Loading…

Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box

Schizophrenia is a multifaceted chronic psychiatric disorder that affects the way a human thinks, feels, and behaves. Inevitably, natural randomness exists in the psychological perception of schizophrenic patients, which is our primary source of inspiration for this research because true randomness...

Full description

Saved in:
Bibliographic Details
Published in:Computational intelligence and neuroscience 2022-06, Vol.2022, p.1-20
Main Authors: Khan, Muhammad Fahad, Saleem, Khalid, Hazzazi, Mohammad Mazyad, Alotaibi, Mohammed, Shukla, Piyush Kumar, Aqeel, Muhammad, Tuncer, Seda Arslan
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023
cites cdi_FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023
container_end_page 20
container_issue
container_start_page 1
container_title Computational intelligence and neuroscience
container_volume 2022
creator Khan, Muhammad Fahad
Saleem, Khalid
Hazzazi, Mohammad Mazyad
Alotaibi, Mohammed
Shukla, Piyush Kumar
Aqeel, Muhammad
Tuncer, Seda Arslan
description Schizophrenia is a multifaceted chronic psychiatric disorder that affects the way a human thinks, feels, and behaves. Inevitably, natural randomness exists in the psychological perception of schizophrenic patients, which is our primary source of inspiration for this research because true randomness is the indubitably ultimate valuable resource for symmetric cryptography. Famous information theorist Claude Shannon gave two desirable properties that a strong encryption algorithm should have, which are confusion and diffusion in his fundamental article on the theoretical foundations of cryptography. Block encryption strength against various cryptanalysis attacks is purely dependent on its confusion property, which is gained through the confusion component. In the literature, chaos and algebraic techniques are extensively used to design the confusion component. Chaos- and algebraic-based techniques provide favorable features for the design of the confusion component; however, researchers have also identified potential attacks on these techniques. Instead of existing schemes, we introduce a novel methodology to construct cryptographic confusion component from the natural randomness, which are existing in the psychological perception of the schizophrenic patients, and as a result, cryptanalysis of chaos and algebraic techniques are not applicable on our proposed technique. The psychological perception of the brain regions was captured through the electroencephalogram (EEG) readings during the sensory task. The proposed design passed all the standard evaluation criteria and validation tests of the confusion component and the random number generators. One million true random bits are assessed through the NIST statistical test suite, and the results proved that the psychological perception of schizophrenic patients is a good source of true randomness. Furthermore, the proposed confusion component attains better or equal cryptographic strength as compared to state-of-the-art techniques (2020 to 2021). To the best of our knowledge, this nature of research is performed for the first time, in which psychiatric disorder is utilized for the design of information security primitive. This research opens up new avenues in cryptographic primitive design through the fusion of computing, neuroscience, and mathematics.
doi_str_mv 10.1155/2022/2532497
format article
fullrecord <record><control><sourceid>gale_pubme</sourceid><recordid>TN_cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_9239775</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A709009571</galeid><sourcerecordid>A709009571</sourcerecordid><originalsourceid>FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023</originalsourceid><addsrcrecordid>eNp9kkFu1DAUhiMEoqWw4wCW2CDBUMeO44RFpekwnVaqANGythzHmbgkfsF2KMOq1-AE3KsnqcOMimCBvbD1-3v__yy9JHme4jdpytghwYQcEkZJVvIHyX6aF3zGCKcP7-8520ueeH-FMeMMk8fJHmWcZ3HtJ79Ox15a9NFvVAsdrI2SHXpnPLhaOxTgWrrao4XbDAHWTg7t5i26dKNGn6StoUfvx76K4Epb7WQAhxoX1eVyhaBBF6o1P2BonbZGeRQr0FnwaD4MXcwJBiwyFh13oL6gpVVTSNRub356dDFWPpgw_oaO4fvT5FEjO6-f7c6D5PPJ8nJxOjv_sDpbzM9nKmM0zGiOM17oDJcVLbMix0SqUtKa1EqxWuW6qDhJMaEVTZssr2mRcklJmee8IVXUD5Kjre8wVr2ulbbByU4MzvTSbQRII_5-saYVa_gmSkJLzlk0eLkzcPB11D6I3nilu05aDaMXJC9idyzuiL74B72C0dn4vYmiBWZZWfyh1rLTwtgGYq6aTMWc4xJHM55G6vWWUg68d7q5bznFYpoTMc2J2M1JxF9t8dbYWl6b_9N3tza9vw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2683805498</pqid></control><display><type>article</type><title>Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box</title><source>Publicly