International Journal of Interactive Mobile Technologies (iJIM) – eISSN: 1865-7923 – Vol. 15, No. 02, 2021


Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

A New WoT Cryptography Algorithm Based on GOST 

and Novel 5d Chaotic System 

https://doi.org/10.3991/ijim.v15i02.19961 

Hayder Najm () 
University of Technology, Baghdad, Iraq  

cs.19.87@grad.uotechnology.edu.iq 

Haider K. Hoomod  
Mustansiriyah University, Baghdad, Iraq 

Rehab Hassan 
University of Technology, Baghdad, Iraq 

Abstract—The concept Web of Things (WoT) goes well beyond the empha-

sis on the Internet as a means of sharing data, instead of introducing all  

resources and connections involving computers, data, and people to the Web. It, 

therefore, focuses on a range of problems and opportunities, thus paving the 

way for several exciting industries applications. In cryptography a range of 

main characteristics of chaotic systems such as non-linearity, initial condition 

sensitivity, and mixing properties are available. These characteristics provide an 

essential connection between cryptography and chaos. GOST is the Russian 

norm of encryption. GOST block cipher is based on secret key secrecy. Howev-

er, when the encryption process with the same key is used for plaintext, the 

same cipher text is created. Message replication can be easily detected by an 

adversary who is a bad link in every communication. In this paper, we propose 

to use a 5d chaotic system combined with GOST block cipher to create a new 

secure Web of Things (WoT) cryptography system. GOST is a symmetric block 

cipher. It is the basis of most secure information systems in Russia. The 5D 

chaotic system was used to generate chaotic random keys that used in the 

GOST algorithm to provide security as a higher strength to increases randomly. 

The National Institute of Standards and Technology (NIST) designed a set of 

fifteen statistical tests and modifies key schedule as security operations. 

Keywords—Web of Things (WoT), information security, cryptography, block 

cipher, GOST algorithm, and chaotic system 

1 Introduction 

A variety of experiments have been carried out to discourage third entities from  

accessing data through contact. In most technical approaches, flawless systems in 

safety electronics are still not accomplished. There is always a possibility that third 

entities will decode the data, even if the data is very well shielded. Different encryp-

184 http://www.i-jim.org

https://doi.org/10.3991/ijim.v15i02.19961
https://doi.org/10.3991/ijim.v15i02.19961


Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

tion methodologies are introduced to mitigate this possibility. In recent years, quick 

electronic technologies advances have led to more efficient data communication using 

microcontroller and computer-based systems [1] [2]. Currently, it is remembered that 

even effective encryption techniques may be exploited at a specified period. Modern 

encryption studies illustrate that chaotic systems’ fundamental properties suggest a 

high correlation among chaos and cryptology [3]. High-speed, distortional, reactive, 

and aperiodic represented the characteristics of chaotic systems. There is a more per-

sonal point of view-based encryption for communications due to noise behavior and 

strong dependency on initial conditions and parameters [4]. Encrypted data shows a 

complex that is necessary for data to stay top-secret. In recent decades, researchers 

have found a fascinating relationship between cryptography and chaos. According to 

this, there are many properties of chaotic systems such as: ergodicity, sensitivity to 

initial conditions, mixing properties, deterministic, ease of use dynamics and structur-

al complexity that are similar to confusion/diffusion with a simple shift in dynamics 

plain text key / secret key [5]. The term “chaos” was first used in the cryptographic 

field in 1989 when Matthews introduced chaos as a stream cipher on the basis of the 

chaotic 1D method [6]. Chaotic systems have important features that ensure the 

mechanism is extremely safe and resilient to cryptographic attacks. Due to their capa-

bility to attain diffusion-based confusion results, various chaos-based encryption algo-

rithms were investigated and implemented in any cryptosystem [7]. The aim of this 

research in this paper, suggests a new WoT cryptography algorithm according to 

GOST and novel 5d chaotic system. It can provide high security at a very fast encryp-

tion rate and can be easily implemented by software and hardware. This paper per-

forms a series of experiments to demonstrate the feasibility of the suggested solution. 

Detailed statistical analysis and experiments show that WoT’s security and timing are 

much superior to our scheme. The following paper is organized: Section 2 includes a 

brief overview of information security. Traditional GOST algorithm and chaotic sys-

tem are presented in section 3 and section 4. The related work Information will be 

presented on the proposed approach in Section 5. Sections 6, 7 presents the novel 5D 

chaotic system construction adopted in this paper and the proposed methodology. 

Section 8 describes the results and analysis. Section 9 ultimately offers a conclusion. 

2 Information Security 

InfoSec, a set of procedures to secure data from unauthorized alteration, is often re-

ferred to, both stored and transmitted from one device or physical location to another. 

Since intelligence has become one of the most valuable assets in the 21st century, 

efforts have become increasingly essential to preserve information security [8-10]. 

