{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T20:17:48Z","timestamp":1770149868375,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T00:00:00Z","timestamp":1707782400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T00:00:00Z","timestamp":1707782400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s13198-024-02253-7","type":"journal-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T16:21:18Z","timestamp":1707841278000},"page":"2391-2400","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["SSKA: secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication"],"prefix":"10.1007","volume":"15","author":[{"given":"Rupayan","family":"Das","sequence":"first","affiliation":[]},{"given":"Angshuman","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0346-2150","authenticated-orcid":false,"given":"Rajeev","family":"Arya","sequence":"additional","affiliation":[]},{"given":"Boykuziev","family":"Ilkhom","sequence":"additional","affiliation":[]},{"given":"Abdurakhimov","family":"Bakhtiyor","sequence":"additional","affiliation":[]},{"given":"Nuriddin","family":"Safoyev","sequence":"additional","affiliation":[]},{"given":"Zarif","family":"Khudoykulov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,13]]},"reference":[{"key":"2253_CR1","doi-asserted-by":"publisher","first-page":"203747","DOI":"10.1109\/ACCESS.2020.3036589","volume":"8","author":"B Aboushosha","year":"2020","unstructured":"Aboushosha B, Ramadan RA, Dwivedi AD, El-Sayed A, Dessouky MM (2020) SLIM: a lightweight block Cipher for internet of health things. IEEE Access 8:203747\u2013203757. https:\/\/doi.org\/10.1109\/ACCESS.2020.3036589","journal-title":"IEEE Access"},{"key":"2253_CR2","doi-asserted-by":"publisher","unstructured":"Alexandrovna IE, Klimentievna BL (2017) New results in a research of GOST R 34.12-2015. In: 2017 IEEE 11th international conference on application of information and communication technologies (AICT), pp 1-5, https:\/\/doi.org\/10.1109\/ICAICT.2017.8686920","DOI":"10.1109\/ICAICT.2017.8686920"},{"issue":"10","key":"2253_CR3","doi-asserted-by":"publisher","first-page":"2194","DOI":"10.1587\/transfun.E98.A.2194","volume":"E98","author":"R Altawy","year":"2015","unstructured":"Altawy R, Youssef AM (2015) A meet in the middle attack on reduced round Kuznyechik. IEICE Trans Fundam Electron Commun Comput Sci E98(10):2194\u20132198. https:\/\/doi.org\/10.1587\/transfun.E98.A.2194","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"2253_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100703","volume":"22","author":"Z Ashraf","year":"2023","unstructured":"Ashraf Z, Sohail A, Yousaf M (2023) Robust and lightweight symmetric key exchange algorithm for next-generation IoE. Internet of Things 22:100703. https:\/\/doi.org\/10.1016\/j.iot.2023.100703","journal-title":"Internet of Things"},{"issue":"1","key":"2253_CR5","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1812\/1\/012034","volume":"1812","author":"LK Babenko","year":"2021","unstructured":"Babenko LK, Tolomanenko EA (2021) Development of algorithms for data transmission in sensor networks based on fully homomorphic encryption using symmetric Kuznyechik algorithm. J Phys Conf Ser IOP Publish 1812(1):012034. https:\/\/doi.org\/10.1088\/1742-6596\/1812\/1\/012034","journal-title":"J Phys Conf Ser IOP Publish"},{"key":"2253_CR6","doi-asserted-by":"publisher","unstructured":"Banik S, Bao Z, Isobe T, Kubo H, Liu F, Minematsu K, Sakamoto K, Shibata N, Shigeri M (2021) \u201cWARP : Revisiting GFN for Lightweight 128-Bit Block Cipher\u201d, In: Dunkelman, O., Jacobson, Jr., M.J., O\u2019Flynn, C. (eds) Selected Areas in Cryptography. SAC 2020. Lecture notes in computer science, 12804, 535-564, https:\/\/doi.org\/10.1007\/978-3-030-81652-0_21","DOI":"10.1007\/978-3-030-81652-0_21"},{"key":"2253_CR7","doi-asserted-by":"publisher","unstructured":"Boldyreva A, Goyal V, Kumar V (2008) Identity-based encryption with efficient revocation. In: CCS \u201908: Proceedings of the 15th ACM conference on computer and communications security, pp 417-426. https:\/\/doi.org\/10.1145\/1455770.1455823","DOI":"10.1145\/1455770.1455823"},{"issue":"1\u20132","key":"2253_CR8","first-page":"1","volume":"52","author":"R