Available Content Database</source><source>Wiley Open Access</source><creator>Khan, Muhammad Fahad ; Saleem, Khalid ; Hazzazi, Mohammad Mazyad ; Alotaibi, Mohammed ; Shukla, Piyush Kumar ; Aqeel, Muhammad ; Tuncer, Seda Arslan</creator><contributor>Bhardwaj, Arpit ; Arpit Bhardwaj</contributor><creatorcontrib>Khan, Muhammad Fahad ; Saleem, Khalid ; Hazzazi, Mohammad Mazyad ; Alotaibi, Mohammed ; Shukla, Piyush Kumar ; Aqeel, Muhammad ; Tuncer, Seda Arslan ; Bhardwaj, Arpit ; Arpit Bhardwaj</creatorcontrib><description>Schizophrenia is a multifaceted chronic psychiatric disorder that affects the way a human thinks, feels, and behaves. Inevitably, natural randomness exists in the psychological perception of schizophrenic patients, which is our primary source of inspiration for this research because true randomness is the indubitably ultimate valuable resource for symmetric cryptography. Famous information theorist Claude Shannon gave two desirable properties that a strong encryption algorithm should have, which are confusion and diffusion in his fundamental article on the theoretical foundations of cryptography. Block encryption strength against various cryptanalysis attacks is purely dependent on its confusion property, which is gained through the confusion component. In the literature, chaos and algebraic techniques are extensively used to design the confusion component. Chaos- and algebraic-based techniques provide favorable features for the design of the confusion component; however, researchers have also identified potential attacks on these techniques. Instead of existing schemes, we introduce a novel methodology to construct cryptographic confusion component from the natural randomness, which are existing in the psychological perception of the schizophrenic patients, and as a result, cryptanalysis of chaos and algebraic techniques are not applicable on our proposed technique. The psychological perception of the brain regions was captured through the electroencephalogram (EEG) readings during the sensory task. The proposed design passed all the standard evaluation criteria and validation tests of the confusion component and the random number generators. One million true random bits are assessed through the NIST statistical test suite, and the results proved that the psychological perception of schizophrenic patients is a good source of true randomness. Furthermore, the proposed confusion component attains better or equal cryptographic strength as compared to state-of-the-art techniques (2020 to 2021). To the best of our knowledge, this nature of research is performed for the first time, in which psychiatric disorder is utilized for the design of information security primitive. This research opens up new avenues in cryptographic primitive design through the fusion of computing, neuroscience, and mathematics.</description><identifier>ISSN: 1687-5265</identifier><identifier>EISSN: 1687-5273</identifier><identifier>DOI: 10.1155/2022/2532497</identifier><identifier>PMID: 35774444</identifier><language>eng</language><publisher>New York: Hindawi</publisher><subject>Algebra ; Algorithms ; Brain research ; Confusion ; Cryptography ; Data encryption ; Design standards ; Diffusion barriers ; EEG ; Electrodes ; Electroencephalography ; Hallucinations ; Mental disorders ; Nervous system ; Neurosciences ; Patients ; Perception ; Random numbers ; Randomness ; Reading ; Schizophrenia ; Social research ; Statistical tests</subject><ispartof>Computational intelligence and neuroscience, 2022-06, Vol.2022, p.1-20</ispartof><rights>Copyright © 2022 Muhammad Fahad Khan et al.</rights><rights>COPYRIGHT 2022 John Wiley &amp; Sons, Inc.</rights><rights>Copyright © 2022 Muhammad Fahad Khan et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><rights>Copyright © 2022 Muhammad Fahad Khan et al. 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023</citedby><cites>FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023</cites><orcidid>0000-0001-5651-4746 ; 0000-0002-5203-0522 ; 0000-0001-6472-8306 ; 0000-0002-7945-9994</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2683805498/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2683805498?