1 Introduction

Medical care might be characterized as the demonstration of taking protection or important techniques to improve an individual’s prosperity. This might be finished with a medical procedure, medication, or different adjustments in an individual’s way of life. These administrations are ordinarily given by doctors through a medical care framework. At the point of COVID-19, when these are administered through Internet empowered hubs in the form of E-Health [1, 51]. Subsequently, patients experiencing non-obtrusive and non-emergency infections might be dealt with distantly. The requirements of social separation, lockdown limitations, night check-in-time, should be kept up by the mass individuals to endeavor against this destructive Corona virus disease. Co-morbid patients are at higher dangers of COVID-19 due to their severe degree of illness. However, through COVID-19 E-Health, such patients can be prudently treated from their protected far off areas at any ounces of time. Additionally, nascomial diseases can be made to invalid and void to such co-morbid remote patients [31, 43]. Because of this novel corona virus, hospitals have migrated towards a “New Normal” of life. Once again the second wave of COVID-19 is hitting different places of the world. In many countries, re-lockdown has been imposed to reduce its transmission effect. Clinics and hospitals have moved from actual meeting modes to virtual conference modes. Patients are urged more to practice the office of virtual counsels with their suitable doctors. Physicians, medical attendants, patients, medical care staffs, and so forth are then less presented to COVID-19 under the umbrella of E-Health. During this pandemic, the latest things in medical services industry are the digitization of medical services frameworks. Their work process has been relocated towards electronic patient records. An electronic record of a patient includes patient’s clinical history like socio-economic health cards, patients’ progress notes, issues and complications, digital prescriptions, past clinical and hospital history, vaccines (perhaps COVISHIELD, Covaxin [53], and so on), research oriented information and radiology reports and so forth. The volume of such clinical information has increased in enormous rate regarding intricacy, variety and flow directions basically during this hyper computerized E-Health of corona virus. Henceforth, information security support is the greatest hindrance observed. A COVID-19 E-Health is treated as great as it protects the patients’ medical information during the public transmission. This paper has proposed a cryptographic system to risen the degrees of information security through neural key generation and secret sharing idea.

Amid COVID-19, E-Health has become a boon in the medical sciences. Apart from invasive and surgery, other formats of treatments are possible through such COVID-19 telemedicine [38, 48]. E-Health best serves the chronic disease management from quarantines likes of bronchial infection, diabetes, hypertension, arthritis, etc. Patients can be treated without getting further exposed to COVID-19. It can provide psychological boosts to the patients and their family in a safe manner without corona virus transmission. It releases the offline patients’ pressure on the district hospitals to a large extent. Thus, larger percentage of patients are being locally treated without the chances of nascomial infections and save of time and costs. But the psychological impact of actual visiting the doctors is not possible through telemedicine. Corona virus infection control is highly achievable through telemedicine which is mandate now. However, data theft on digital transactions is an issue of critical challenge.

2 Background scenario

In the context of global pandemic, psychological downfall is the common complication apart from the physiological complications. There had been huge economic loss incurred in almost everyone’s life. Patients are more psychologically sick in such critical era. Even patients can boost other patients through the digital health system. The different types of E-Health systems were improved by using developed mobile computing and Internet of Things (IoT) [18, 28]. The key feature of such system is that the patients can get their treatment from the health care providers directly from their homes. Patients can communicate with each other that have the same symptoms. They also may form a group for exchanging their illness-related information, treatment experience, diets, medicines and specialist doctor recommendation. Besides, patients may communicate to encourage each other to overcome the disease, regardless of the patients’ locations and conditions. Sometimes, self-confidence and friendly environment are more effective than drugs in patients’ conditions. Such can boost the confidence levels of the patients.

2.1 Role of IoT in electronic medical sciences

Internet of Things (IoT) can be defined as a set of networking technologies that consist of different appliances, devices and electronic gadgets to interact and communicate among themselves. At present different healthcare systems widely use the IoT devices for smooth functioning, monitoring and assessment of patient’s conditions and records. PMD (Personal Medical Devices) are small electronic devices used for monitoring the medical condition of a patient. These Personal Medical Devices (PMDs) are of two types according to its location internal (i.e. inside the patient’s body) or external (i.e. attached to the patients’ body externally). PMDs use a wireless interface to perform communication with a base station that is further used to read status of the device, medical reports, and change parameters of the device, or update status on the device. Unfortunately, the most of these devices and applications are not secure for data or information communication. IoT may be prone to different types of unwanted attacks. The IoT devices are targeted by attackers and intruders. Different types of risks are incurred for such compromised patients. Every health care system should ensure the security of network in order to prevent the privacy of patient from unwanted malicious attacks. To strengthen the sensitive information and other types of security, a proactive, preventive approach and measures must be taken by every healthcare organization with attention to future security and privacy needs.