Information Security systems are designed around three goals, generally known as the 

CIA – Confidentiality, Credibility, and Availability. Information security is at the 

center of Information Assurance, which means that the CIA protects information and 

guarantees that information is not compromised in any way when sensitive issues 

occur [11-16]. Cryptography is a vital instrument for securing information that is 

transmitted by computers. Cryptography is an imaginative transformation of data into 

iJIM ‒ Vol. 15, No. 02, 2021 185



Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

an unreadable format such that it can only be interpreted and used by the intended 

receiver. The art and science of cryptography is the defense against improper access 

to sensitive or confidential information [17-20]. In general, therefore, cryptography is 

all about shielding and safeguarding information from cybercriminals or someone 

other than the intended recipient. Cryptography allows people to connect on the Inter-

net and safely share critical and confidential information. Cryptography also helps 

individuals to use public and private media like the Internet, to shop and not be the 

victims of criminals and sniffing by a password. This is done through the use of mod-

ern technological advances in computer science [21-26]. 

3 GOST Algorithm 

GOST is a symmetric block cipher, it is the Russian norm of encryption. It was in 

1989. It is the basis of most secure information systems in Russia. It has a simple 

structure suitable for compact hardware implementations. It has been classified as one 

of the cryptography block ciphers. Therefore, it is a target for the constrained envi-

ronments. It is a network of 32 round functions, add a 32-bit sub-key module 232, 

bring the results through the S-box layer, and rotate the result left by 11 bits [27]. No 

advancement in standard cryptoanalysis was already made in existing studies except 

for a quick summary of the GOST design and the related key attack. The GOST  

encryption method is a block cipher with a 256-bit key and a 64-bit block size. GOST 

is designed as a 32 round Feistel network with a 32-bit round sub-key, as shown in 

fig.1 [28].  

 

Fig. 1. Traditional GOST algorithm [29]. 

186 http://www.i-jim.org



Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

Table 1.  Generation of Sub-Key in GOST [29] 

Round R1 R2 R3 R4 R5 R6 R7 R8 

Sub-key K1 K2 K3 K4 K5 K6 K7 K8 

Round R9 R10 R11 R12 R13 R14 R15 R16 

Sub-key K1 K2 K3 K4 K5 K6 K7 K8 

Round R17 R1 R19 R20 R21 R22 R23 R24 

Sub-key K1 K2 K3 K4 K5 K6 K7 K8 

Round R25 R26 R27 R28 R29 R30 R31 R32 

Sub-key K8 K7 K6 K5 K4 K3 K2 K1 

 

Key generation is simplistic; the 256-bit key is split into eight 32-bit sub-keys. The 

algorithm has 32 rounds, so each subkey includes the following scheme at four rounds 

[30]. 

The arrangement of the S-boxes shapes GOST stability. The structure of the S-

boxes has not been released for a long time. The input and output of S-box are 4-bit 

numbers so that each S-box can be provided with a series of numbers from 0 to 15. 

Then the sequence number will be input and output to the S-box [31]. 

The Key Sequence split 256-bit main into eight 32-bit words K0… K7, and then 

using these key terms in the sequence K0, … K7, K0, … K7, K0, … K7, K7, K6, … 

K0. 

The F-function is used in each round on the right side of the plaintext message, as 

shown in fig.2. Converts plaintext with three operations: 

• Data addition and module 232 subkey. 

• Data replacement with secure S-boxes. 

• Left cyclical shift by 11 positions. 

The output of F-function is applied to the left part of plaintext modulo 2, then the 

left and the right sides are adjusted to the next round. The general phase of the round 

function can be described in the formal syntax as follows [32]: 

 Lefti+1 = Righti (1) 

 Righti+1 = Lefti ⊕ (S (Ki + Righti mod 232) << 11) (2) 

Where ⊕ denotes a bitwise exclusive OR and << a rotation to the left by a bit. 

iJIM ‒ Vol. 15, No. 02, 2021 187



Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

 

Fig. 2. F-function round [32]. 

4 Chaotic System 

The chaos that can occur with certain system values/parameters is among the po-

tential actions associated with the growth of a nonlinear physical system. Chaotic 

systems are defined as flows from the point of view of differential equations and dif-

ferential equations are known as maps. Trajectory and orbit describe the creation of 

these non-static structures. The direction is defined as the trajectory, followed by the 

flow as time passes and the set of points travel over the map [33-34]. Chaos Theory 

deals with processes that develop into a specific form of complex action in time. In 

general, these processes usually adopt a variety of evolutionary principles and are thus 

deterministic. Chaos is only present in such non-linear deterministic systems. It must 

be stated. Explicitly, there is chaos when long-term and sustainable development 

fulfils those mathematical requirements [35]. Non-linear maps of chaotic behavior are 

chaotic maps. During the encryption method, chaotic maps generate pseudo-random 

variations. Initial conditions and parameters are aligned in mixing and adaptation to 

certain fundamental concepts of chaos theory. The most critical advantage of chaos is 

that unlicensed consumers like noise receive a noisy signal. In addition, generating 

chaotic values with simple iterations is also cheap and suitable for ciphers of blocks 

[36].  

4.1 Chaos-cryptographically partnership 

Deterministic nonlinear dynamic systems that produce the deterministic pseudo-

randomness required in cryptography are implemented with chaotic systems. Fur-

thermore, non-linear dynamic systems are able to generate complex progressive pat-

terns. This gives chaotic systems the requisite algorithmic complexity [37]. The in-

trinsic characteristics of chaos specifically contribute to uncertainty and diffusion’s 

cryptographic characteristics. It is evident, in answer to the properties, that the proper-

ties are directly linked to uncertainty, auto similarity, and topological mixing. Aperi-

188 http://www.i-jim.org



Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

odic orbits, generating identical statistical patterns, give dynamics of the chaotic  

attractor. Such designs may use substitution techniques to obscure simple signals [38]. 

