Loading…
Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box
Schizophrenia is a multifaceted chronic psychiatric disorder that affects the way a human thinks, feels, and behaves. Inevitably, natural randomness exists in the psychological perception of schizophrenic patients, which is our primary source of inspiration for this research because true randomness...
Saved in:
Published in: | Computational intelligence and neuroscience 2022-06, Vol.2022, p.1-20 |
---|---|
Main Authors: | , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023 |
---|---|
cites | cdi_FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023 |
container_end_page | 20 |
container_issue | |
container_start_page | 1 |
container_title | Computational intelligence and neuroscience |
container_volume | 2022 |
creator | Khan, Muhammad Fahad Saleem, Khalid Hazzazi, Mohammad Mazyad Alotaibi, Mohammed Shukla, Piyush Kumar Aqeel, Muhammad Tuncer, Seda Arslan |
description | Schizophrenia is a multifaceted chronic psychiatric disorder that affects the way a human thinks, feels, and behaves. Inevitably, natural randomness exists in the psychological perception of schizophrenic patients, which is our primary source of inspiration for this research because true randomness is the indubitably ultimate valuable resource for symmetric cryptography. Famous information theorist Claude Shannon gave two desirable properties that a strong encryption algorithm should have, which are confusion and diffusion in his fundamental article on the theoretical foundations of cryptography. Block encryption strength against various cryptanalysis attacks is purely dependent on its confusion property, which is gained through the confusion component. In the literature, chaos and algebraic techniques are extensively used to design the confusion component. Chaos- and algebraic-based techniques provide favorable features for the design of the confusion component; however, researchers have also identified potential attacks on these techniques. Instead of existing schemes, we introduce a novel methodology to construct cryptographic confusion component from the natural randomness, which are existing in the psychological perception of the schizophrenic patients, and as a result, cryptanalysis of chaos and algebraic techniques are not applicable on our proposed technique. The psychological perception of the brain regions was captured through the electroencephalogram (EEG) readings during the sensory task. The proposed design passed all the standard evaluation criteria and validation tests of the confusion component and the random number generators. One million true random bits are assessed through the NIST statistical test suite, and the results proved that the psychological perception of schizophrenic patients is a good source of true randomness. Furthermore, the proposed confusion component attains better or equal cryptographic strength as compared to state-of-the-art techniques (2020 to 2021). To the best of our knowledge, this nature of research is performed for the first time, in which psychiatric disorder is utilized for the design of information security primitive. This research opens up new avenues in cryptographic primitive design through the fusion of computing, neuroscience, and mathematics. |
doi_str_mv | 10.1155/2022/2532497 |
format | article |
fullrecord | <record><control><sourceid>gale_pubme</sourceid><recordid>TN_cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_9239775</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A709009571</galeid><sourcerecordid>A709009571</sourcerecordid><originalsourceid>FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023</originalsourceid><addsrcrecordid>eNp9kkFu1DAUhiMEoqWw4wCW2CDBUMeO44RFpekwnVaqANGythzHmbgkfsF2KMOq1-AE3KsnqcOMimCBvbD1-3v__yy9JHme4jdpytghwYQcEkZJVvIHyX6aF3zGCKcP7-8520ueeH-FMeMMk8fJHmWcZ3HtJ79Ox15a9NFvVAsdrI2SHXpnPLhaOxTgWrrao4XbDAHWTg7t5i26dKNGn6StoUfvx76K4Epb7WQAhxoX1eVyhaBBF6o1P2BonbZGeRQr0FnwaD4MXcwJBiwyFh13oL6gpVVTSNRub356dDFWPpgw_oaO4fvT5FEjO6-f7c6D5PPJ8nJxOjv_sDpbzM9nKmM0zGiOM17oDJcVLbMix0SqUtKa1EqxWuW6qDhJMaEVTZssr2mRcklJmee8IVXUD5Kjre8wVr2ulbbByU4MzvTSbQRII_5-saYVa_gmSkJLzlk0eLkzcPB11D6I3nilu05aDaMXJC9idyzuiL74B72C0dn4vYmiBWZZWfyh1rLTwtgGYq6aTMWc4xJHM55G6vWWUg68d7q5bznFYpoTMc2J2M1JxF9t8dbYWl6b_9N3tza9vw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2683805498</pqid></control><display><type>article</type><title>Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box</title><source>Publicly