2.2 Relevance of security and privacy protection in E-health

Security is a most important issue in any healthcare system. The attackers aim is to steal the information, attack on devices to utilize patient’s resources, or may shut down some applications that are monitoring the patient’s condition. There are many types of attacks on medical devices that include eavesdropping and intruding, in which privacy of the patient is leaked and the integrity error in which the message is being altered. The IoT based health care system provides huge benefits in society but it is also prone to different types of unwanted attacks. These types of attacks mainly cause information leakage and loss of services in communication channel. The IoT consists of different types of devices and platforms with different credentials and each device and platforms need security according to their characteristics. In IoT platform, lot of personal medical information is shared among various types of devices so the privacy of user is a vital part in health care system. Hence a secure cryptosystem is needed for the data or information protection.

The different types of IoT attacks are physical attack, network attack, software attack, and encryption attack. In our paper we have emphasized only on encryption attacks such as side channel attacks, cryptanalysis attacks, and man in the middle attacks. The different algorithms in our cryptosystem which are described above provide strong protection mechanism of different encryption attack [37]. The result section of our study proves the robustness of the proposed cryptosystem by using different data, graphs, comparisons etc.

This proposed algorithm works on application model. Here, different types of complex and strong mathematical functions were used and as a result the algorithms when running provides minimum side channel information so that attacker cannot guess the session key. Our scheme also provides confidentiality and integrity by checking authentication at the patient and doctor end.

2.3 Cryptographic science

Cryptographic science is a branch of science that deals with message protection, so that it becomes unreadable by the others, and can be shared in public communication. Different types of encryption and decryption algorithm are invented at regular basis with updated features. Here the plain text is converted into cipher text using an encryption algorithm so that intruders cannot read it, but authorized user i.e. correct recipient can only access it. The decryption algorithm works in the reverse order and converts the cipher text into plain text. Two broad categories of cryptography are: symmetric key cryptography and asymmetric key cryptography with respect to key [49]. To ensure data security any one of these two category algorithm will be used. This paper focuses on symmetric key cryptography. Some of existing symmetric key cryptography methods are IDEA, AES, DES, Triple DES, Blowfish, RC5, RC6, etc. [2, 50]. Symmetry key is the value that is used to combine with original data to generate cipher text. It is independent of the original data.

2.3.1 Online session key

Session key is a unique code that is used at the encryption and decryption process in a data communication session [36]. The compliance of such key usage is immense on any online cryptographic system. Once the data decoding are constrained by session key, then different cryptanalytic intruders’ task becomes more complicated [24, 35]. Secure online transaction systems use One Time Password (OTP) based session key to foster their security features and services. Thus, such systems are better to resist against vulnerable data threats. In COVID-19 E-Health, the session key is very much needful to have online medical transaction by the patients and the doctors.

2.3.2 Secret sharing

Secret sharing is another type of cryptography. Here the entire message is dismantled into multiple pieces termed as shares. No share contains the complete information of the actual file. These shares would be transmitted to different number of receivers. In Shamir’s Secret Sharing Scheme is based on  (n, k) threshold. Here, n is the number of receivers and k is the number of threshold value [47]. In their scheme, a (k − 1) degree polynomial is needed. The polynomial of order (k − 1) is given in the following Eq. 1.

$$ f(x)=\left({p}_0+{p}_1{x}_1+{p}_2{x}_2+{p}_3{x}_3+\dots +{p}_{k-1}{x}_{k-1}\right)\% Num $$
(1)

Here, p0 the secret message to be encrypted and Num is a prime number and all other coefficients were selected randomly from secret message.

2.4 Chaotic system

Chaotic methods have recently used more in the process of encryption. Chaos based frameworks [26, 39] are fundamentally nonlinear in nature and showing an obviously arbitrary conduct for specific scopes of estimations of system boundaries. There are certain numbers of proper reasons to deploy chaotic sequence in the cryptographic engineering. Such may be listed as: controlling parameter, initial condition sensitivity test, non-convergence property, etc. [16, 30, 55]. In any case, the arrangements or directions of the framework stay limited inside the stage space. This insecure state is unequivocally relying upon the estimations of the boundaries and in transit the framework starts.

2.4.1 Logistic map

The logistic map guide [2] is a notable one dimensional chaotic map proposed by R.M. May, addressing a romanticized natural model for portraying yearly variety in the number of inhabitants in a creepy crawly species. The numerical recipe is characterized as given in the following Eq. 2.

$$ K\left(\mathrm{m}+1\right)=\propto \ast \left\{\mathrm{Km}\ast \left(1-\mathrm{Km}\right)\right\}\dots $$
(2)

Here, ∝∈[0,4] is the control boundary and y_0∈[0,1] is the underlying condition [56]. The strategic guide shows acceptable conduct and is often utilized in numerous applications for its tumultuous nature in explicit reach. The hopf bifurcation graph shows the dynamical properties of the strategic guide. The strategic guide shows chaotic nature for ∝∈[3.57, 4.0] and slight varieties of the underlying worth produce significant contrasts in the created arbitrary qualities. This grouping of qualities is non-intermittent in nature. This logistic map is based on chaos theory. Any chaotic function provides random numbers in a specific range. This random numbers can be used in any purposes such as key generation, weight vector generation in ANN etc. In this article we have used this map in key generation process.