On the other hand, diffusion is closely linked to chaotic systems sensitivity to starting 

conditions and parameters of regulation. Diversion induces an avalanche effect in 

order to generate a completely different output with a minimal variance of the cryp-

tosystems input. This behavior is generated by a chaotic system when the original 

conditions or control parameters are modified slightly. The same avalanche effect is 

created by using those variables as inputs to the algorithm cryptosystem. The relation-

ship between chaos and encryption is summarized in table 2 [39]. 

Table 2.  Chaotic and cryptography relationships [39] 

Chaotic characteristic Cryptographic property Description 

Ergodicity, Mixing property Auto-

similarity 
Confusion 

The output of the system seems similar 

for any input. 

Sensitivity to initial conditions and  

control parameters 
Diffusion 

A small difference in the input produces 

a very different output 

Deterministic 
Deterministic pseudo 

randomness 

A deterministic procedure that produces 

pseudo randomness 

Complexity Algorithmic complexity 
A simple algorithm that produces highly 

complex outputs 

5 Related Works 

Many papers are talking about cryptographic and chaotic theory. In [40], to im-

prove communication protection, a chaos-based encryption approach with non-linear 

equations is proposed. Methods of encryption are studied using the properties of three 

separate chaos generators. Applications are rendered by logistical map, pinchers map, 

sinus map, chaos generators generally referred to in the literature. In [41], this study 

proposed to encrypt WSN’s message digester MD, a new encoding scheme known as 

Chaotic Block Cipher (CBC). This approach uses a logistic map approach to construct 

a set of chaotic values to get the encryption/decryption keys to a plaintext that mixes 

them for cipher text. In [42], using the data, the 4D chaotic system, and three control 

parameters, the proposed algorithm permutation matrix P is generated. Half of the 

picture data is used for building P and three test parameters are defined. There are still 

a lot of real chaotic sequences. In [43], the hyper-chaos has more than one exponent 

of Lyapunov and complex dynamic features as well as one-dimensional chaos, it’s 

investigated by the author, and it is safer than the safety algorithm chaos. Encryption 

is performed in two stages in the proposed algorithm. Next, the picture is absolutely 

mixed with a messy logistic map. Second, the gray values of the mixed image are 

encoded using a hyper-chaos system. In [44], using the logistic map. The first small 

permutation matrices are the chaotic logistic map sequence. The logistic map’s initial 

value and small matrices are known as an algorithm. These small parameters are used 

to construct a comprehensive parameter matrix. Then construct an image with a 

plaintext with the entire matrix. To mask the image, use the permutation mask. The 

suggested methodology provides adequate protection against numerical cryptanalysis. 

iJIM ‒ Vol. 15, No. 02, 2021 189



Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

In [45], the author has suggested the encryption of a picture based on chaotic, non-

linear logistic map sequences. Encrypting and decrypting algorithms are designed 

with a non-linear function, which produces a secret key using a single logistic map for 

these functions. The combined non-linear and chaotic logistic functions have been 

demonstrated to provide good statistical features on the reception of the cipher image 

and image data. The proposed system is not, however, sufficiently sonic. It is also 

demonstrated to be adaptive not only to initial condition x but also to the logistic 

equation bifurcation parameter. 

In [46], two distinct, non-invertible, two-dimensional, discrete-time cryptosystems 

were proposed. Chaotic attractors, which are thought to be pseudo-random generators, 

are some map paths, while the initial conditions are the main. They suggested using 

non-invertible two-dimensional maps that show chaotic encryption dynamics. In [47], 

the method of building the cipher algorithm that can use long keys and the variable 

key length is specified. An efficient way to encrypt and decrypt data is through dis-

crete chaotic maps. A constructed algorithm was simple and provided fair security 

and efficiency. In [48], proposed a secure system using the new 4D chaotic system in 

combination with the Advanced Encryption Standard (AES) modified lightweight. 

The proposed 4-dimensional (4D) chaos system Lyapunov was tested and passed for 

several initial periods and a super chaos system (4 positive Lyapunov) was developed. 

In lightweight AES and Secure Hash version 3 (SHA3-256), chaos keys created (used 

from JORN) are used. In order to decrease CPU cycles and AES complexity, the 

Lightweight AES was developed. Results indicate a decrease in the computation time 

for the method proposed (up to 145 percent). The performance of the improved light-

weight AES encryption framework includes strong statistical tests that can prevent 

several attacks similar to the original AES. 