Das","year":"2022","unstructured":"Das R, Dash D (2022) A comprehensive survey on mobile sink-based data gathering schemes in WSNs. Adhoc Sens Wirel Netw Old city 52(1\u20132):1\u201343","journal-title":"Adhoc Sens Wirel Netw Old city"},{"key":"2253_CR9","doi-asserted-by":"publisher","unstructured":"Das R et al (2016) Performance analysis of various attacks under AODV in WSN & MANET using OPNET 14.5\" IEEE 7th annual ubiquitous computing, Electronics & mobile communication conference (UEMCON). New York, NY, USA pp 1\u20139. https:\/\/doi.org\/10.1109\/UEMCON.2016.7777831","DOI":"10.1109\/UEMCON.2016.7777831"},{"key":"2253_CR10","doi-asserted-by":"publisher","first-page":"3555","DOI":"10.1007\/s41870-023-01407-3","volume":"15","author":"M Deshmukh","year":"2023","unstructured":"Deshmukh M, Rawat AS (2023) Lightweight symmetric key encryption for text using XOR operation and permutation matrix. Int J Inf Tecnol 15:3555\u20133562. https:\/\/doi.org\/10.1007\/s41870-023-01407-3","journal-title":"Int J Inf Tecnol"},{"key":"2253_CR11","doi-asserted-by":"publisher","unstructured":"Gessner D, Olivereau A, Segura AS, Serbanati A (2012) Trustworthy infrastructure services for a secure and privacy-respecting internet of things. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications, liverpool, UK, pp 998-1003. https:\/\/doi.org\/10.1109\/TrustCom.2012.286","DOI":"10.1109\/TrustCom.2012.286"},{"issue":"3","key":"2253_CR12","doi-asserted-by":"publisher","DOI":"10.1088\/2631-8695\/ace58f","volume":"5","author":"B Ilkhom","year":"2023","unstructured":"Ilkhom B, Khan A, Bakhtiyor A, Das R, Khudoykulov Z (2023) Integral cryptanalysis: a new key determination technique for 3-phase Kuznyechik encryption. Eng Res Express 5(3):035018. https:\/\/doi.org\/10.1088\/2631-8695\/ace58f","journal-title":"Eng Res Express"},{"key":"2253_CR13","doi-asserted-by":"publisher","unstructured":"Ishchukova E, Babenko L, Anikeev M (2016) Fast implementation and cryptanalysis of GOST R 34.12-2015 block ciphers. In: 2016 ACM 9th international conference on security of information and networks (SIN\u2019 16), New York, USA, pp 104-111. https:\/\/doi.org\/10.1145\/2947626.2947657","DOI":"10.1145\/2947626.2947657"},{"key":"2253_CR14","doi-asserted-by":"publisher","unstructured":"Ishchukova E, Babenko L, Anikeev M (2017) Two simplified versions of Kuznyechik cipher (GOST R 34.12-2015). In: 2017 ACM 10th international conference on security of information and networks (SIN\u2019 17), Association for Computing Machinery, New York, NY, USA, 2017, pp. 287-290. https:\/\/doi.org\/10.1145\/3136825.3136856","DOI":"10.1145\/3136825.3136856"},{"issue":"5","key":"2253_CR15","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TSC.2016.2520932","volume":"10","author":"J Li","year":"2017","unstructured":"Li J, Yao W, Zhang Y, Qian H, Han J (2017) Flexible and fine-grained attribute-based data storage in cloud computing. IEEE Trans Serv Comput 10(5):785\u2013796. https:\/\/doi.org\/10.1109\/TSC.2016.2520932","journal-title":"IEEE Trans Serv Comput"},{"issue":"4","key":"2253_CR16","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MC.2013.74","volume":"46","author":"H Ning","year":"2013","unstructured":"Ning H, Liu H, Yang LT (2013) Cyberentity security in the internet of things. Computer 46(4):46\u201353. https:\/\/doi.org\/10.1109\/MC.2013.74","journal-title":"Computer"},{"key":"2253_CR17","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-0-387-76481-8_14","volume-title":"RFID Security","author":"C Paar","year":"2008","unstructured":"Paar C, Poschmann A, Robshaw MJB (2008) New designs in lightweight symmetric encryption. In: Kitsos P, Zhang Y (eds) RFID Security. Springer, Boston, MA, pp 349\u2013371. https:\/\/doi.org\/10.1007\/978-0-387-76481-8_14"},{"issue":"2","key":"2253_CR18","doi-asserted-by":"publisher","first-page":"293","DOI":"10.3390\/sym11020293","volume":"11","author":"S Rajesh","year":"2019","unstructured":"Rajesh S, Paul V, Menon VG, Khosravi MR (2019) A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 