Available Content Database</source><source>Wiley Open Access</source><creator>Khan, Muhammad Fahad ; Saleem, Khalid ; Hazzazi, Mohammad Mazyad ; Alotaibi, Mohammed ; Shukla, Piyush Kumar ; Aqeel, Muhammad ; Tuncer, Seda Arslan</creator><contributor>Bhardwaj, Arpit ; Arpit Bhardwaj</contributor><creatorcontrib>Khan, Muhammad Fahad ; Saleem, Khalid ; Hazzazi, Mohammad Mazyad ; Alotaibi, Mohammed ; Shukla, Piyush Kumar ; Aqeel, Muhammad ; Tuncer, Seda Arslan ; Bhardwaj, Arpit ; Arpit Bhardwaj</creatorcontrib><description>Schizophrenia is a multifaceted chronic psychiatric disorder that affects the way a human thinks, feels, and behaves. Inevitably, natural randomness exists in the psychological perception of schizophrenic patients, which is our primary source of inspiration for this research because true randomness is the indubitably ultimate valuable resource for symmetric cryptography. Famous information theorist Claude Shannon gave two desirable properties that a strong encryption algorithm should have, which are confusion and diffusion in his fundamental article on the theoretical foundations of cryptography. Block encryption strength against various cryptanalysis attacks is purely dependent on its confusion property, which is gained through the confusion component. In the literature, chaos and algebraic techniques are extensively used to design the confusion component. Chaos- and algebraic-based techniques provide favorable features for the design of the confusion component; however, researchers have also identified potential attacks on these techniques. Instead of existing schemes, we introduce a novel methodology to construct cryptographic confusion component from the natural randomness, which are existing in the psychological perception of the schizophrenic patients, and as a result, cryptanalysis of chaos and algebraic techniques are not applicable on our proposed technique. The psychological perception of the brain regions was captured through the electroencephalogram (EEG) readings during the sensory task. The proposed design passed all the standard evaluation criteria and validation tests of the confusion component and the random number generators. One million true random bits are assessed through the NIST statistical test suite, and the results proved that the psychological perception of schizophrenic patients is a good source of true randomness. Furthermore, the proposed confusion component attains better or equal cryptographic strength as compared to state-of-the-art techniques (2020 to 2021). To the best of our knowledge, this nature of research is performed for the first time, in which psychiatric disorder is utilized for the design of information security primitive. This research opens up new avenues in cryptographic primitive design through the fusion of computing, neuroscience, and mathematics.</description><identifier>ISSN: 1687-5265</identifier><identifier>EISSN: 1687-5273</identifier><identifier>DOI: 10.1155/2022/2532497</identifier><identifier>PMID: 35774444</identifier><language>eng</language><publisher>New York: Hindawi</publisher><subject>Algebra ; Algorithms ; Brain research ; Confusion ; Cryptography ; Data encryption ; Design standards ; Diffusion barriers ; EEG ; Electrodes ; Electroencephalography ; Hallucinations ; Mental disorders ; Nervous system ; Neurosciences ; Patients ; Perception ; Random numbers ; Randomness ; Reading ; Schizophrenia ; Social research ; Statistical tests</subject><ispartof>Computational intelligence and neuroscience, 2022-06, Vol.2022, p.1-20</ispartof><rights>Copyright © 2022 Muhammad Fahad Khan et al.</rights><rights>COPYRIGHT 2022 John Wiley & Sons, Inc.</rights><rights>Copyright © 2022 Muhammad Fahad Khan et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><rights>Copyright © 2022 Muhammad Fahad Khan et al. 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023</citedby><cites>FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023</cites><orcidid>0000-0001-5651-4746 ; 0000-0002-5203-0522 ; 0000-0001-6472-8306 ; 0000-0002-7945-9994</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2683805498/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2683805498?