6 Novel 5D Chaotic System Construction 

Chaotic is a unique non-linear, dynamic system; the chaotic 5D system has more 

complex dynamic properties than the chaotic system of lower dimensions. A numeri-

cal indicator to determine if the system is chaotic is Lyapunov exponent. A positive 

Lyapunov exponent implies more than one hyper-chaotic exponent of chaos and posi-

tive Lyapunov exponents. Our proposed new algorithm is based on the following 

equations:  

xi+1 = – r ∙ xi + b ∙ yi ∙ ki – 2.5 ∙ s ∙ pi 

yi+1 = – q ∙ yi – s ∙ xi ∙ zi + r ∙ xi – u ∙ pi 

zi+1 = 2 ∙ zi ∙ xi ∙ yi - 1.1 ∙ r ∙ pi – q ∙ ki 

ki+1 = r ∙ xi + s ∙ yi – u ∙ ki 

pi+1 = b ∙ (( xi + ki ) / zi  ) + r ∙ yi  

  (3) 

190 http://www.i-jim.org



Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

Where x, y, z, k and p represent the system states, where b, r, s, u and q represent 

positive constant parameters. When the value of b=0.001, r=0.7, s=0.5, u=1.9 and 

q=0.2 and the initial state are x0=2.1, y0=0.5, z0=1.1, k0=1.1and p0=0.1; the system 

displays a chaotic behavior and the Lyapunov exponents are as follows: LE1= 

0.04187490335084436, LE2= 0.056182990598499266, LE3= 4.541784300356545, 

LE4= 0.04356762255380923 and LE5= 0.057322573098809185. Fig.3 show our cha-

otic attractors. 

 

a. The behavior of the system at two-dimensional  

view xy, xz, xk, yz, yk and zk. 

 

b. The behavior of the system at three-dimensional view xyz 

Fig. 3. (a, b) Chaotic system behavior. 

7 Proposed Approach Methodology 

The main idea of the proposed approach is to use the GOST algorithm and the nov-

el 5d chaotic system by combing the strengths of each other. The GOST algorithm 

iJIM ‒ Vol. 15, No. 02, 2021 191



Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

key schedule will not be used; the 5d chaotic keys will be used as the GOST algo-

rithm keys to control the weak point in the GOST algorithm. Initially, sensing data 

(Plaintext) collection from sensors connected to a web of things (WoT) system. In this 

work, the proposed system was checked by five sensors. These sensors are powered 

by Raspberry Pi 3 type B. The data of each sensor is obtained and aggregated during 

slice times. 64-bit data blocks are reached and transformed to 64-bit encrypted data 

blocks by a 256-bit key generated from 5d chaotic system. In every round as showing 

in fig.4, right-hand side of plaintext is handled by F-fun, that converting messages to 

three cryptographic processes: Data addition and sub-key module 232, data substitu-

tion using Sboxes, and the left-cyclical-shift to 11-positions. The output of F-fun is 

added to the plaintext in modulo 2 at the left side; then the next round is swapped to 

the right and left sides. There are 32 rounds in the algorithm. The right and left sec-

tions are not changed during the last encryption round. GOST uses eight S-boxes, 

converting 4bit input into a 4bit output. GOST does not have standardized Sboxes, 

and any values can be used, unlike most encryption algorithms. The secret key (gen-

erated by 5d chaotic) is 256bit and is given as an eight-word sequence: (K1 to K8). 

Every 32-bit word is added in any encryption round as a round subkey. The following 

principle is applied when the round subkey is determined: the order at 1-round 24 is 

simple (K1-K8). The order is reversed at 25-round32 (K8-K1). Due to the high ran-

domness of the chaotic key, there is good encryption of robustness. Deciphering is the 

same method of encrypted, but the 5d chaotic system’s reverse key.  

 

Fig. 4. Block diagram of the proposed approach. 

192 http://www.i-jim.org



Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

8 Experimental Results and Statistical Analysis 

Many tests are conducted using the proposed approach to encrypt/decrypt sensing 

data by using the characteristics of GOST block cipher and chaotic system, ensuring 

that the software and hardware encryption and decryption scheme is fast and easy to 

implement for resource-controlled devices such as smart devices and wireless nodes. 

This work examines the possibility of mixing a block cipher (GOST) and a chaotic 

system to produce a strong chaotic-cryptographic. It involves a specific plan to com-

bine GOST 256-bit and chaotic random keys, that is significantly quicker than the 

standard GOST and possibly more reliable. The encryption process needs 64-bit or 

16-hex data or eight characters input plaintext data through 32 iteration stages 

(rounds), while the deciphering process involves the reverse of the ciphering process. 

The energy consumption can be reduced, and the system’s encryption speed is higher. 

Our proposal is for high-security low-cost devices since it is resistant to most of the 

cryptanalytical attacks common to block chips and chaotic systems. The National 

Institute of Standards and Technology (NIST) designed a set of fifteen tests to evalu-

ate and quantify the randomness of binary sequences produced by either software or 

hardware-based random or pseudo-random number generators for cryptographic ap-

plications. The NIST has adopted two approaches: the examination of the proportion 

of sequences that pass a statistical test and the distribution of P-values to check for 

uniformity. The system proposed provides adequate safety and reliability, according 

to a table 3. 

