Abstract

The evolution of the metaverse necessitates inventive solutions that can uphold data security. In this paper, we present a novel approach that seamlessly integrates blockchain and substitution cipher techniques to enhance the security landscape of the metaverse. The proposed approach encompasses the generation of the rule table for substitution encryption and decryption, as well as a methodology for data encryption and decryption utilizing the rule table. Furthermore, we conducted a comprehensive evaluation of the proposed approach’s security robustness, especially focusing on its resistance against potential security attacks, including the brute-force attack. Moreover, a series of performance experiments were meticulously conducted to comprehensively gauge the effectiveness and efficiency of the proposed technique. The findings revealed that the proposed approach outperforms asymmetric key algorithms in terms of encryption elapsed time. Additionally, the decryption process of the proposed approach is notably faster than both symmetric and asymmetric key algorithms. The results of security analysis and performance evaluations underscore the viability and efficiency of the proposed approach, positioning it as a promising solution for secure and swift data management within the metaverse environment.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call