2.5 Pell’s equation

Pell’s equation is a Diophantine equation of the form a2 − Kb2 =  ± 1, a,b ∈ Z, where K is a given natural non- square number [24]. It can be found in the following lemma number 1.

Lemma Number 1: For every non-square positive integer K, there are infinite positive integers a and b: such that \( \kern.5em \left|a-\left.\sqrt{K}\ b\right|\right.<\frac{1}{b}. \)

2.5.1 Lagrange’s theorem

For every positive non-square integer K, the equation of the type a2 − Kb2 = 1 has a non-trivial solution. Here we have considered the integer solutions of Pell’s equation. The two integers for a particular K provide a set of numbers for two or more number of K ’ s, which is used for encryption generation in this proposed technique.

2.6 Neural perceptron

A neural perceptron can be viewed as a combination of logical statements to generate an output. Generally, it contains input layer, hidden layer, and output layer. The aim of such neural network is to classify the features from the input signals [3, 15]. A simple perceptron has been shown in the following Fig. 1.

Fig. 1
figure 1

Neural perceptron with 3 inputs

3 Literature survey

This segment reviews the prior works on COVID-19 E-Health on the field of cryptographic science. Keesara S. et al. [34] had proposed to bring telehealth revolution because of COVID-19 in consistence with the patients’ law and security rules. Bindra V. et al. [9] had recommended that pregnant ladies and females can be treated distantly through the telemedicine in COVID-19 period with restricted exposures. Such ladies are more prone to the COVID-19. Whaibeh E. et al. [54] had tended to the telemental wellbeing as a drawn out productive impact in post COVID-19 period as well. During this COVID crisis, mental entanglements have risen dramatically. Patients can be guided through online E-Health frameworks. Telemental wellbeing can be viewed as protected, advantageous, versatile, proficient, and supportable approach to treat such sick patients from their isolates. Zhou X. et al. [57] had expressed the treatment plans for COVID-19 patients ought to be both regarding physiological and mental help for them. Both are similarly significant. Mental treatment may diminish their psychological weights. Be that as it may, in this basic circumstance, patients ought to be treated by the E-Health. It might incorporate email, virtual visit, video calls, calls, and so on. Jnr B.A. [11] had clarified the extreme changes that were made by the wellbeing frameworks to give medicines to the patients in the midst of COVID-19. Medical clinics have reacted well to embrace advanced wellbeing to serve the mankind. Virtual interviews, telemedicine, video call, and so forth are the inescapable parts of the E-Health systems. They have guided the average citizens how to utilize advanced wellbeing in this worldwide Corona virus emergency. Tanaka M.J. et al. [52] had clarified the requirements of telemedicine in the muscular fields. Its rise has been hurried with the beginning of COVID-19. Virtual muscular assessments have become a fundamental part. They have given the rules how such patients distantly be inspected through virtual checking. It improves the treatment methodology and decreases the patients’ openness to the novel corona virus.

