Skip to main content

Multi-sized Multiple Text File Encryption System using One-dimensional Chaotic Map

  • Conference paper
  • First Online:
Nanoelectronics, Circuits and Communication Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 692))

  • 978 Accesses

Abstract

This paper proposes a text encryption system to encrypt multiple text files of arbitrary sizes. The proposed work uses one-dimensional piece-wise linear chaotic map (PWLCM) to perform multi-sized multiple text file encryption. In the method, a group of text files is partitioned into number of sections, each one with 4-text elements. The text elements in each of the sections are then arranged into \(2 \times 2\) dimensional text blocks. All the \(2 \times 2\) blocks and the remaining text elements (if any) are arranged in a separate array. Finally, the array of blocks and remaining text elements are permuted and diffused using two different PWLCM systems. The SHA-256 hash function is used to generate the keys to prevent the proposed cryptosystem against chosen-plaintext and known-plaintext attacks. The computer simulation reveals the good encryption results of the multi-sized multiple text file encryption system. The security analysis confirms the stronger resistivity of the proposed algorithm against the most widely used security attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Murillo-Escobar MA, Abundiz-Pérez F, Cruz-Hernández C, López-Gutiérrez RM (2014) A novel symmetric text encryption algorithm based on logistic map. In: Proceedings of the international conference on communications, signal processing and computers, pp 04953, Feb 2014

    Google Scholar 

  2. Coppersmith D (1994) The data encryption standard (DES) and its strengths against attacks. IBM J Res Dev 38(3):243–250

    Article  Google Scholar 

  3. Pub NF (2001) 197: Advanced encryption standard (AES). In: Federal Information Processing Standards Publication, vol 197, pp 441–0311

    Google Scholar 

  4. Boneh D, Dunworth C, Lipton R (1995) Breaking DES using a molecular computer. In: Proceedings of DIMACS workshop on DNA computing, pp 37–65

    Google Scholar 

  5. Cui G, Li C, Li H, Li X (2009) DNA computing and its application to information security field. In: Fifth international conference on natural computation (ICNC’09) IEEE, vol 6, pp 148–152, Aug 2009

    Google Scholar 

  6. Wang XY, Zhang YQ, Zhao YY (2015) A novel image encryption scheme based on 2-D logistic map and DNA sequence operations. Nonlinear Dyn 82:1269–1280

    Article  MathSciNet  Google Scholar 

  7. Ye G, Zhao H, Chai H (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83:2067–2077

    Article  MathSciNet  Google Scholar 

  8. Wang X, Liu C, Zhang H (2016) An effective and fast image encryption algorithm based on Chaos and interweaving of ranks. Nonlinear Dyn 84:1595–1607

    Article  MathSciNet  Google Scholar 

  9. Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87:127–133

    Article  Google Scholar 

  10. Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88:2757–2769

    Article  Google Scholar 

  11. Patro KAK, Acharya B (2019) A simple, secure, and time-efficient bit-plane operated bit-level image encryption scheme using 1-D chaotic maps. In: Innovations in soft computing and information technology. Springer, Singapore, pp 261–278

    Google Scholar 

  12. Patro KAK, Acharya B, Nath V (2019) A secure multi-stage one-round bit-plane permutation operation based chaotic image encryption. Microsyst Tech: 1–8

    Google Scholar 

  13. Patro KAK, Acharya B (2019) An efficient colour image encryption scheme based on 1-D chaotic maps. J Inf Secur Appl 46:23–41

    Google Scholar 

  14. Sobhy MI, Shehata AE (2001) Chaotic algorithms for data encryption. IEEE Int Conf Acoust Speech Signal Process 2:997–1000

    Google Scholar 

  15. Babaei M (2013) A novel text and image encryption method based on chaos theory and DNA computing. Nat Comput 12(1):101–107

    Article  MathSciNet  Google Scholar 

  16. Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and permutation. Opt Laser Eng 92:6–16

    Article  Google Scholar 

  17. Xiang T, Liao X, Wong K-W (2007) An improved particle swarm optimization algorithm combined with piecewise linear chaotic map. Appl Math Comput 190(2):1637–1645

    MathSciNet  MATH  Google Scholar 

  18. Wang X, Xu D (2014) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75:345–353

    Article  Google Scholar 

  19. Patro KAK, Acharya B (2018) Secure multi–level permutation operation based multiple colour image encryption. J Inf Secur Appl 40:111–133

    Google Scholar 

  20. Kulsoom A, Xiao D, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl 75:1–23

    Article  Google Scholar 

  21. Patro KAK, Banerjee A, Acharya B (2017) A simple, secure and time efficient multi-way rotational permutation and diffusion based image encryption by using multiple 1-D chaotic maps. In: international conference on next generation computing technologies. Springer, Singapore, pp 396–418

    Google Scholar 

  22. Floating-Point Working Group (1985) IEEE standard for binary floating-point arithmetic. ANSI. IEEE Std., pp 754–1985

    Google Scholar 

  23. Enayatifar R, Hanan A, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bibhudendra Acharya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abhimanyu Kumar Patro, K., Agrawal, A., Raj, R., Acharya, B. (2021). Multi-sized Multiple Text File Encryption System using One-dimensional Chaotic Map. In: Nath, V., Mandal, J. (eds) Nanoelectronics, Circuits and Communication Systems. Lecture Notes in Electrical Engineering, vol 692. Springer, Singapore. https://doi.org/10.1007/978-981-15-7486-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-7486-3_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-7485-6

  • Online ISBN: 978-981-15-7486-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics