SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm
Open Access
- 17 February 2023
- journal article
- research article
- Published by Hindawi Limited in Journal of Applied Mathematics
- Vol. 2023, 1-10
- https://doi.org/10.1155/2023/5187602
Abstract
With the widespread use of embedded systems, chaos is a nonlinear system with certainty and complexity. It is an important topic in the field of information security at present, and it is an effective way to apply to embedded systems. It has great practical value in theory and in practice. This research mainly focuses on the encryption technology of SQLite embedded database and proposes an improved sparrow algorithm (Logistic Chaos Sparrow Search Algorithm, LCSSA) based on Logistic Chaos Map. It shows that the security level of SQLite in web development is higher than that of conventional Access. The population is initialized by the logistic chaotic mapping method, which improves the quality of the initial solution, increases the diversity of the population, and reduces the risk of premature maturity of the algorithm. The initial value determines the encryption method of the nonlinear function. Taking the integer variable (int) as an example, the value range is -231~231. It can be seen that the key space is sufficient to prevent various conventional attacks. When the key is the wrong key, decryption will not yield any data. It can be found that encryption and decryption are very sensitive to the key, which is also determined by the sensitivity of chaotic encryption system to the initial value. The benchmark function compares the performance of the improved algorithm with the algorithm before the improvement and compares it with the SSA. The LCSSA has better convergence performance, higher accuracy, and better stability.Keywords
Funding Information
- Major Projects in Anhui Province (2020qkl26)
This publication has 23 references indexed in Scilit:
- Cryptanalysis of a Bilateral-Diffusion image encryption algorithm based on dynamical compound chaosPRZEGLĄD ELEKTROTECHNICZNY, 2021
- PP385 Using Common Data Models And Data Networks For Evidence Generation In Health Technology AssessmentInternational Journal of Technology Assessment in Health Care, 2020
- Efficient Encryption System for Numerical Image Safe TransmissionJournal of Electrical and Computer Engineering, 2020
- Energy Management for Energy Harvesting-Based Embedded Systems: A Systematic Mapping StudyJournal of Electrical and Computer Engineering, 2020
- Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris RecognitionIEEE Transactions on Information Forensics and Security, 2020
- An improved digital logistic map and its application in image encryptionMultimedia Tools and Applications, 2020
- Adaptive Convolution Local and Global Learning for Class-Level Joint Representation of Facial Recognition With a Single Sample Per Data SubjectIEEE Transactions on Information Forensics and Security, 2020
- Performance Analysis of Data Encryption Algorithms for Secure EHR TransmissionInternational Journal of Computer Sciences and Engineering, 2019
- A Study of Image Compression and SHA 256 Encryption Algorithms for Secure TransmissionInternational Journal of Computer Applications, 2019
- Bi-objective integrated supply chain design with transportation choices: A multi-objective particle swarm optimizationJournal of Industrial & Management Optimization, 2017