Table 3.  NIST Fifteen Statistical Tests  

Test P - Value 

Monobit 0.500110 

Frequency 0.498078 

Runs 0.487880 

Longest Run 0.504698 

Binary Matrix Rank 0.477522 

DFT 0.451004 

Non Overlapping Template Matching 0.679095 

Overlapping Template Matching 0.990653 

Maurer’s Universal 0.311035 

Linear Complexity 0.500672 

Serial 0.495460 

Approximate Entropy 0.520565 

Cumulative Sums 0.418182 

Random Excursion 0.549397 

Random Excursion Variant 0.501425 

 

Table 4 illustrates the encryption and decryption processes, as well as execution 

time of traditional GOST algorithm. While, table 5 illustrate the encryption and de-

cryption processes, as well as execution time of proposed approach.  

iJIM ‒ Vol. 15, No. 02, 2021 193



Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

Table 4.  Traditional GOST encryption and decryption processes 

Plain Text Temperature ECG Heart beat 

Encrypted Text 152355312c167321321423110072213404211230df9293e6fe40 

Encryption Time 0.0001 in second 

Decrypted Text Temperature ECG Heart beat 

Decryption Time 0.0009 in second 

 

 

Table 5.  Proposed approach encryption and decryption processes 

Plain Text Temperature ECG Heart beat 

Encrypted Text 54656d706572617475726520454347204865e3003221c33f1c01 

Encryption Time 0.0269 in second 

Decrypted Text Temperature ECG Heart beat 

Decryption Time 0.0279 in second 

 

A different statistical measure can be used to evaluate the proposed approach. 

These are hamming distance and entropy measures. Hamming distance is the differ-

ence measurement between plain text and cipher text, is measured at a bit level so we 

transform the strings into a byte array, convert each byte to the bits, and then count 

the number of differences. The randomness produced by the proposed approach, as 

shown in table 6, is more accurate than the randomness produced by the traditional 

GOST and this prefers the proposal. 

Table 6.  Hamming distance 

Hamming distance Traditional GOST Proposed Approach 

0.2692 0.2884 

 

Entropy must be given by the cipher to be injected into the plain text of a message 

in order to neutralize the amount of structure that is present in the unsecured plain text 

message. How this is calculated depends on the cipher. According to table 7, entropy 

of the proposed approach is greater (secure) and better than traditional GOST. 

Table 7.  Entropy 

Entropy Traditional GOST Proposed Approach 

3.3669 3.4298 

 

The power of cryptography lies in the choosing of keys, which are secret parame-

ters used in encryption. An intruder should not be able to guess the key. Chaotic sys-

tems are highly adaptive and the best characteristics of the system’s initial conditions 

and parameters. Being sensitive implies that the chaotic system’s every point is ap-

proximated arbitrarily by other points with considerably different potential directions 

or paths. Thus, an arbitrarily small shift or disruption in the current path will lead to 

194 http://www.i-jim.org



Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

dramatically different future behavior. The best randomness chaotic keys of proposed 

approach is generated at x0=2.1, y0=0.5, z0=1.1, k0=1.1and p0=0.1, as shown below: 

 

Any changing in values of initial state that will be giving different keys don’t get 

the required randomness, as example lets changing one of the initial condition like x0 

to 0.5 and y0=0.500001, the keys that generated is shown below:  

 

9 Conclusion 

Speed and a reliable cryptography system for applications are usually very desira-

ble. In this paper, the WoT encryption/decryption efficient algorithm is implemented 

according to GOST and novel 5D chaotic systems, and the results achieved following 

the implementation of the proposed algorithm shown in fig.4 illustrating the chaotic-

cryptographic existence of the proposed method and showing chaotic behavior. The 

limitation of the GOST algorithm is simple key scheduling so that, in some cases, it is 

the weak point of the cryptanalysis process as related-key cryptanalysis. Even so, it is 

solved by the proposed approach by moving the GOST keys to the chaotic system has 

the perfect mixture and greater security of robustness. Its need for 2256 probable keys 

to breaking keys that are not to be used for brute force attack due to its awkward  

procedure in this case. NIST fifteen statistical tests and statistical analysis (hamming 

distance and entropy) have already successfully exceeded the randomness of the  

proposed approach. The proposed 5-dimension (5D) chaotic system was tested and 

pass and get a super chaotic system (5 positive Lyapunov). 

iJIM ‒ Vol. 15, No. 02, 2021 195



Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

10 References 

[1] Aljazaery Ibtisam A, Alrikabi Haider Th Salim, and Aziz Mustafa Rabea, “Combination of 

Hiding and Encryption for Data Security,” International Journal of Interactive Mobile 

Technologies, vol. 14, no. 9, pp. 34-47, 2020. https://doi.org/10.3991/ijim.v14i09.14173 

[2] J. M. Amigó, L. Kocarev, and J. Szczepanski, “Theory and practice of chaotic 

cryptography,” Phys. Lett. Sect. A Gen. At. Solid State Phys., vol. 366, no. 3, pp. 211–216, 

2007, https://doi.org/10.1016/j.physleta.2007.02.021. 

[3] Mohammed Bahaa, Chisab Raad, and Alrikabi Haider, “Efficient RTS and CTS 

Mechanism Which Save Time and System Resources,” International Journal of Interactive 

Mobile Technologies, vol. 14, no. 4, pp. 204-211, 2020. https://doi.org/10.3991/ijim.v14 

i04.13243 

[4] M. S. Al-Ani, “Efficient Image Encryption Approach Based on Chaos Technique,” IOSR 

J. Electr. Electron. Eng., vol. 12, no. 03, pp. 54–60, 2017, https://doi.org/10.9790/1676-

1203025460. 