Smith A.C. et al. [48] had recalled the significance of telemedicine in the corona virus pandemic by reducing the contact contaminations. They had highlighted the key features needed to make telemedicine into mainstreamed services. It includes strategies to handle acute emergency situations apart from daily services. Making it into proactive mode will generate higher profits to the hospitals in the longer run. Borchert A. et al. [14] had evaluated the risks involved in urology patient consultation. They had evaluated the benefit of triage based consultations to the urologists during a specific COVID-19 time. Christianson J. et al. [17] have studied different obile telemedicine applications and observed that it is safe, reliable, efficient and scalable mode of treating the patients distantly. Such systems help the doctors and patients to reduce the transmission of novel corona virus. Bokolo Anthony Jnr. [11] had provided guidance on the use of telemedicine in this corona virus pandemic. With the emergence of COVID-19, hospitals have shifted more towards telemedicine with low cost treatments. Doctors are finding it as a suitable way to treat the patients in a safer way without any physical contacts. Gillman-Wells et al. [27] had explained the relevance of telemedicine in the context of COVID-19. Doctors have realized the only option to see the patients is through virtual consultations. They had discussed the advantages and next routes to the executed for the greater interests of the patients. Reyad O. et al. [42] had proposed a secured technique of transmission of COVID-19 CT chest images of patients inside real world of transmission. Safe pseudo-random generation codes were used by them in this regard. Statistically they had proved their efficacy of the proposed technique. Boneh D. et al. [12] had provided a comprehensive study on security issues in IoT networks in their work. Various security requirements such as authentication, integrity, confidentiality were discussed in this paper. This paper provides a comparison among different types of attacks, their behavior, and their threat level. These attacks are categorized into four level which are low-level, medium-level, high-level, and extremely high-level attacks and also suggested possible solutions to encounter these attacks. Joshi C. et al. [32] had surveyed various types of healthcare applications based on wireless medical sensor network (WMSN). IoT environment is suitable to implement these applications. Also, the different types of hybrid security techniques were discussed for handling the security issues of healthcare systems. Yen J. C. et al. [56] had proposed an idea on encryption method called BRIE based on chaotic logistic map. The bit recirculation of pixels is the basic principle of BRIE. It is controlled by a chaotic pseudo random binary sequence. The secret key of BRIE consists of two integers and an initial condition of the logistic map. Further, Yen J. C. et al. [56] had proposed an encryption method called CKBA (Chaotic Key Based Algorithm) in which a binary sequence was generated using a chaotic system.]. Kinzel et al. [33] had proposed a protocol to exchange a cryptographic key between the sender and the receiver by learning rules, which was earlier proposed by Diffie and Hellman 1976. Each neural network was fed with same random vector, and they were trained to synchronize their weight vectors. Youssef Harmouch [29] proposed two chaotic pseudorandom number generators CPRNG for key stream. Two CPRNGs showed a good degree of randomization based on NIST statistical test suites, quasi-ideal entropy, good key stream distribution, and good sensitivity to initial conditions, indicating resistance to differential attacks.

3.1 Pros & cons of existing techniques and our proposed technique

In this sub-section, we have presented the advantages and disadvantages of the existing techniques. This has been mentioned in the following Table 1.

Table 1 Advantages and disadvantages over existing techniques

4 Critical issues

Amid COVID-19, patients’ credentials are at higher risks. Due to the high spread of the novel corona disease, patients are not allowed to visit the hospitals physically. With lockdown constraints in different cities, co-morbid patients are also treated distantly. The following points will highlight the critical issues observed during COVID-19 E-Health [1].

  1. 1.

    COVID-19 E-Health is questionable whenever any data provided by the users is misinterpreted by the fraudsters [33].

  2. 2.

    Maintaining the privacy of the patients in the E-Health is the key for global acceptance by the medical professionals and patients. Such confidentiality guidelines must be accommodated.

  3. 3.

    Training the technical support teams is another key aspect in fostering the COVID telemedicine.

  4. 4.

    For any successful COVID-19 E-Health, following parameters are bare essential. They are: Patients’ security, Internet enabled machines, telemedicine Hub, software developments and maintenance [29].

  5. 5.

    E-Health services need extra digital transmission cost for medical transactions [25].

Telemedicine is the emergent technique to covert traditional health is to online health care in this deadly OVID-19 phase. There are different types of more challenges that could exist in COVID-19 E-Health system. Different types of attacks or malicious activity may degrade activity of the medical devices and disrupt the communication system of telemedicine. There are two types of attacks namely Active Attack and Passive Attack. An active attack attempts to alter system resources or affect their operation. A passive attack does not affect system resources but attempts to theft vital information from the system. An attack can be occurred by an insider or from outside of the E-Health organization. Based on the target of the attack, there are mainly three types of attacks are noted in COVID-19 E-Health.

  1. a)

    Attacks against any medical devices related to COVID-19 samples,

  2. b)

    Attacks against the communication between devices and users of E-Health, and

  3. c)

    Attacks against all the users simultaneously.

A common method of attack involves tampering or altering of the messages is the common method of attack. The medical data and information which are transmitted through online environment is very sensitive and vital for treatment. So any changes on these data or information causes risk for the patients.

5 Objectives and novel contributions

The main objective is to foster the patients’ privacy especially during the corona virus pandemic. Such proposed E-Health system will avoiding unnecessary allied costs and time, and provide proper health support and facilities from isolated centers. From the above stated section of critical issues, it has been vividly significant that the security fostering to the COVID-19 E-Health system is an immediate mandate. The patients’ confidential data are under threat of intruding in the overwhelmed online medical transactions. In this article a new cryptographic system has been proposed with the following things as novel contributions.

Artificial neural network has been used to generate the session key. Based on modified logistic map, an intermediate key has been proposed. Our proposed modified logistic map can be found in the following Eq. 3.

$$ \kern0.5em {x}_{n+1}=R\ast {x}_n\left(1.02-{x}_n^2\right)\left(1.02-{x}_n\right)\dots $$
(3)

Here, R is the control parameter with R∈[0.01, 4.31] and x0 is the initial condition with x0 ∈ [0.01, 1.302]. Chaotic graphs has been discussed in the later section. Strict lossless secret sharing has been proposed on the patients’ data. The property of no data loss satisfied the proposed secret sharing. Electing the head among the multiple receivers has been done here too. An encryption along with share encapsulation has been done on all the secret shares.