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,776,780,881,25732,27903,27904,36991,36992,44569,74873</link.rule.ids></links><search><contributor>Bhardwaj, Arpit</contributor><contributor>Arpit Bhardwaj</contributor><creatorcontrib>Khan, Muhammad Fahad</creatorcontrib><creatorcontrib>Saleem, Khalid</creatorcontrib><creatorcontrib>Hazzazi, Mohammad Mazyad</creatorcontrib><creatorcontrib>Alotaibi, Mohammed</creatorcontrib><creatorcontrib>Shukla, Piyush Kumar</creatorcontrib><creatorcontrib>Aqeel, Muhammad</creatorcontrib><creatorcontrib>Tuncer, Seda Arslan</creatorcontrib><title>Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box</title><title>Computational intelligence and neuroscience</title><description>Schizophrenia is a multifaceted chronic psychiatric disorder that affects the way a human thinks, feels, and behaves. Inevitably, natural randomness exists in the psychological perception of schizophrenic patients, which is our primary source of inspiration for this research because true randomness is the indubitably ultimate valuable resource for symmetric cryptography. Famous information theorist Claude Shannon gave two desirable properties that a strong encryption algorithm should have, which are confusion and diffusion in his fundamental article on the theoretical foundations of cryptography. Block encryption strength against various cryptanalysis attacks is purely dependent on its confusion property, which is gained through the confusion component. In the literature, chaos and algebraic techniques are extensively used to design the confusion component. Chaos- and algebraic-based techniques provide favorable features for the design of the confusion component; however, researchers have also identified potential attacks on these techniques. Instead of existing schemes, we introduce a novel methodology to construct cryptographic confusion component from the natural randomness, which are existing in the psychological perception of the schizophrenic patients, and as a result, cryptanalysis of chaos and algebraic techniques are not applicable on our proposed technique. The psychological perception of the brain regions was captured through the electroencephalogram (EEG) readings during the sensory task. The proposed design passed all the standard evaluation criteria and validation tests of the confusion component and the random number generators. One million true random bits are assessed through the NIST statistical test suite, and the results proved that the psychological perception of schizophrenic patients is a good source of true randomness. Furthermore, the proposed confusion component attains better or equal cryptographic strength as compared to state-of-the-art techniques (2020 to 2021). To the best of our knowledge, this nature of research is performed for the first time, in which psychiatric disorder is utilized for the design of information security primitive. This research opens up new avenues in cryptographic primitive design through the fusion of computing, neuroscience, and mathematics.</description><subject>Algebra</subject><subject>Algorithms</subject><subject>Brain research</subject><subject>Confusion</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Design standards</subject><subject>Diffusion barriers</subject><subject>EEG</subject><subject>Electrodes</subject><subject>Electroencephalography</subject><subject>Hallucinations</subject><subject>Mental disorders</subject><subject>Nervous system</subject><subject>Neurosciences</subject><subject>Patients</subject><subject>Perception</subject><subject>Random numbers</subject><subject>Randomness</subject><subject>Reading</subject><subject>Schizophrenia</subject><subject>Social research</subject><subject>Statistical tests</subject><issn>1687-5265</issn><issn>1687-5273</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp9kkFu1DAUhiMEoqWw4wCW2CDBUMeO44RFpekwnVaqANGythzHmbgkfsF2KMOq1-AE3KsnqcOMimCBvbD1-3v__yy9JHme4jdpytghwYQcEkZJVvIHyX6aF3zGCKcP7-8520ueeH-FMeMMk8fJHmWcZ3HtJ79Ox15a9NFvVAsdrI2SHXpnPLhaOxTgWrrao4XbDAHWTg7t5i26dKNGn6StoUfvx76K4Epb7WQAhxoX1eVyhaBBF6o1P2BonbZGeRQr0FnwaD4MXcwJBiwyFh13oL6gpVVTSNRub356dDFWPpgw_oaO4fvT5FEjO6-f7c6D5PPJ8nJxOjv_sDpbzM9nKmM0zGiOM17oDJcVLbMix0SqUtKa1EqxWuW6qDhJMaEVTZssr2mRcklJmee8IVXUD5Kjre8wVr2ulbbByU4MzvTSbQRII_5-saYVa_gmSkJLzlk0eLkzcPB11D6I3nilu05aDaMXJC9idyzuiL74B72C0dn4vYmiBWZZWfyh1rLTwtgGYq6aTMWc4xJHM55G6vWWUg68d7q5bznFYpoTMc2J2M1JxF9t8dbYWl6b_9N3tza9vw</recordid><startdate>20220621</startdate><enddate>20220621</enddate><creator>Khan, Muhammad