Improved Blockchain Technique based on Modified SLIM Algorithm for Cyber Security

Main Article Content

Sarah Mohammed Shareef
Rehab Flaih Hassan

Abstract

The number of cybersecurity incidents is increasing, and the cost of a security breach has a catastrophic financial effect. The existing real estate information systems require more robust and resilient cybersecurity solutions to secure hardware, software, and databases. Cybersecurity often relies on user behavior. Phishing attacks and social engineering can bypass blockchain security, highlighting the need for robust user education and awareness. Many blockchain networks face challenges in handling a high volume of transactions. Solutions that work well on a small scale may not perform efficiently as the network grows, leading to delays and increased costs. A secure system is a significant area in cybersecurity that protects digital transactions from unauthorized access. This paper proposes a new real estate transaction encryption scheme using the modified SLIM cryptography algorithm in the context of blockchain based on a 2Dimension Chialvo map with high nonlinearity generation of the substitution box (S-Box) to make it robust against many linear attacks, which is a novel approach to enhancing transaction speed and security. Modifying lightweight SLIM cryptography is highly resistant to linear and differential cryptanalysis attacks, providing adequate protection. The modified lightweight SLIM cryptography applies to wireless networks, IoT applications, and real estate systems. The performance analysis of the blockchain shows that it completes transactions in a short time of approximately 29.368877 in milliseconds and satisfies the Bit Independence Criterion (BIC) and Hamming Distance (HD) tests above 50%, the new hash will be regarded as good and trustworthy. The performance analysis of the proposed S-Box shows that it has high nonlinearity and satisfies the Strict Avalanche Criteria (SAC), BIC, balanced, and low linearity/differential probability. In addition, the strength and randomness of the random number generators are analyzed via a set of tests and guidelines provided by the National Institute of Standards and Technology (NIST) tests (approximately 97%) to ensure that the generated random data are sufficiently unpredictable and suitable for cryptographic applications.

Article Details

Section

Articles

How to Cite

Improved Blockchain Technique based on Modified SLIM Algorithm for Cyber Security (S. M. . Shareef & R. F. . Hassan , Trans.). (2025). Mesopotamian Journal of CyberSecurity, 5(1), 147-164. https://doi.org/10.58496/MJCS/2025/010

References

[1] K. P. S. Sherin, T. A. Amma, K. Sivakumar, and S. Divya, "Cyber Security in Blockchain Technology," International Journal of Research in Engineering, Science and Management , vol. 6, no. 2, pp. ISSN (Online): 2581-5792, Feb. 2023.

[2] D. H. Tahayur and M. Al-Zubaidie, "Enhancing Electronic Agriculture Data Security with a Blockchain-Based Search Method and E-Signatures," Mesopotamian journal of Cybersecurity , vol. 4, no. 3, pp. 1–21, 2024. doi: https://doi.org/10.58496/MJCS/2024/012 .

[3] A. S. Jamil and A. M. S. Rahma, "Cyber Security for Medical Image Encryption using Circular Blockchain Technology Based on Modify DES Algorithm," International Journal of Online and Biomedical Engineering (iJOE) , vol. 19, no. 03, 2023.

[4] S. S. Abdul-Jabbar, A. K. Farhan, and R. F. Ghani, "Data Analytics and Blockchain: A Review," Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE) , vol. 23, no. 1, Mar. 2023.

[5] H. S. Hassan, R. Hassan, and E. K. Gbashi, "E-voting System Based on Ethereum Blockchain Technology Using Ganache and Remix Environments," Engineering and Technology Journal , pp. 562-577, 2023.

[6] Z. A. Kamal, R. F. Ghani, and A. K. Farhan, "Blockchain-based E-Government system using WebSocket protocol," Engineering and Technology Journal , pp. 421-429, 2024.

[7] S. S. Dhanda, B. Singh, and P. Jindal, "Lightweight Cryptography: A Solution to Secure IoT," Wireless Personal Communications , part of Springer Nature 2020. doi: 10.1007/s11277-020-07134-3.

[8] Q. Y. Zhang, T. Li, and G. R. Wu, "An Image Tamper-proof Encryption Scheme Based on Blockchain and Lorenz Hyperchaotic S-box," International Journal of Network Security , vol. 25, no. 2, pp. 252-266, Mar. 2023. doi: 10.6633/IJNS.202303 25(2).08.

[9] S. Hussain, S. S. Jamal, T. Shah, and I. Hussain, "A Power Associative Loop Structure For The Construction Of Non-Linear Components Of Block Cipher," IEEE Access . doi: 10.1109/ACCESS.2020.3005087, 2020.

[10] O. Kuznetsov, N. Poluyanenko, E. Frontoni, and S. Kandiy, "Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography," MDPI journal, Cryptography , 2024. doi: 10.3390/cryptography8020017.