6 Proposed flow diagram

The following Fig. 2 illustrates the flow of the proposed cryptographic technique in COVID-19 telemedicine.

Fig. 2
figure 2

Flow diagram of the proposed technique

In brief, the above stated diagram may be discussed as follows. In the first step of neural perceptron, the key length will be inputted and corresponding session key will be formed. Next step is the intermediate key generation. Here, a random number will act as input, and an intermediate key will be generated through modified logistic map. In the next phase of lossless secret sharing, the number of recipients will be taken as input field, and corresponding equivalent number of secret shares will be created through our proposed technique. The election of the polling head module will elect a recipient as head. Here, the arrival times of each recipient will be considered as its input. The next step is the encryption and decryption. Here, the session key, intermediate key, and the plain message are considered as inputs. The output is the cipher text of the plain text. The final step of the proposed model is the share encapsulation. The inputs are session key, intermediate key, and plain text for this phase and the output are structured encapsulated shares through our technique.

7 Proposed work

To cope up the security issues on the contemporary COVID-19, cryptographic science is the best plan to have more reliable data security in the light of patients’ private medical data. In this article, a scientific cryptographic approach has been proposed by a hybrid combination of neural networks and secret sharing. It may work against myriad security codes during “New Normal” online COVID-19 E-Health. This proposed technique has been dismantled into six sub-modules which are mentioned below.

  1. 1.

    Neural Session Key Generation − PSKG( ) // Perceptron Based

  2. 2.

    Logistic Intermediate Key Generation – INTMKG ( ) // Modified Logistic Map Based

  3. 3.

    Strict Secret Share Generation – SECRETSHARES( ) // Strictly Lossless Based

  4. 4.

    Appointment of Head Recipients - Polling Head ( ) // Electing Polling Head

  5. 5.

    Patients’ Info Encryption & Decryption – ENCRYPT & Decrypt( ) // Encryption and Decryption Operations

  6. 6.

    Share Encapsulation – ENCAPSULE( ) // Encapsulation of Secret Shares

This protocol is described below by a compact algorithm with modular effects in the following algorithm 1. Two proposed set of keys were generated named as session key and intermediate key. First key has been derived by the neural perceptron and the later has been developed by modifying the chaotic map [4]. An impact of secret sharing has been proposed on the patients’ data and that too having much less time complexity with respect to classical secret sharing schemes. Electing the head of the recipients has also been proposed here. Encapsulations of secret shares have been proposed on K number of recipients.

figure d

Here weight vectors (WeightNext) are required session key which is used in encryption decryption process.

figure e

The above algorithm provides the values for intermediate key generation. The logistic map is based on chaos theory. So using logistic map we have generated random numbers key formation. In above Step2 xn + 1 provides the required intermediate key.

figure f
figure g
figure h
figure i

8 Result section

The above algorithms were implemented in latest version of Python in a PC of Intel Core i9 (tenth generation) processor, operating system of Microsoft Windows 10 × 64, 16GB RAM and 2 TB internal secondary storage. In the following sections, simulated results of the proposed cryptographic technique have been illustrated.

8.1 Efficacy of proposed modified logistic map

In the proposed cryptographic technique, we have successfully modified the logistic map to generate the intermediate key. Three chaotic observations were noted in the three set of data set. Firstly, 0.41 ≤ x ≤ 0.53 with constant r = 3.64. Secondly, 0.61 ≤ x ≤ 0.66 with constant r = 3.81. Thirdly, 0.91 ≤ x ≤ 0.99 with constant r = 3.88. The following Fig. 3 indicates the efficacy of the proposed scheme by comparing between the logistic map and modified logistic map.

Fig. 3
figure 3

Efficacy in terms of proposed modification in logistic map

For a given initial condition, the future state can be predicted from a deterministic finite system. While in chaotic system, long term prediction of nature of trajectories cannot be judged with accuracy. For specific values of parameters, two trajectories, which are initially very close, diverge exponentially in a short time. Here initial information about the system is completely lost. Our proposed modified logistic map to generate the intermediate key can be seen in the above stated Eq. 3.

From the above Fig. 3 it is seen that our modified logistic map shows better chaotic nature than standard logistic map within the range. A small change in initial condition with fixed control parameter shows major difference in results as well as graphs. The following Table 2 contains the sample set of intermediate keys (in hexadecimal) obtained through modified logistic map.