[5] Alseelawi Nawar S, Adnan Enas K, Hazim Hussein T, Alrikabi Haider, and Nasser Khalid, 

"Design and Implementation of an E-learning Platform Using N-Tier Architecture," 

International Journal of Interactive Mobile Technologies, vol. 14, no. 6, pp. 171-185, 

2020. https://doi.org/10.3991/ijim.v14i06.14005 

[6] R. Matthews, “On the derivation of a ‘chaotic’ encryption algorithm,” Cryptologia, vol. 13, 

no. 1, pp. 29–42, 1989. https://doi.org/10.1080/0161-118991863745 

[7] P.-L. Carmen and L.-R. Ricardo, “Notions of Chaotic Cryptography: Sketch of a Chaos 

Based Cryptosystem,” Appl. Cryptogr. Netw. Secur., 2012, https://doi.org/10.5772/36419. 

[8] M. W. Habiby and D. Lestari, “Cryptography System for Information Security Using 

Chaos Arnold ‘ s Cat Map Function,” ICRIEMS Proc., pp. 61–66, 2017. 

[9] I. Jabbar, “Using Fully Homomorphic Encryption to Secure Cloud Computing,” Internet 

Things Cloud Comput., vol. 4, no. 2, p. 13, 2016, https://doi.org/10.11648/j.iotcc.20160 

402.12. 

[10] I. Jabbar and S. N. Alsaad, “Design and implementation of secure remote e-voting system 

using homomorphic encryption,” Int. J. Netw. Secur., vol. 19, no. 5, pp. 694–703, 2017, 

doi: 10.6633/IJNS.201709.19(5).06. 

[11] H. Najm, H. K. Hoomod, and R. Hassan, “A proposed hybrid cryptography algorithm 

based on GOST and salsa (20),” Period. Eng. Nat. Sci., vol. 8, no. 3, pp. 1829–1835, 2020, 

[Online]. Available: http://pen.ius.edu.ba/index.php/pen/article/view/1619 . 

[12] M. Salih Mahdi and N. Flaih Hassan, “a Suggested Super Salsa Stream Cipher,” Iraqi J. 

Comput. Informatics, vol. 44, no. 2, pp. 1–6, 2018, https://doi.org/10.25195/2017/4422. 

[13] M. S. Mahdi and N. F. Hassan, “Design of keystream Generator utilizing Firefly 

Algorithm,” J. Al-Qadisiyah Comput. Sci. Math., vol. 10, no. 3, pp. 91–99, 2018, 

https://doi.org/10.29304/jqcm.2018.10.3.441. 

[14] M. S. Mahdi, “Proposed Secure Internet of Everything ( IoE ) in Health Care,” 2018. 

[15] A.-M. G. Mohammed Salih Mahdi, Yaser M. Abid, Alaa Hamza Omran, “A NOVEL 

AIDED DIAGNOSIS SCHEMA FOR COVID 19 USING CONVOLUTION NEURAL 

NETWORK,” 5th Int. Conf. Adv. Technol. Appl. Sci. 6th Malaysia-japan Jt. Int. Conf., 

2020. 

196 http://www.i-jim.org

https://doi.org/10.3991/ijim.v14i09.14173
https://doi.org/10.1016/j.physleta.2007.02.021
https://doi.org/10.3991/ijim.v14i04.13243
https://doi.org/10.3991/ijim.v14i04.13243
https://doi.org/10.9790/1676-1203025460
https://doi.org/10.9790/1676-1203025460
https://doi.org/10.3991/ijim.v14i06.14005
https://doi.org/10.1080/0161-118991863745
https://doi.org/10.5772/36419
https://doi.org/10.11648/j.iotcc.20160402.12
https://doi.org/10.11648/j.iotcc.20160402.12
http://pen.ius.edu.ba/index.php/pen/article/view/1619
https://doi.org/10.25195/2017/4422
https://doi.org/10.29304/jqcm.2018.10.3.441


Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

[16] M. S. Mahdi, “Computer Aided Diagnosis System for Breast Cancer using ID3 and SVM 

Based on Slantlet Transform,” Qalaai Zanist J., vol. 2, pp. 142–148, 2017. https://doi.org/ 

10.25212/lfu.qzj.2.2.16 

[17] Q. Lawande, B. Ivan, and S. Dhodapkar, “Chaos based cryptography: a new approach to 

secure communications,” BARC Newsl., vol. 258, no. 258, pp. 1–12, 2005. 

[18] Duha Khalid Abdul-Rahman Al-Malah Saad Ibrahim Hamed, Haider TH. Salim 

ALRikabi, "The Interactive Role Using the Mozabook Digital Education Application and 

its Effect on Enhancing the Performance of eLearning," International Journal of Emerging 

Technologies in Learning (iJET), vol. 15, no. 20, pp. 21-41, 2020. https://doi.org/10.3991/ 

ijet.v15i20.17101 

[19] H. K. Tayyeh, M. S. Mahdi, and A. S. A. AL-Jumaili, “Novel steganography scheme using 

Arabic text features in Holy Quran,” Int. J. Electr. Comput. Eng., vol. 9, no. 3, pp. 1910–

1918, 2019, https://doi.org/10.11591/ijece.v9i3.pp1910-1918. 

[20] M. S. Mahdi and N. F. Hassan, “A Proposed Lossy Image Compression based on 

Multiplication Table,” Kurdistan J. Appl. Res., vol. 2, no. 3, pp. 98–102, 2017, https://doi. 

org/10.24017/science.2017.3.34. 