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,776,780,881,25732,27903,27904,36991,36992,44569,74873</link.rule.ids></links><search><contributor>Bhardwaj, Arpit</contributor><contributor>Arpit Bhardwaj</contributor><creatorcontrib>Khan, Muhammad Fahad</creatorcontrib><creatorcontrib>Saleem, Khalid</creatorcontrib><creatorcontrib>Hazzazi, Mohammad Mazyad</creatorcontrib><creatorcontrib>Alotaibi, Mohammed</creatorcontrib><creatorcontrib>Shukla, Piyush Kumar</creatorcontrib><creatorcontrib>Aqeel, Muhammad</creatorcontrib><creatorcontrib>Tuncer, Seda Arslan</creatorcontrib><title>Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box</title><title>Computational intelligence and neuroscience</title><description>Schizophrenia is a multifaceted chronic psychiatric disorder that affects the way a human thinks, feels, and behaves. Inevitably, natural randomness exists in the psychological perception of schizophrenic patients, which is our primary source of inspiration for this research because true randomness is the indubitably ultimate valuable resource for symmetric cryptography. Famous information theorist Claude Shannon gave two desirable properties that a strong encryption algorithm should have, which are confusion and diffusion in his fundamental article on the theoretical foundations of cryptography. Block encryption strength against various cryptanalysis attacks is purely dependent on its confusion property, which is gained through the confusion component. In the literature, chaos and algebraic techniques are extensively used to design the confusion component. Chaos- and algebraic-based techniques provide favorable features for the design of the confusion component; however, researchers have also identified potential attacks on these techniques. Instead of existing schemes, we introduce a novel methodology to construct cryptographic confusion component from the natural randomness, which are existing in the psychological perception of the schizophrenic patients, and as a result, cryptanalysis of chaos and algebraic techniques are not applicable on our proposed technique. The psychological perception of the brain regions was captured through the electroencephalogram (EEG) readings during the sensory task. The proposed design passed all the standard evaluation criteria and validation tests of the confusion component and the random number generators. One million true random bits are assessed through the NIST statistical test suite, and the results proved that the psychological perception of schizophrenic patients is a good source of true randomness. Furthermore, the proposed confusion component attains better or equal cryptographic strength as compared to state-of-the-art techniques (2020 to 2021). To the best of our knowledge, this nature of research is performed for the first time, in which psychiatric disorder is utilized for the design of information security primitive. This research opens up new avenues in cryptographic primitive design through the fusion of computing, neuroscience, and mathematics.</description><subject>Algebra</subject><subject>Algorithms</subject><subject>Brain research</subject><subject>Confusion</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Design standards</subject><subject>Diffusion barriers</subject><subject>EEG</subject><subject>Electrodes</subject><subject>Electroencephalography</subject><subject>Hallucinations</subject><subject>Mental disorders</subject><subject>Nervous system</subject><subject>Neurosciences</subject><subject>Patients</subject><subject>Perception</subject><subject>Random numbers</subject><subject>Randomness</subject><subject>Reading</subject><subject>Schizophrenia</subject><subject>Social research</subject><subject>Statistical tests</subject><issn>1687-5265</issn><issn>1687-5273</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp9kkFu1DAUhiMEoqWw4wCW2CDBUMeO44RFpekwnVaqANGythzHmbgkfsF2KMOq1-AE3KsnqcOMimCBvbD1-3v__yy9JHme4jdpytghwYQcEkZJVvIHyX6aF3zGCKcP7-8520ueeH-FMeMMk8fJHmWcZ3HtJ79Ox15a9NFvVAsdrI2SHXpnPLhaOxTgWrrao4XbDAHWTg7t5i26dKNGn6StoUfvx76K4Epb7WQAhxoX1eVyhaBBF6o1P2BonbZGeRQr0FnwaD4MXcwJBiwyFh13oL6gpVVTSNRub356dDFWPpgw_oaO4fvT5FEjO6-f7c6D5PPJ8nJxOjv_sDpbzM9nKmM0zGiOM17oDJcVLbMix0SqUtKa1EqxWuW6qDhJMaEVTZssr2mRcklJmee8IVXUD5Kjre8wVr2ulbbByU4MzvTSbQRII_5-saYVa_gmSkJLzlk0eLkzcPB11D6I3nilu05aDaMXJC9idyzuiL74B72C0dn4vYmiBWZZWfyh1rLTwtgGYq6aTMWc4xJHM55G6vWWUg68d7q5bznFYpoTMc2J2M1JxF9t8dbYWl6b_9N3tza9vw</recordid><startdate>20220621</startdate><enddate>20220621</enddate><creator>Khan, Muhammad