11(2):293. https:\/\/doi.org\/10.3390\/sym11020293","journal-title":"Symmetry"},{"issue":"8","key":"2253_CR19","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1615\/TelecomRadEng.2021041203","volume":"80","author":"PS Rathore","year":"2021","unstructured":"Rathore PS, Sarkar MK, Das R (2021) A comprehensive review on secure and energy aware multi-hop routing in clustering based wireless sensor network. Telecommun Radio Eng 80(8):13\u201337. https:\/\/doi.org\/10.1615\/TelecomRadEng.2021041203","journal-title":"Telecommun Radio Eng"},{"key":"2253_CR20","doi-asserted-by":"publisher","unstructured":"Sen S et al (2019) Encryption in MicroSD card reader or USB data storage devices. In: 9th annual information technology, Electromechanical Engineering and Microelectronics Conference (IEMECON). Jaipur, India pp 232\u2013236. https:\/\/doi.org\/10.1109\/IEMECONX.2019.8877012","DOI":"10.1109\/IEMECONX.2019.8877012"},{"key":"2253_CR21","doi-asserted-by":"publisher","unstructured":"Sharma R et al (2018) USB level data security using cryptographic approach. In: IEEE 8th annual computing and communication workshop and conference (CCWC). Las Vegas, NV, USA pp 861\u2013866. https:\/\/doi.org\/10.1109\/CCWC.2018.8301636","DOI":"10.1109\/CCWC.2018.8301636"},{"issue":"2","key":"2253_CR22","doi-asserted-by":"publisher","first-page":"64","DOI":"10.9790\/0661-16236471","volume":"16","author":"RS Singh","year":"2015","unstructured":"Singh RS, Das R, Mukherjee D (2015) RDR cube Cipher an extension to Vigenere Cipher. IOSR J Comput Eng (IOSR-JCE) 16(2):64\u201371","journal-title":"IOSR J Comput Eng (IOSR-JCE)"},{"key":"2253_CR23","doi-asserted-by":"publisher","unstructured":"Singh M, Das R, Sarkar MK, Majumder K, Sarkar SK (2015) KT3F: A key-based two-tier trust management filtering scheme for intrusion detection in wireless sensor network. In: Proceedings of the second international conference on computer and communication technologies: IC3T 2015, vol 1, pp 679-690, https:\/\/doi.org\/10.1007\/978-81-322-2517-1_65","DOI":"10.1007\/978-81-322-2517-1_65"},{"issue":"1","key":"2253_CR24","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3390\/sym12010073","volume":"12","author":"B Stoyanov","year":"2020","unstructured":"Stoyanov B, Nedzhibov G (2020) Symmetric key encryption based on rotation-translation equation. Symmetry 12(1):73. https:\/\/doi.org\/10.3390\/sym12010073","journal-title":"Symmetry"},{"key":"2253_CR25","doi-asserted-by":"publisher","unstructured":"Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a Review. In: 2012 international conference on computer science and electronics engineering, Hangzhou, China, pp 648-651, https:\/\/doi.org\/10.1109\/ICCSEE.2012.373","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"2253_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.48550\/arXiv.1704.08688","volume":"8","author":"M Usman","year":"2018","unstructured":"Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2018) SIT: a lightweight encryption algorithm for secure internet of things. Int J Adv Comput Sci Appl 8:1. https:\/\/doi.org\/10.48550\/arXiv.1704.08688","journal-title":"Int J Adv Comput Sci Appl"},{"key":"2253_CR27","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/s11071-010-9821-4","volume":"63","author":"X Wang","year":"2011","unstructured":"Wang X, Wang X, Zhao J, Zhang Z (2011) Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn 63:587\u2013597. https:\/\/doi.org\/10.1007\/s11071-010-9821-4","journal-title":"Nonlinear Dyn"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-024-02253-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-024-02253-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-024-02253-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T16:18:58Z","timestamp":1718381938000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-024-02253-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,13]]},"references-count":27,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2253"],"URL":"https:\/\/doi.org\/10.1007\/s13198-024-02253-7","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,13]]},"assertion":[{"value":"5 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}