[21] M. Barakat, C. Eder, and T. Hanke, “An Introduction to Cryptography,” 2018. 

[22] A. Kadhim and M. Salih, “Proposal of New Keys Generator for DES Algorithms 

Depending on Multi Techniques,” Eng. Technol. J., vol. 32, no. 1 Part (B) Scientific, pp. 

94–106, 2014. 

[23] D. R. A. Kadhim and T. M. Salih, “Proposal Dynamic Keys Generator for DES 

algorithms,” Islam. Coll. Univ. J., vol. 9, no. 29, pp. 25–48, 2014. 

[24] H. Najm, H. Ansaf, and O. A. Hassen, “An Effective Implementation of Face Recognition 

Using Deep Convolutional Network,” J. Southwest Jiaotong Univ., vol. 54, no. 5, 2019. 

https://doi.org/10.35741/issn.0258-2724.54.5.29 

[25] H. Najm, H. K. Hoomod, and R. Hassan, “Intelligent Internet of Everything ( IOE ) Data 

Collection for Health Care Monitor System,” vol. 29, no. 4, pp. 2341–2350, 2020. 

[26] H. Ansaf, H. Najm, J. M. Atiyah, and O. A. Hassen, “Improved Approach For 

Identification Of Real And Fake Smile Using Chaos Theory And Principal Component 

Analysis,” J. Southwest Jiaotong Univ., vol. 54, no. 5, 2019. https://doi.org/10.35741/ 

issn.0258-2724.54.5.20 

[27] N. T. Courtois, “Feistel Schemes and Bi-linear Cryptanalysis,” Crypto 2004, no. Cc, pp. 

23–40, 2004. https://doi.org/10.1007/978-3-540-28628-8_2 

[28] G. S. Oreku, J. Li, T. Pazynyuk, and F. J. Mtenzi, “Modified S-box to Archive Accelerated 

GOST,” vol. 7, no. 6, pp. 88–98, 2007. 

[29] B. W. Aboshosha, M. M. Dessouky, and R. A. Ramadan, “Enhanced Version of GOST 

Cryptosystem for Lightweight Applications,” no. July, 2019. 

[30] A. Biryukov and and L. Perrin, “State of the Art in Lightweight Symmetric 

Cryptography.” 

[31] A. Sciences, Springer Encyclopedia of Cryptography and Security, no. March. 2016. 

[32] L. Khelladi, Y. Challal, A. Bouabdallah, and N. Badache, “On security issues in embedded 

systems: Challenges and solutions,” Int. J. Inf. Comput. Secur., vol. 2, no. 2, pp. 140–174, 

2008, https://doi.org/10.1504/ijics.2008.018515. 

iJIM ‒ Vol. 15, No. 02, 2021 197

https://doi.org/10.25212/lfu.qzj.2.2.16
https://doi.org/10.25212/lfu.qzj.2.2.16
https://doi.org/10.3991/ijet.v15i20.17101
https://doi.org/10.3991/ijet.v15i20.17101
https://doi.org/10.11591/ijece.v9i3.pp1910-1918
https://doi.org/10.24017/science.2017.3.34
https://doi.org/10.24017/science.2017.3.34
https://doi.org/10.35741/issn.0258-2724.54.5.29
https://doi.org/10.35741/issn.0258-2724.54.5.20
https://doi.org/10.35741/issn.0258-2724.54.5.20
https://doi.org/10.1007/978-3-540-28628-8_2
https://doi.org/10.1504/ijics.2008.018515


Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

[33] O. M. Al-Hazaimeh, M. F. Al-Jamal, N. Alhindawi, and A. Omari, “Image encryption 

algorithm based on Lorenz chaotic map with dynamic secret keys,” Neural Comput. Appl., 

vol. 31, no. 7, pp. 2395–2405, 2019, https://doi.org/10.1007/s00521-017-3195-1. 

[34] M. S. Mahdi, R. A. Azeez, and N. F. Hassan, “A proposed lightweight image encryption 

using ChaCha with hyperchaotic maps,” no. November, 2020. 

[35] E. Mosekilde, Z. T. Zhusubaliyev, V. N. Rudakov, and E. A. Soukhterin, “Bifurcation 

analysis of the Henon map,” Discret. Dyn. Nat. Soc., vol. 5, no. 3, pp. 203–221, 2000, 

https://doi.org/10.1155/s1026022600000534. 

[36] R. R. Kumar, A. Sampath, and P. Indumathi, “Enhancement and Analysis of Chaotic 

Image Encryption Algorithms,” Technology, pp. 143–153, doi: 10.5121/csit.2011.1215. 

[37] J. De Dieu Nkapkop, J. Y. Effa, M. Borda, L. Bitjoka, and A. Mohamadou, “A secure and 

fast chaotic encryption algorithm using the true accuracy of the computer,” Inform., vol. 

40, no. 4, pp. 437–445, 2016, doi: 10.31449/inf.v40i4.1118. 

[38] W. Yao et al., “A fast color image encryption algorithm using 4-pixel feistel structure,” 

PLoS One, vol. 11, no. 11, pp. 1–30, 2016, https://doi.org/10.1371/journal.pone.0165937. 