Fahad</creator><creator>Saleem, Khalid</creator><creator>Hazzazi, Mohammad Mazyad</creator><creator>Alotaibi, Mohammed</creator><creator>Shukla, Piyush Kumar</creator><creator>Aqeel, Muhammad</creator><creator>Tuncer, Seda Arslan</creator><general>Hindawi</general><general>John Wiley & Sons, Inc</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7QF</scope><scope>7QQ</scope><scope>7SC</scope><scope>7SE</scope><scope>7SP</scope><scope>7SR</scope><scope>7TA</scope><scope>7TB</scope><scope>7TK</scope><scope>7U5</scope><scope>7X7</scope><scope>7XB</scope><scope>8AL</scope><scope>8BQ</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>F28</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H8D</scope><scope>H8G</scope><scope>HCIFZ</scope><scope>JG9</scope><scope>JQ2</scope><scope>K7-</scope><scope>K9.</scope><scope>KR7</scope><scope>L6V</scope><scope>L7M</scope><scope>LK8</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M0S</scope><scope>M1P</scope><scope>M7P</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PSYQQ</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>7X8</scope><scope>5PM</scope><orcidid>https://orcid.org/0000-0001-5651-4746</orcidid><orcidid>https://orcid.org/0000-0002-5203-0522</orcidid><orcidid>https://orcid.org/0000-0001-6472-8306</orcidid><orcidid>https://orcid.org/0000-0002-7945-9994</orcidid></search><sort><creationdate>20220621</creationdate><title>Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box</title><author>Khan, Muhammad Fahad ; Saleem, Khalid ; Hazzazi, Mohammad Mazyad ; Alotaibi, Mohammed ; Shukla, Piyush Kumar ; Aqeel, Muhammad ; Tuncer, Seda Arslan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algebra</topic><topic>Algorithms</topic><topic>Brain research</topic><topic>Confusion</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Design standards</topic><topic>Diffusion barriers</topic><topic>EEG</topic><topic>Electrodes</topic><topic>Electroencephalography</topic><topic>Hallucinations</topic><topic>Mental disorders</topic><topic>Nervous system</topic><topic>Neurosciences</topic><topic>Patients</topic><topic>Perception</topic><topic>Random numbers</topic><topic>Randomness</topic><topic>Reading</topic><topic>Schizophrenia</topic><topic>Social research</topic><topic>Statistical tests</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Khan, Muhammad Fahad</creatorcontrib><creatorcontrib>Saleem, Khalid</creatorcontrib><creatorcontrib>Hazzazi, Mohammad Mazyad</creatorcontrib><creatorcontrib>Alotaibi, Mohammed</creatorcontrib><creatorcontrib>Shukla, Piyush Kumar</creatorcontrib><creatorcontrib>Aqeel, Muhammad</creatorcontrib><creatorcontrib>Tuncer, Seda Arslan</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Aluminium Industry Abstracts</collection><collection>Ceramic Abstracts</collection><collection>Computer and Information Systems Abstracts</collection><collection>Corrosion Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Materials Business File</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Neurosciences Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East & Africa Database</collection><collection>ProQuest Central Korea</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>Aerospace Database</collection><collection>Copper Technical Reference Library</collection><collection>SciTech Premium Collection</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ProQuest Biological Science Collection</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>PML(ProQuest Medical Library)</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest One Psychology</collection><collection>Engineering collection</collection><collection>ProQuest Central Basic</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><jtitle>Computational intelligence and neuroscience</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Khan, Muhammad Fahad</au><au>Saleem, Khalid</au><au>Hazzazi, Mohammad Mazyad</au><au>Alotaibi, Mohammed</au><au>Shukla, Piyush Kumar</au><au>Aqeel, Muhammad</au><au>Tuncer, Seda Arslan</au><au>Bhardwaj, Arpit</au><au>Arpit Bhardwaj</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box</atitle><jtitle>Computational intelligence and