{"title":"利用可解释混沌密码学在普适系统上的集成,建立面向网络的数字工程统一框架","authors":"D. Tiwari, Bhaskar Mondal","doi":"10.32388/60nk7h","DOIUrl":null,"url":null,"abstract":"Cyber Oriented Digital Engineering (CODE) aims to safeguard pervasive systems, cyber physical systems (CPS), internet of things (IoT) and embedded systems (ES) against advanced cyberattacks. Cyber oriented digital engineering pilots are earnestly required to secure transmission and credential exchanges during machine to machine (M2M) zero trust (ZT) communication. In order to construct the CODE pilot as a pivot of zero trust (ZT) communication, systems engineering employing chaotic cryptology primitives has been investigated. The empirical results with analysis of findings on its integration on real life platforms are presented as a pervasive framework, in this work. The focus was bestowed in developing an explainable approach, addressing both ante hoc and post hoc explanation needs. Ante hoc explanation ensures transparency in the encryption process, fostering user trust, while post hoc explanation facilitates the understanding of decryption outcomes.\n\nThe properties of explainable approaches are investigated, emphasizing the balance between security and interpretability. Chaotic systems are employed to introduce a dynamic layer of complexity, enhancing encryption robustness. \nThe article aims to contribute to the evolving field of explainable chaotic cryptology, bridging the gap between cryptographic strength and user comprehension in CODE pilot based zero trust (ZT) exchanges in multimedia content protection.\n\nThus, this research is a communication brief case containing significant early findings and groundbreaking results studied as a part of a longer, multi-year analysis. Innovative techniques and pragmatic investigations have been discussed as a part of result dissemination in the empirical findings.\n","PeriodicalId":500839,"journal":{"name":"Qeios","volume":"56 3","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Unified Framework for Cyber Oriented Digital Engineering using Integration of Explainable Chaotic Cryptology on Pervasive Systems\",\"authors\":\"D. Tiwari, Bhaskar Mondal\",\"doi\":\"10.32388/60nk7h\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber Oriented Digital Engineering (CODE) aims to safeguard pervasive systems, cyber physical systems (CPS), internet of things (IoT) and embedded systems (ES) against advanced cyberattacks. Cyber oriented digital engineering pilots are earnestly required to secure transmission and credential exchanges during machine to machine (M2M) zero trust (ZT) communication. In order to construct the CODE pilot as a pivot of zero trust (ZT) communication, systems engineering employing chaotic cryptology primitives has been investigated. The empirical results with analysis of findings on its integration on real life platforms are presented as a pervasive framework, in this work. The focus was bestowed in developing an explainable approach, addressing both ante hoc and post hoc explanation needs. Ante hoc explanation ensures transparency in the encryption process, fostering user trust, while post hoc explanation facilitates the understanding of decryption outcomes.\\n\\nThe properties of explainable approaches are investigated, emphasizing the balance between security and interpretability. Chaotic systems are employed to introduce a dynamic layer of complexity, enhancing encryption robustness. \\nThe article aims to contribute to the evolving field of explainable chaotic cryptology, bridging the gap between cryptographic strength and user comprehension in CODE pilot based zero trust (ZT) exchanges in multimedia content protection.\\n\\nThus, this research is a communication brief case containing significant early findings and groundbreaking results studied as a part of a longer, multi-year analysis. Innovative techniques and pragmatic investigations have been discussed as a part of result dissemination in the empirical findings.\\n\",\"PeriodicalId\":500839,\"journal\":{\"name\":\"Qeios\",\"volume\":\"56 3\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-05-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Qeios\",\"FirstCategoryId\":\"0\",\"ListUrlMain\":\"https://doi.org/10.32388/60nk7h\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Qeios","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.32388/60nk7h","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Unified Framework for Cyber Oriented Digital Engineering using Integration of Explainable Chaotic Cryptology on Pervasive Systems
Cyber Oriented Digital Engineering (CODE) aims to safeguard pervasive systems, cyber physical systems (CPS), internet of things (IoT) and embedded systems (ES) against advanced cyberattacks. Cyber oriented digital engineering pilots are earnestly required to secure transmission and credential exchanges during machine to machine (M2M) zero trust (ZT) communication. In order to construct the CODE pilot as a pivot of zero trust (ZT) communication, systems engineering employing chaotic cryptology primitives has been investigated. The empirical results with analysis of findings on its integration on real life platforms are presented as a pervasive framework, in this work. The focus was bestowed in developing an explainable approach, addressing both ante hoc and post hoc explanation needs. Ante hoc explanation ensures transparency in the encryption process, fostering user trust, while post hoc explanation facilitates the understanding of decryption outcomes.
The properties of explainable approaches are investigated, emphasizing the balance between security and interpretability. Chaotic systems are employed to introduce a dynamic layer of complexity, enhancing encryption robustness.
The article aims to contribute to the evolving field of explainable chaotic cryptology, bridging the gap between cryptographic strength and user comprehension in CODE pilot based zero trust (ZT) exchanges in multimedia content protection.
Thus, this research is a communication brief case containing significant early findings and groundbreaking results studied as a part of a longer, multi-year analysis. Innovative techniques and pragmatic investigations have been discussed as a part of result dissemination in the empirical findings.