Table 2 List of generated intermediate keys

8.2 Neural session key generation

In this paper, we have simulated neural perceptron to generate the session key. Different architectural perceptron were designed for obtaining different session keys for multiple COVID-19 E-Health transactions [13]. It is also stated that the architecture of the perceptron is made open to the public. The working principle of the perceptron can be found in the following Eq. 4.

$$ hl=b+{w}_1\ast {x}_1+{w}_2\ast {x}_2+\dots +{w}_n\ast {x}_n\dots $$
(4)
$$ {\displaystyle \begin{array}{c} If\ \left( hl\le 0.5\ \right)\ then\\ {}y=1\\ {}\begin{array}{c} Else\\ {}y=0\\ {} End\ if\end{array}\end{array}} $$

Since the input vectors are kept secret, so the exact pattern of the session key may not be decoded by the tricksters while using super computers. Different data set obtained can be found in the following Table 3 (in hexadecimal).

Table 3 List of generated session keys

8.3 Statistical robustness of proposed key sets

NIST Test Suite [5] is a measurements bundle involving fifteen statistical tests. Its goal is to decide the haphazardness of session key and intermediate key proposed in this paper. Robustness strength of these session key and intermediate key can be dictated by these fifteen tests. The keys which were mentioned in the Tables 2 and 3 were tested under NIST suite. The p values observed were categorically noted in the following tables. Only first ten tests noted in the Table 4 were considered under proposed technique.

Table 4 Index of NIST Suite

In the following Table 5, the robustness of the intermediates keys were noted. All such keys as mentioned in the Table 2 have been fed into NIST suite. The noted p values and the output will be shown in the following Table 5.

Table 5 Statistical robustness on intermediate key

The session keys that have been generated through the neural perceptron have been put into the statistical NIST package. The efficacy of those keys in the light of robustness can be summarized in the following Table 6.

Table 6 Statistical robustness on intermediate key

The average p-values of the proposed intermediate keys, and three set of session key were plotted in the following Fig. 4. The Tables 4 and 5 contain the p values. Average was made and then plotted to have the desired efficacy of the proposed COVID-19 E-Health.

Fig. 4
figure 4

Average –values on the proposed set of keys

8.4 Histogram analysis

In this sub section, histogram analysis has been carried out on the proposed COVID-19 cryptographic technique. Histogram indicates the frequency of different of characters present in the plain text. There has been a comparative graph between the pre-encryption and post-encryption of the plain text using our proposed technique. Furthermore, it was done on individual shares generated by the proposed technique. The post-encryption graphs resulted from individual shares were more variant than pre-encryption shares. Those could be found in the following Table 7. Tricksters will not be able to trace any linkage from the encrypted secret shares when compromised in the middle [22, 44]. In fact, the chances of malicious attacks on the patients’ data are higher. In the following Table 7, histogram comparison has been made. The histograms were generated on the pre-encryption and post-encryption on the same shares.

Table 7 Histogram comparison on secret shares

From the above histograms, there could be significant changes on the shares during the ore-encryption and post-encryption phase. It strongly boosts the proposed methodology.

8.5 Floating frequency analysis

Floating frequency means the counting of similar types of characters available in the plain text. The proposed technique has been tested through the floating frequency analysis. In the following Table 8, comparison graphs have been plotted. The graphs obtained during post-encryption on the partial shares have better performance than the pre-encryption graphs.

Table 8 Floating frequency comparison on secret shares

From the above floating frequencies, there could be huge changes on the offers during the pre-encryption and post-encryption stage. It emphatically supports the proposed philosophy of COVID-19 telemedicine.

8.6 Entropy analysis

Entropy is the act of randomness nature that is used for information hiding from the outsiders and intruders. Since a message can contain any character between 0 and 255. So the highest entropy is 8. Low entropy denotes lower security to the encryption system. In the following Table 9, entropy values were noted on different secret shares of the plain text. Let there will be n! Possible permutation types according to embedding dimension n. The relative frequency p (πi) is determined for each  πi, for 1≤푖≤푛!, according to the following equation:

Table 9 Entropy comparison on secret shares
$$ \mathrm{p}\ \left({\pi}_i\right)=\frac{number\ of\ occurrences\ of\ type\ {\pi}_i}{N-n+1}. $$

The permutation H(n) is then calculated as follows:

\( H\ (n)=-\sum \limits_i^{n!}p\left({\pi}_i\right)\mathit{\log}\ p \)(πi). Where 0≤H(n) ≤ log(n!). Here 0 indicates a series that is monotonically increasing or decreasing and log n! Indicates a completely random series. When experiment occur, H(n) is rescaled by dividing by log n!, thus normalizing H(n) to return values between 0 and 1 with 0 indicating highly regular data and 1 indicating maximal entropy. The efficacy of the proposed COVID-19 E-Health can be found in the following Table 9 in this regard.

The above stated Table 8 contains the Partial Share ID, Entropy pre-encryption, and Entropy post -encryption by our technique. This analysis shows the efficiency of our scheme in e-health sector.