neuroscience</jtitle><date>2022-06-21</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>20</epage><pages>1-20</pages><issn>1687-5265</issn><eissn>1687-5273</eissn><abstract>Schizophrenia is a multifaceted chronic psychiatric disorder that affects the way a human thinks, feels, and behaves. Inevitably, natural randomness exists in the psychological perception of schizophrenic patients, which is our primary source of inspiration for this research because true randomness is the indubitably ultimate valuable resource for symmetric cryptography. Famous information theorist Claude Shannon gave two desirable properties that a strong encryption algorithm should have, which are confusion and diffusion in his fundamental article on the theoretical foundations of cryptography. Block encryption strength against various cryptanalysis attacks is purely dependent on its confusion property, which is gained through the confusion component. In the literature, chaos and algebraic techniques are extensively used to design the confusion component. Chaos- and algebraic-based techniques provide favorable features for the design of the confusion component; however, researchers have also identified potential attacks on these techniques. Instead of existing schemes, we introduce a novel methodology to construct cryptographic confusion component from the natural randomness, which are existing in the psychological perception of the schizophrenic patients, and as a result, cryptanalysis of chaos and algebraic techniques are not applicable on our proposed technique. The psychological perception of the brain regions was captured through the electroencephalogram (EEG) readings during the sensory task. The proposed design passed all the standard evaluation criteria and validation tests of the confusion component and the random number generators. One million true random bits are assessed through the NIST statistical test suite, and the results proved that the psychological perception of schizophrenic patients is a good source of true randomness. Furthermore, the proposed confusion component attains better or equal cryptographic strength as compared to state-of-the-art techniques (2020 to 2021). To the best of our knowledge, this nature of research is performed for the first time, in which psychiatric disorder is utilized for the design of information security primitive. This research opens up new avenues in cryptographic primitive design through the fusion of computing, neuroscience, and mathematics.</abstract><cop>New York</cop><pub>Hindawi</pub><pmid>35774444</pmid><doi>10.1155/2022/2532497</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0001-5651-4746</orcidid><orcidid>https://orcid.org/0000-0002-5203-0522</orcidid><orcidid>https://orcid.org/0000-0001-6472-8306</orcidid><orcidid>https://orcid.org/0000-0002-7945-9994</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1687-5265 |
ispartof | Computational intelligence and neuroscience, 2022-06, Vol.2022, p.1-20 |
issn | 1687-5265 1687-5273 |
language | eng |
recordid | cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_9239775 |
source | Publicly Available Content Database; Wiley Open Access |
subjects | Algebra Algorithms Brain research Confusion Cryptography Data encryption Design standards Diffusion barriers EEG Electrodes Electroencephalography Hallucinations Mental disorders Nervous system Neurosciences Patients Perception Random numbers Randomness Reading Schizophrenia Social research Statistical tests |
title | Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T12%3A32%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_pubme&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Human%20Psychological%20Disorder%20towards%20Cryptography:%20True%20Random%20Number%20Generator%20from%20EEG%20of%20Schizophrenics%20and%20Its%20Application%20in%20Block%20Encryption%E2%80%99s%20Substitution%20Box&rft.jtitle=Computational%20intelligence%20and%20neuroscience&rft.au=Khan,%20Muhammad%20Fahad&rft.date=2022-06-21&rft.volume=2022&rft.spage=1&rft.epage=20&rft.pages=1-20&rft.issn=1687-5265&rft.eissn=1687-5273&rft_id=info:doi/10.1155/2022/2532497&rft_dat=%3Cgale_pubme%3EA709009571%3C/gale_pubme%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c453t-360478e409b3948602ac9a3d2dcc5dc6e8b721023b31f46d3817a329667f2b023%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2683805498&rft_id=info:pmid/35774444&rft_galeid=A709009571&rfr_iscdi=true |