Fahad</creator><creator>Saleem, Khalid</creator><creator>Hazzazi, Mohammad Mazyad</creator><creator>Alotaibi, Mohammed</creator><creator>Shukla, Piyush Kumar</creator><creator>Aqeel, Muhammad</creator><creator>Tuncer, Seda Arslan</creator><general>Hindawi</general><general>John Wiley &amp; Sons, Inc</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7QF</scope><scope>7QQ</scope><scope>7SC</scope><scope>7SE</scope><scope>7SP</scope><scope>7SR</scope><scope>7TA</scope><scope>7TB</scope><scope>7TK</scope><scope>7U5</scope><scope>7X7</scope><scope>7XB</scope><scope>8AL</scope><scope>8BQ</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>F28</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H8D</scope><scope>H8G</scope><scope>HCIFZ</scope><scope>JG9</scope><scope>JQ2</scope><scope>K7-</scope><scope>K9.</scope><scope>KR7</scope><scope>L6V</scope><scope>L7M</scope><scope>LK8</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M0S</scope><scope>M1P</scope><scope>M7P</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PSYQQ</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>7X8</scope><scope>5PM</scope><orcidid>https://orcid.org/0000-0001-5651-4746</orcidid><orcidid>https://orcid.org/0000-0002-5203-0522</orcidid><orcidid>https://orcid.org/0000-0001-6472-8306</orcidid><orcidid>https://orcid.org/0000-0002-7945-9994</orcidid></search><sort><creationdate>20220621</creationdate><title>Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box</title><author>Khan, Muhammad Fahad ; Saleem, Khalid ; Hazzazi, Mohammad Mazyad ; Alotaibi, Mohammed ; Shukla, Piyush Kumar ; Aqeel, Muhammad ; Tuncer, Seda Arslan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algebra</topic><topic>Algorithms</topic><topic>Brain research</topic><topic>Confusion</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Design standards</topic><topic>Diffusion barriers</topic><topic>EEG</topic><topic>Electrodes</topic><topic>Electroencephalography</topic><topic>Hallucinations</topic><topic>Mental disorders</topic><topic>Nervous system</topic><topic>Neurosciences</topic><topic>Patients</topic><topic>Perception</topic><topic>Random numbers</topic><topic>Randomness</topic><topic>Reading</topic><topic>Schizophrenia</topic><topic>Social research</topic><topic>Statistical tests</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khan, Muhammad Fahad</creatorcontrib><creatorcontrib>Saleem, Khalid</creatorcontrib><creatorcontrib>Hazzazi, Mohammad Mazyad</creatorcontrib><creatorcontrib>Alotaibi, Mohammed</creatorcontrib><creatorcontrib>Shukla, Piyush Kumar</creatorcontrib><creatorcontrib>Aqeel, Muhammad</creatorcontrib><creatorcontrib>Tuncer, Seda Arslan</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Aluminium Industry Abstracts</collection><collection>Ceramic Abstracts</collection><collection>Computer and Information Systems Abstracts</collection><collection>Corrosion Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Materials Business File</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Neurosciences Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East &amp; Africa Database</collection><collection>ProQuest Central Korea</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>Aerospace Database</collection><collection>Copper Technical Reference Library</collection><collection>SciTech Premium Collection</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ProQuest Biological Science Collection</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>PML(ProQuest Medical Library)</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest One Psychology</collection><collection>Engineering collection</collection><collection>ProQuest Central Basic</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><jtitle>Computational intelligence and neuroscience</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Khan, Muhammad Fahad</au><au>Saleem, Khalid</au><au>Hazzazi, Mohammad Mazyad</au><au>Alotaibi, Mohammed</au><au>Shukla, Piyush Kumar</au><au>Aqeel, Muhammad</au><au>Tuncer, Seda Arslan</au><au>Bhardwaj, Arpit</au><au>Arpit