[11] N. M. Naser and J. R. Naif, "A systematic review of ultra-lightweight encryption algorithms," International Journal Nonlinear Analysis and Applications , ISSN: 2008-6822, 2022. doi: 10.22075/ijnaa.2022.6167.

[12] M. A. Hatem, B. A. Hameedi, and J. N. Hasoon, "Lightweight digital imaging and communications in medicine image encryption for IoT system," TELKOMNIKA Telecommunication Computing Electronics and Control , vol. 21, no. 4, pp. 771-783, Aug. 2023. doi: 10.12928/TELKOMNIKA.v21i4.24766.

[13] A. Alahdal et al., "NLBCIT: A Novel Approach for Securing data in IoT devices based on a Lightweight Block Cipher Design Algorithms," African Journal of Biological Sciences , ISSN: 2663-2187, 2024. doi: 10.48047/AFJBS.6.12.2024.6203-6221.

[14] A. A. Altaay, J. N. Hasoon, and H. K. Albahadily, "Lightweight Image Encryption Based on A Hybrid Approach," International Journal on Informatics Visualization , vol. 8, no. 2, pp. 977-982, May 2024.

[15] J. S. Teha, L. J. Thama, N. Jamilc, and W. Yapd, "New Deferential Cryptanalysis Results for the Lightweight Block Cipher BORON," Journal of Information Security and Applications . doi: 10.1016/j.jisa.2022.103129, 2022.

[16] H. I. Mhaibes, M. H. Abood, and A. K. Farhan, "Simple Lightweight Cryptographic Algorithm to Secure Imbedded IoT Devices," International Journal of Interactive Mobile Technologies (iJIM) , Oct. 2022. doi: 10.3991/ijim.v16i20.34505.

[17] H. Nurwarsito and S. Yapputra, "Implementation of Simon’s Algorithm in the Encryption Process of Publish-Subscribe Data Sending in the MQTT Protocol using the Raspberry," The 1st International Conference on Engineering and Technology (ICoEngTech) . doi: 10.1088/1742-6596/1962/1/012064, 2021.

[18] T. Fan, L. Li, Y. Wei, and E. Pasalic, "Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher," International Journal of Distributed Sensor Networks , vol. 18, no. 9, 2022. doi: 10.1177/15501329221119398.

[19] A. H. Karode, S. R. Suralkar, and V. B. Patil, "Performance Evaluation of Light Weight Cryptographic CLEFIA Algorithm," International Journal of Electronics and Communication Engineering , vol. 10, no. 8, pp. 48-58, Aug. 2023. doi: 10.14445/23488549/IJECE-V10I8P105.

[20] B. Aboushosha, R. A. Ramadan, A. D. Dwivedi, A. El-Sayed, and M. M. Dessouky, "SLIM: A Lightweight Block Cipher for Internet of Health Things," IEEE Access . doi: 10.1109/ACCESS.2020.3036589, 2020.

[21] N. Sugio, N. Shibayama, and Y. Igarashi, "Higher-order Differential Attack on Reduced-round SLIM," Journal of Information Processing , vol. 32, pp. 352–357, 2024. doi: 10.2197/ipsjjip.32.352.

[22] A. A. Salih, Z. A. Abdulrazaq, and H. G. Ayoub, "Design and Enhancing Security Performance of Image Cryptography System Based on Fixed Point Chaotic Maps Stream Ciphers in FPGA," Baghdad Science Journal . doi: 10.21123/bsj.2024.10521, P-ISSN: 2078-8665 - E-ISSN: 2411-7986, 2024.

[23] P. Pilarczyk and G. Graff, "An absorbing set for the Chialvo Map," Elsevier BV, Communications in Nonlinear Science and Numerical Simulation , p. 107947, 2024.

[24] Zainab A. Kamal and Rana.F. Ghani, "A Proposed Authentication Method for Document in Blockchain Based E-Government System," Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE) , vol. 22, no. 4, Dec. 2022. doi: https://doi.org/10.33103/uot.ijccce.22.4.10 .

[25] K. K. Vaigandla, M. Siluveru, M. Kesoju, and R. Karne, "Review on blockchain technology: architecture, characteristics, benefits, algorithms, challenges and applications," Mesopotamian journal of Cybersecurity , vol. 2023, pp. 73–85, Mar. 2023. doi: 10.58496/MJCS/2023/012.

[26] L. Hussain, “Fortifying AI Against Cyber Threats Advancing Resilient Systems to Combat Adversarial Attacks”, EDRAAK, vol. 2024, pp. 26–31, Mar. 2024, doi: 10.70470/EDRAAK/2024/004.

