A Novel Diffusion-Based Cryptographic Method for Cyber Security
Main Article Content
Abstract
Data security remains a critical concern, especially for lightweight and resource-constrained environments. Traditional lightweight designs, such as those relying on linear congruential generators (LCGs) are susceptible to predictability and vulnerability to statistical attacks. This paper proposes an enhanced diffusion-based encryption framework that replaces the LCG with the ChaCha20 stream cipher for pseudorandom sequence generation and introduces a key-dependent bit-shuffling mechanism to strengthen diffusion. The methodology integrates three key stages. First, pseudorandom keystream generation is performed via ChaCha20 with a 256-bit key and a 96-bit nonce derived from the encryption key. Second, modular arithmetic-based diffusion (addition/XOR) is applied between the plaintext and the keystream. Finally, Fisher-Yates bit-level shuffling is seeded by the ChaCha20 output, ensuring robust decorrelation. Experimental evaluation demonstrates that the proposed scheme achieves near-ideal Shannon entropy (7.998–7.999 bits/byte), a negligible plaintext-ciphertext correlation (≈0.0142), and passes 100% of the NIST statistical randomness tests. The avalanche effect consistently reaches 100%, confirming high sensitivity to key and plaintext changes. Comparative analysis shows that the enhanced method provides superior security to LCG-based schemes while maintaining computational efficiency comparable to that of lightweight ciphers (AES, SIMON). The results confirm that the integration of ChaCha20 and enhanced bit-level diffusion significantly improves robustness against predictability and correlation attacks.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
[1] S. Al-Janabi and R. Saeed, "A survey of lightweight cryptographic algorithms for IoT security," Int. J. Comput. Sci. Inf. Secur., vol. 16, no. 2, pp. 45–55, 2018, doi: 10.1007/978-981-13-2414-7_27.
[2] P. Shukla, R. Singh, and A. Sharma, "Comparative analysis of AES and RSA algorithms for security enhancement in IoT," J. Cryptogr. Eng., vol. 9, no. 3, pp. 221–235, 2019, doi: 10.3390/engproc2022020014.
[3] V. Singh, R. Kumar, and M. Sharma, "A review of lightweight cryptography for IoT security," IEEE Access, vol. 8, pp. 216944–216973, 2020, doi: 10.1109/ICIRCA57980.2023.10220904.
[4] X. Lai, Y. Wang, and H. Zhao, "Noise-assisted cryptography: Enhancing security using Gaussian noise," J. Appl. Secur. Res., vol. 15, no. 4, pp. 287–302, 2020, doi: 10.1515/jisys-2024-0191.
[5] T. Wang, Q. Zhao, and J. Sun, "Efficient encryption schemes based on statistical noise models," IEEE Trans. Inf. Forensics Security, vol. 16, pp. 455–468, 2021.
[6] I. F. Jaleel, R. S. Ali, and G. A. Abed, "Improvement of Internet of Things (IoT) interference based on pre-coding techniques over 5G networks," Mesopotamian J. Cybersecurity, vol. 5, no. 1, pp. 11–22, 2025, doi: 10.58496/MJCS/2025/002.
[7] I. Boykuziev, K. Angshuman, D. Rupayan, and A. Bakhtiyor, "A novel approach to integer factorization: A paradigm in cryptography," Concurrency Comput. Pract. Exp., 2025, doi: 10.1002/cpe.8365.
[8] R. S. Ali, M. K. Ibrahim, and S. N. Alsaad, "Fast and secure image encryption system using new lightweight encryption algorithm," TEM J., vol. 13, no. 1, pp. 198–206, 2024, doi: 10.18421/TEM131-20.
[9] I. Hagui, A. Msolli, N. Ben Henda, A. Helali, A. Gassoumi, T. P. Nguyen, and F. Hassen, "A blockchain-based security system with light cryptography for user authentication security," Multimed. Tools Appl., vol. 83, no. 17, pp. 52451–52480, 2024, doi: 10.1007/s11042-023-17643-5.
