, we introduced a new and reliable encryption technique that utilizes the chaotic and fractal nature of Noor iteration. Our study intends to improve real-time protection against new attack vectors. The proposed approach ensures key sensitivity by generating an initial value set throughout the Noor iteration process. Initial Key values are produced by the fractal function using the Julia set and the XOR operator. Our study shows the efficiency, reliability, and potential for secure communications. The sequence encrypts the plain text, and the entire process is evaluated using analysis that includes key space, sensitivity, differential, and statistical evaluations.
必须保护数据免受利用数据库弱点的网络攻击。我们的传统技术不稳定。它们不够强大,无法抵御攻击者正在开发和使用的复杂先进的犯罪方法,这些方法用于获取机密信息。为防止此类活动,我们必须使用加密技术。最常见的暴力加密方法可以轻松破解不太强的加密,它是网络攻击者在通过网络进行数据转换期间用于破解不安全技术的众多加密和解密技术之一。本文应对这些挑战并提供一种强大有效的加密技术。分形是可用于增强加密技术的不确定参数和函数,我们在研究中使用其中之一来优化加密技术。在本文中,我们引入了一种新的可靠加密技术,该技术利用努尔迭代的混沌和分形性质。我们的研究旨在改进针对新攻击向量的实时保护。所提出的方法通过在整个努尔迭代过程中生成初始值集来确保密钥敏感性。初始密钥值由分形函数使用朱利亚集和异或运算符生成。我们的研究展示了安全通信的效率、可靠性和潜力。该序列对明文进行加密,并使用包括密钥空间、敏感性、差分和统计评估在内的分析对整个过程进行评估。