8.7 Case of proposed mask generation

The proposed technique deals with a novel secret sharing method. In the group sharing of m number of users, any t number of recipients can be taken for secret sharing. Obviously, the value of t should be always less or equals to m. A snapshot which contains a set of ten recipients and only five recipients have been selected as recipients [7]. Thus, the threshold value is five. As per our proposed scheme of mask generation, a unit matrix of the order 5x5 was selected and shuffled at threshold iterations, which can be found in the following Fig. 5.

Fig. 5
figure 5

Snapshots of after shuffling t times

From the above Fig. 5, considering each column at a time, the proposed shares can be derived. This is listed in the following Table 10.

Table 10 t number of proposed shares

We have assumed a plain text of arbitrary length as MSG = “A7BC1DE3FH2G”, session key, SK = “BC4GE8RD”, and intermediate key, IK= “BF67$gAeS. Then, after doing bitwise XOR operation between the message, MSG and the session key, SK, the following cipher text has been found.

Cipher text, CT = “dF239R1CS5qb

Using the proposed scheme of share generation, the following shares were derived which can be found in the following Fig. 6.

Fig. 6
figure 6

Proposed shares using session key

This proves as the novelty of the proposed cryptographic scheme for COVID-19.

8.8 Strict lossless on proposed sharing

The novelty of the proposed cryptographic technique is that it ensures strict lossless mask generation. During the global unprecedented COVID-19 uncertainty era, E-Health plays an inevitable role in treating the patients. When a patient’s data is broken into t number of secret shares then t numbers of threshold shares are mandatory to reform the patient’s data. In addition there could be more users who are not being appointed as recipients to act in the group sharing. In our proposed sharing technique, no data loss has been observed during medical transactions [21]. Strict lossless may be found in the following eqs. 5 and 6 respectively.

  • Strict Lossless Sharing:

$$ MSG={MSG}_1\ U\ {MSG}_2\ U\dots U\ {MSG}_{t-1}\dots $$
(5)

it is the condition of strict lossless.

  • Lossy Sharing:

$$ MSG=\kern0.5em {MSG}_1\ U\kern0.5em {MSG}_2\kern0.5em U\dots U\kern0.5em {MSG}_{t-1}\dots $$
(6)

On varying the number of recipients in the COVID-19 E-Health, the following Table 11 will depict the possible combinations of shares and strict lossless combination value to regenerate the patient’s private reports.

Table 11 Comparison in terms of strict lossless shares combinations

From the above Fig. 4, it is quite true that all partial shares will be mandatory in the process of regeneration of data. Since all the shares are necessary to regenerate the text and whole the unit matrix takes part in share generation so from the eq. 5, it is clear that at the time decryption no information will loss that is lossless combination.

8.9 Attacks analysis

8.9.1 Brute force attacks on key set

The brute force attack can be handled efficiently by tricking the proposed key space. The tricksters will perform operation to decode session key on the cipher text by using latest super computers. Cryptographic algorithms are made available to the public. In this technique too, the codes are open to all. The latest super computer is Japan’s Fugaku with performance speed of 415.53 petaflops i. e. 415.53x1015 floating point operations. Each trial requires one thousand floating operations to complete a single round. The number of trials thus can be completed is: 415.53x1012 per second. The amount of available seconds in a year is 31,53,600 sec. In the following Table 12, different session key lengths were consider under the proposed technique, and their corresponding time needed has been calculated under Brute-Force attack using the following eq. 7.

Table 12 Time required for Brute-force attacks
$$ T\left(L,K\right)={2}^{L+K}/\left(415.53\ast {10}^{12}\ast 3153600\right)\dots $$
(7)

Here, T (L, K) is the time needed in Brute-Force, L and K represent the length of the session key and intermediate Key respectively. Upon various lengths of the proposed key, the following Table 12 will show the time needed to decipher the original patients’ data.

8.9.2 Chosen plain text attack

Cryptographic algorithms are public and the secret key is hidden, this key is used for encryption. Intruders present silently on the network, will test several set of keys to decrypt the cipher text. In the TMCS, attackers try to decrypt the ECG signal components based on some heuristic keys. Length of the key size is proportionate to the complexity to resist against the chosen plain signal attacks. It is a tool to break image encryption under chaotic sequence [6]. The proposed bio-key and harmony search based encryption algorithm is robust to such chosen plain signal attack. It proves the resistant by the proposed technique against the chosen plain signal attack in the Telecare Medical Communication System.

8.9.3 Occlusion attack

Clinical transmission of the signals is obvious to compromise with certain percent of bits. The tolerance level of clinical signal has been estimated here against the occlusion attack [40]. Bits lost with greater than 5% is not suited in this context. Randomly, 210, 360, and 490 elements were selected. The Mean Squared Error (MSE) of recovered signal elements is mentioned in the following Table 13.