Bhardwaj</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box</atitle><jtitle>Computational intelligence and neuroscience</jtitle><date>2022-06-21</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>20</epage><pages>1-20</pages><issn>1687-5265</issn><eissn>1687-5273</eissn><abstract>Schizophrenia is a multifaceted chronic psychiatric disorder that affects the way a human thinks, feels, and behaves. Inevitably, natural randomness exists in the psychological perception of schizophrenic patients, which is our primary source of inspiration for this research because true randomness is the indubitably ultimate valuable resource for symmetric cryptography. Famous information theorist Claude Shannon gave two desirable properties that a strong encryption algorithm should have, which are confusion and diffusion in his fundamental article on the theoretical foundations of cryptography. Block encryption strength against various cryptanalysis attacks is purely dependent on its confusion property, which is gained through the confusion component. In the literature, chaos and algebraic techniques are extensively used to design the confusion component. Chaos- and algebraic-based techniques provide favorable features for the design of the confusion component; however, researchers have also identified potential attacks on these techniques. Instead of existing schemes, we introduce a novel methodology to construct cryptographic confusion component from the natural randomness, which are existing in the psychological perception of the schizophrenic patients, and as a result, cryptanalysis of chaos and algebraic techniques are not applicable on our proposed technique. The psychological perception of the brain regions was captured through the electroencephalogram (EEG) readings during the sensory task. The proposed design passed all the standard evaluation criteria and validation tests of the confusion component and the random number generators. One million true random bits are assessed through the NIST statistical test suite, and the results proved that the psychological perception of schizophrenic patients is a good source of true randomness. Furthermore, the proposed confusion component attains better or equal cryptographic strength as compared to state-of-the-art techniques (2020 to 2021). To the best of our knowledge, this nature of research is performed for the first time, in which psychiatric disorder is utilized for the design of information security primitive. This research opens up new avenues in cryptographic primitive design through the fusion of computing, neuroscience, and mathematics.</abstract><cop>New York</cop><pub>Hindawi</pub><pmid>35774444</pmid><doi>10.1155/2022/2532497</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0001-5651-4746</orcidid><orcidid>https://orcid.org/0000-0002-5203-0522</orcidid><orcidid>https://orcid.org/0000-0001-6472-8306</orcidid><orcidid>https://orcid.org/0000-0002-7945-9994</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1687-5265
ispartof Computational intelligence and neuroscience, 2022-06, Vol.2022, p.1-20
issn 1687-5265
1687-5273
language eng
recordid cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_9239775
source Publicly Available Content Database; Wiley Open Access
subjects Algebra
Algorithms
Brain research
Confusion
Cryptography
Data encryption
Design standards
Diffusion barriers
EEG
Electrodes
Electroencephalography
Hallucinations
Mental disorders
Nervous system
Neurosciences
Patients
Perception
Random numbers
Randomness
Reading
Schizophrenia
Social research
Statistical tests
title Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T12%3A32%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_pubme&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Human%20Psychological%20Disorder%20towards%20Cryptography:%20True%20Random%20Number%20Generator%20from%20EEG%20of%20Schizophrenics%20and%20Its%20Application%20in%20Block%20Encryption%E2%80%99s%20Substitution%20Box&rft.jtitle=Computational%20intelligence%20and%20neuroscience&rft.au=Khan,%20Muhammad%20Fahad&rft.date=2022-06-21&rft.volume=2022&rft.spage=1&rft.epage=20&rft.pages=1-20&rft.issn=1687-5265&rft.eissn=1687-5273&rft_id=info:doi/10.1155/2022/2532497&rft_dat=%3Cgale_pubme%3EA709009571%3C/gale_pubme%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2683805498&rft_id=info:pmid/35774444&rft_galeid=A709009571&rfr_iscdi=true