[10] R. Das, A. Khan, R. Arya et al., "SSKA: Secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication," Int. J. Syst. Assur. Eng. Manag., vol. 15, pp. 2391–2400, 2024, doi: 10.1007/s13198-024-02253-7.
[11] I. Boykuziev, K. Angshuman, B. Abdurakhimov, D. RJayan, and K. Zarif, "Integral cryptanalysis: A new key determination technique for 3-phase Kuznyechik encryption," Eng. Res. Express, vol. 5, no. 3, 2023, doi: 10.1088/2631-8695/ace58f.
[12] A. D. Dwivedi and G. Srivastava, "Security analysis of lightweight IoT encryption algorithms: SIMON and SIMECK," Internet Things, vol. 21, Art. no. 100677, 2023, doi: 10.1016/j.iot.2022.100677.
[13] M. El-Hajj, H. Mousawi, and A. Fadlallah, "Analysis of lightweight cryptographic algorithms on IoT hardware platform," Future Internet, vol. 15, no. 2, Art. no. 54, 2023, doi: 10.3390/fi15020054.
[14] S. M. Ali, O. Z. Akif, R. S. Ali, and A. Farhan, "A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property," Bull. Electr. Eng. Inform., vol. 10, no. 3, 2021, doi: 10.11591/eei.v10i3.2610.
[15] A. Neupane, A. Alsadoon, P. W. C. Prasad et al., "A novel modified chaotic simplified advanced encryption system (MCS-AES): Mixed reality for a secure surgical telepresence," Multimed. Tools Appl., vol. 79, pp. 29043–29067, 2020, doi: 10.1007/s11042-020-09478-1.
[16] R. S. Ali, R. K. Hassoun, I. F. Jaleel, and N. S. Ali, "Proposal for encryption by using modified Playfair algorithm and bioinformatics techniques," in Proc. Int. Conf. Inf. Commun. Technol., 2019, pp. 120–126.
[17] A. K. Farhan, R. S. Ali, and S. M. Ali, "Secure location MAP and encryption key based on intelligence search algorithm in encryption and steganography to data protection," Int. J. Mech. Eng. Technol., vol. 10, no. 1, pp. 8–24, 2019.
[18] A. Farhan and R. S. Ali, "Hidden encrypted text based on secret map equation and bioinformatics techniques," J. Theor. Appl. Inf. Technol., vol. 97, no. 1, pp. 34–47, 2019.
[19] M. H. Devoret and R. J. Schoelkopf, "Superconducting circuits for quantum information: An outlook," Science, vol. 339, no. 6124, pp. 1169–1174, 2013, doi: 10.1126/science.1231930.
[20] R. L. Rivest, "Cryptography and machine learning," in Proc. Int. Conf. Theory Appl. Cryptol., 1991, pp. 427–439, doi: 10.1007/3-540-57332-1_36.
[21] S. K. Morteza, A. G. Amir, and Y. Mehdi, "A comprehensive survey on image encryption: Taxonomy, challenges, and future directions," Chaos Solitons Fractals, vol. 178, Art. no. 114361, 2024, doi: 10.1016/j.chaos.2023.114361.
[22] R. Beaulieu et al., "The SIMON and SPECK families of lightweight block ciphers," IACR Cryptol. ePrint Arch., vol. 2013, p. 404, 2013. [Online]. Available: http://eprint.iacr.org/2013/404
[23] G. Yang, B. Zhu, V. Suder, M. D. Aagaard, and G. Gong, "The Simeck family of lightweight block ciphers," in Proc. Cryptographic Hardware Embedded Syst. (CHES), 2015, pp. 307–329, doi: 10.1007/978-3-662-48324-4_16.
[24] K. Nazish, A. Q., M. B., A. A., and J. Q., "Privacy-preserving artificial intelligence in healthcare: Techniques and applications," Comput. Biol. Med., vol. 158, Art. no. 106848, 2023, doi: 10.1016/j.compbiomed.2023.106848.
[25] A. R. Andrew et al., "A statistical test suite for random and pseudorandom number generators for cryptographic applications," National Institute of Standards and Technology, NIST Special Publication 800-22, 2010.