Table 13 Observations of noise attacks

8.10 Cryptographic duration

With the proposed cryptographic scheme on COVID-19 E-Health, the transmission of patients’ related clinical reports, documents and prescriptions can be made online to the respective physicians in quick time. The cryptographic duration is a measuring index towards the efficiency of the proposed scheme. Time needed to encrypt the data at the patients’ terminal and time required to decrypt by the doctors are both to be summed to get the cryptographic time [46]. The following Table 14 displays the average cryptographic duration on the proposed set of session keys.

Table 14 Proposed cryptographic duration

The above cited Table 14 will have the following table headers as SK Key Group, No. of Session Keys, Proposed Encryption Time (in ms), Average Encryption Time (in ms), Proposed Decryption Time (in ms), Average Decryption Time(in ms), Proposed Cryptographic Time (in ms), and Average Cryptographic Time (in ms). There has been observed an appropriate correlation between the proposed encryption and cryptographic time, and proposed decryption and cryptographic time. These two evaluated values are rec= 0.989929 and rdc= 0.988828 respectively. These values closed to 1.0 denote the standard measures in this regard.

8.11 Complexity of the proposed system modules

Lower range time complexity is always desirable in any E-Health system. Amid corona virus, excessive digitization of medical records have been adopted by all the hospitals. Such E-Health system will acquire lower time complexity in its internal architecture to have its global acceptance. In the following Table 15, the internal modules’ complexity has been stated.

Table 15 Complexity of internal modules

8.12 Comparative study

This section deals with the comparison statements over existing techniques. It has been mentioned in the following three sub-sections.

8.12.1 Discussion on attribute based performance analysis

In this present section, comparative statement was made to prove our efficacy. The proposed cryptographic method has been compared with existing techniques [8, 45] based different types of attributes. The following Table 16 will show the comparisons with respect to different testing parameters.

Table 16 Attribute based comparison among techniques

From the above presented Table 16, the performance of the proposed technique can be accepted when compared against the classical techniques. This proves our efficacy.

8.12.2 Comparison between existing secret sharing technique and proposed technique

Here we have discussed about the measurement of our proposed secret sharing technique with respect to other existing techniques [6, 40]. We have compared with respect to different attributes in the following Table 17.

Table 17 Comparison between existing secret sharing techniques and proposed technique

8.12.3 Application model oriented comparison

In this sub-section, we have made a comparative table based on the application model. The following Table 18 shows the comparative analyses related to data attacks to the system. It also proves the efficiency of our proposed scheme with respect to different layers of application model. We had compared three types of attacks with the parameters such as damage level on patients’ medical data, existing proposal and detection schemes, and their corresponding vulnerability in E-Health. Any type of vulnerable attack may can reverse the patients’ data, drop the medical transaction packets, and decode the clinical reports and retrieval of the session key. The following Table 18 will display the efficacy of our proposed system with respect to different types of attacks.

Table 18 Comparison with respect to application model

9 Conclusion

There are various sorts of difficulties in medical services framework at present time. Hospitals have shown adaptabilities to upgrade and improve medical care capacities through digitization in this pandemic. It can help preventive consideration and encourage collective medical services to serve the patients from distant locations. It is a “New Normal” way to treat the non-invasive patients in larger perspectives, when second wave of corona virus is affecting us a lot. An essential methodology is the patients’ data security and confidentiality through online transmission [6, 20, 23, 40]. In this paper, a cryptographic system was proposed to foster the essential patients’ security where an encryption procedure is on the neural session key. Neural perceptron has been used to generate such session keys. Distinctive test results and its analysis, comparative studies demonstrate the efficacy and effectiveness of the proposed technique. Thus our proposed scheme is valid for secure telecommunication of COVID-19 E-Health. Strict lossless secret sharing of data has been incorporated here intelligently. Relative investigations among proposed secret shares and standard procedures, comprehensive key robustness, graphical charts show the agreeableness of our proposed method. On comparing at the application model, this proposed technique addresses the vital issues on the security frisks. To the most amazing aspect our insight our proposed strategy is the least complex one having insignificant computational overhead during encryption and decryption phase. It has been observed an appropriate correlation between the proposed encryption and cryptographic time, and proposed decryption and cryptographic time. These two evaluated values were rec = 0.989929 and rdc= 0.988828 respectively. The computed average cryptographic time on three different session key groups have been calculated as 74.83, 62.1, and 43.1 ms respectively. To have more standards, the chaotic sequences in the ranges of r = [0.41,0.53], r =  [0.61, 0.66], and r = [0.91, 0.99] on the initial values x = 3.64, 3.81, and 3.88 respectively were found and intermediate keys were derived here. Moreover, the internal modules’ time complexity has been measured and found to be significantly lower.