[27] [Online]. Available: https://www.kaggle.com/datasets/abdallahsamman/california-housing-with-name-of-counties

[28] M. Lawnik, L. Moysis, and C. Volos, "Chaos-Based Cryptography: Text Encryption Using Image Algorithms," [Online]. Available: https://www.mdpi.journal/electronics . doi: 10.3390/electronics11193156, 2022.

[29] Ala'a Talib Khudhair and Abeer Tariq Maolood, "A Novel Approach to Generate Dynamic S-Box for Lightweight Cryptography Based on the 3D Hindmarsh Rose Model," Journal of Soft Computing and Computer Applications , vol. 1, no. 1, 2024.

[30] A. K. Farhan, R. S. Ali, H. R. Yassein, N. M. G. Al-Saidi, and G. H. Abdul-Majeed, "A new approach to generate multi S-boxes based on RNA computing," International Journal of Innovative Computing, Information and Control (IJICIC) , vol. 16, no. 1, pp. 331–348, 2020. doi: 10.24507/ijicic.16.01.331.

[31] A. Alhudhaif, M. Ahmad, A. Alkhayyat, N. Tsafack, A. K. Farhan, and R. Ahmed, "Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System," IEEE Access . doi: 10.1109/ACCESS.2021.3090163, 2021.

[32] A. Alsajri, A. Steiti, and H. A. Salman , Trans., “Enhancing IoT Security to Leveraging ML for DDoS Attack Prevention in Distributed Network Routing”, BJIoT, vol. 2023, pp. 74–84, Oct. 2023, doi: 10.58496/BJIoT/2023/010.

[33] A. D. Dwivedi and G. Srivastava, "Differential Cryptanalysis of Round-Reduced LEA," IEEE Access . doi: 10.1109/ACCESS.2017, 2018.

[34] E. O. Oraby and Salah A.K. Albermany, "Linear Cryptanalysis of S-Box BRADG," International Journal of Engineering & Technology , pp. 120-124, 2018.

[35] S. A. Jassim and A. K. Farhan, "Designing a Novel Efficient Substitution-Box by Using a Flower Pollination Algorithm and Chaos System," International Journal of Intelligent Engineering and Systems , vol. 15, no. 1, 2022. doi: 10.22266/ijies2022.0228.17.

[36] B. Arshad, N. Siddiqui, Z. Hussain, and M. Ehatisham ul Haq, "A Novel Scheme for Designing Secure Substitution Boxes (S Boxes) Based on Mobius Group and Finite Field," Wireless Personal Communications . doi: 10.1007/s11277-022-09524-1, 2022.

[37] M. Sarfraz, I. Hussain, and Fateh Ali, "Construction of S-Box Based on Mobius Transformation and Increasing Its Confusion Creating Ability through Invertible Function," International Journal of Computer Science and Information Security (IJCSIS) , vol. 14, no. 2, 2016.

[38] B. Arshad, N. Siddiqui, and Z. Hussain, "A Novel Method for Designing Substitution Boxes Based on Mobius Group," Wireless Personal Communications , vol. 124, pp. 3527–3548, 2022.

[39] F. Riaz and N. Siddiqui, "Design of an Efficient Cryptographic Substitution Box by using Improved Chaotic Range with the Golden Ratio," International Journal of Computer Science and Information Security (IJCSIS) , vol. 18, no. 1, 2020.

[40] W. Iftikhar and N. Siddiqui, "An Effective Technique of Substitution-box Construction using Recurrence Relation with Logistic Map," International Journal of Computer Science and Information Security (IJCSIS) , vol. 18, no. 3, 2022.

[41] I. I. . Al Barazanchi and W. . Hashim, “Enhancing IoT Device Security through Blockchain Technology: A Decentralized Approach”, SHIFRA, vol. 2023, pp. 10–16, Feb. 2023, doi: 10.70470/SHIFRA/2023/002.

[42] Y. Aydin and F. Ozkaynak, "Automated Chaos-Driven S-Box Generation and Analysis Tool for Enhance Cryptographic Resilience," IEEE Access . doi: 10.1109/ACCESS.2023.3346319, 2023.

[43] H. Alnabulsi, R. Islam, I. Alsmadi, and S. Bevinakoppa , Trans., “An Innovative Method of Malicious Code Injection Attacks on Websites”, Applied Data Science and Analysis, vol. 2024, pp. 39–51, May 2024, doi: 10.58496/ADSA/2024/005.

[44] T. Wang, H. Hua, Z. Wei, and J. Cao, "Challenges of blockchain in new generation energy systems and future outlooks," International Journal of Electrical Power and Energy Systems , vol. 135, Feb. 2022. Art. no. 107499. doi: 10.1016/j.ijepes.2021.107499, 2021.

Similar Articles

You may also start an advanced similarity search for this article.