[39] Z. Elhadj and J. C. Sprott, “A two-dimensional discrete mapping with C∞ multifold 

chaotic attractors,” Electron. J. Theor. Phys., vol. 5, no. 17, pp. 107–120, 2008. 

[40] A. Akgül, S. Kaçar, B. Aricioglu, and I. Pehlivan, “Text encryption by using one-

dimensional chaos generators and nonlinear equations,” ELECO 2013 - 8th Int. Conf. 

Electr. Electron. Eng., no. November, pp. 320–323, 2013, https://doi.org/10.1109/eleco.20 

13.6713853. 

[41] H. M. Al-Mashhadi, H. B. Abdul wahab, and R. Hassan, “Chaotic Encryption Scheme for 

Wireless Sensor Network’s Message,” World Symp. Comput. Networks Inf. Secur., no. 

June, 2014. 

[42] X. Huang, “A New Digital Image Encryption Algorithm Based on 4d Chaotic System,” 

Int. J. Pure Appl. Math., vol. 80, no. 4, 2012. 

[43] T. Gao and Z. Chen, “A new image encryption algorithm based on hyper-chaos,” Phys. 

Lett. Sect. A Gen. At. Solid State Phys., vol. 372, no. 4, pp. 394–400, 2008, https://doi.org/ 

10.1016/j.physleta.2007.07.040. 

[44] Y. Zhang, “Comments on ‘an image encryption scheme with a pseudorandom permutation 

based on chaotic maps,’” Proc. 2011 Cross Strait Quad-Regional Radio Sci. Wirel. 

Technol. Conf. CSQRWC 2011, vol. 2, no. July 2011, pp. 1251–1255, 2011, https://doi. 

org/10.1109/csqrwc.2011.6037190. 

[45] H. Ogras and M. Turk, “Digital Image Encryption Scheme using Chaotic Sequences with a 

Nonlinear Function,” vol. 6, no. 7, pp. 885–888, 2012. 

[46] L. Bénéteau, D. Fournier-Prunaret, V. Guglielmi, P. Pinel, S. Rouabhi, and A. K. Taha, 

“Two encryption schemes using the chaotic dynamics of two-dimensional noninvertible 

maps,” NDES ‘02 Nonlinear Dyn. Electron. Syst. Izmir, Turquie, pp. 21–23, 2002. 

[47] R. Hucka, “A Ciphering Algorithm Based on Discrete Chaotic Map,” Dept. Radio 

Electron. Brno Univ. Technol., pp. 87–90, 2007. 

[48] J. Rokan Naif, G. H. Abdul-majeed, and A. K. Farhan, “Internet of Things Security using 

New Chaotic System and Lightweight AES,” J. Al-Qadisiyah Comput. Sci. Math., vol. 11, 

no. 2, pp. 45–52, 2019, https://doi.org/10.29304/jqcm.2019.11.2.571 

198 http://www.i-jim.org

https://doi.org/10.1007/s00521-017-3195-1
https://doi.org/10.1155/s1026022600000534
https://doi.org/10.1371/journal.pone.0165937
https://doi.org/10.1109/eleco.2013.6713853
https://doi.org/10.1109/eleco.2013.6713853
https://doi.org/10.1016/j.physleta.2007.07.040
https://doi.org/10.1016/j.physleta.2007.07.040
https://doi.org/10.1109/csqrwc.2011.6037190
https://doi.org/10.1109/csqrwc.2011.6037190
https://doi.org/10.29304/jqcm.2019.11.2.571


Paper—A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System 

11 Authors 

Hayder Najm is received his B.E degree in computer science from University of 

Technology in 2011, received his M.S.C degree in computer science from University 

of Technology in 2014, and currently he is Ph.D student in computer science from 

University of Technology in 2020. He is currently working at Imam Al-kadhum Col-

lege (IKC), Computer Technique Engineering Department, Wasit, Iraq. E.mail: 

cs.19.87@grad.uotechnology.edu.iq, haidernajem@alkadhum-col.edu.iq. 

Assist. Prof. Dr. Haider K. Hoomod is received his BS.C degree in Electrical 

Engineering from university of Technology in 1996. Received M.Sc. degree in Com-

puter Science from Iraqi Commission for Computers and Informatics \Informatic 

Institute for Postgraduate Studies in 2002. Received Ph.D. Degree in Computer Sci-

ence from Iraqi Commission for Computers and Informatics \Informatic Institute for 

Postgraduate Studies in 2008. Email: drhjnew@gmail.com 

Assist. Prof. Dr.Rehab Hassan Fleah Kadhim is received her B.E degree in 

computer science from University of Technology in 1989, received her M.S.C degree 

in computer science from University of Technology in 1995, and received her 

Ph.D.degree in computer science from University of Technology in 2005. She is cur-

rently working in University of Technology/ Iraq–Baghdad. Email: 110019@ 

uotechnology.edu.iq. 

Article submitted 2020-10-20. Resubmitted 2020-11-26. Final acceptance 2020-11-26. Final version 

published as submitted by the authors 

iJIM ‒ Vol. 15, No. 02, 2021 199

mailto:cs.19.87@grad.uotechnology.edu.iq
mailto:haidernajem@alkadhum-col.edu.iq
mailto:drhjnew@gmail.com
mailto:110019@uotechnology.edu.iq
mailto:110019@uotechnology.edu.iq