Skip to main content
Log in

Hybrid encryption algorithm (HEA) based on chaotic system

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In this paper, we present a very simple and efficient hybrid encryption algorithm based on block and stream ciphers using chaotic systems. Due to the specific characteristics of chaotic systems which are described by a set of nonlinear deterministic dynamic equations, chaos-based encryption achieves a very high level of security. The chaotic system used in this algorithm is Chirikov Standard Map, which is chosen in order to further minimize the encryption time. The proposed scheme adopts two main operations one to generate pseudorandom data block that will be used for stream cipher, and the second to create substitution and permutation tables in initial step and perform rounds for confusion and diffusion processes in block cipher. Some cryptographic tests and metrics are applied to measure the degree of security and analyze the performance of the encryption scheme. The evaluation and simulation analysis indicate that our proposal possesses excellent cryptographic properties; it is extremely sensitive to the small change in secret key, resists against common cryptanalytic attacks, has a high speed and easy to implement.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Agarwal P, Singh A, Kilicman A (2018) Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant. Adv Mech Eng 10(7):1687814018781638

    Article  Google Scholar 

  • Asgari-Chenaghlu M, Balafar MA, Feizi-Derakhshi MR (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Sign Process 157:1–13

    Article  Google Scholar 

  • Broumandnia A (2019) Designing digital image encryption using 2D and 3D reversible modular chaotic maps. J Inf Secur Appl 47:188–198

    Google Scholar 

  • Çavuşoğlu Ü, Kaçar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-Box. Chaos Solitons Fractal 95:92–101

    Article  Google Scholar 

  • Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213

    Article  Google Scholar 

  • Chen J, Zhang Y, Qi L, Fu C, Xu L (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99:238–248

    Article  Google Scholar 

  • Cheng C, Lu R, Petzoldt A, Takagi T (2017) Securing the Internet of Things in a quantum world. IEEE Commun Mag 55(2):116–120

    Article  Google Scholar 

  • Chirikov BV (1979) A universal instability of many-dimensional oscillator systems. Phys Rep 52(5):263–379

    Article  MathSciNet  Google Scholar 

  • Elmanfaloty RA, Abou-Bakr E (2019) Random property enhancement of a 1D chaotic PRNG with finite precision implementation. Chaos Solitons Fractal 118:134–144

    Article  MathSciNet  Google Scholar 

  • Farajallah M, El Assad S, Deforges O (2016) Fast and secure chaos-based cryptosystem for images. Int J Bifurc Chaos 26(2):1650021

    Article  Google Scholar 

  • Francois M, Grosges T, Barchiesi D, Erra R (2013) A new pseudo-random number generator based on two chaotic maps. Informatica 24(2):181–197

    Article  MathSciNet  Google Scholar 

  • Ghebleh M, Kanso A, Stevanović D (2018) A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation. Multimed Tools Appl 77(6):7305–7326

    Article  Google Scholar 

  • Hamdi M, Rhouma R, Belghith S (2016) An appropriate system for securing real-time voice communication based on ADPCM coding and chaotic maps. Multimed Tools Appl 76(5):7105–7128

    Article  Google Scholar 

  • Hamdi M, Rhouma R, Belghith S (2017) A selective compression-encryption of images based on SPIHT coding and Chirikov Standard Map. Sign Process 131:514–526

    Article  Google Scholar 

  • Hua Z, Jin F, Xu B, Huang H (2018a) 2D Logistic-Sine-coupling map for image encryption. Sign Process 149:148–161

    Article  Google Scholar 

  • Hua Z, Yi S, Zhou Y (2018b) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Sign Process 144:134–144

    Article  Google Scholar 

  • Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419

    Article  Google Scholar 

  • Huang H, Yang S, Ye R (2019a) Image encryption scheme combining a modified Gerchberg–Saxton algorithm with hyper-chaotic system. Soft Comput 23(16):7045–7053

    Article  Google Scholar 

  • Huang L, Cai S, Xiong X, Xiao M (2019b) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt Lasers Eng 115:7–20

    Article  Google Scholar 

  • IEEE Standard (754-2008) for Floating-Point Arithmetic (2008) IEEE Computer Society. https://doi.org/10.1109/ieeestd2008.4610935

  • Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circuits Syst I Fundam Theory Appl 48(2):163–169

    Article  MathSciNet  Google Scholar 

  • Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidimens Syst Signal Process 30(2):943–961

    Article  MathSciNet  Google Scholar 

  • Masuda N, Aihara K (2002) Cryptosystems with discretized chaotic maps. IEEE Trans Circuits Syst I49:28–40

    Article  MathSciNet  Google Scholar 

  • Nasir Q, Abdlrudha HH (2012) High security nested PWLCM chaotic map bit-level permutation based image encryption. Int J Commun Netw Syst Sci 5(9):548–556

    Google Scholar 

  • Patidar V, Sud KK, Pareek NK (2009) A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica 33(4):441–452

    MathSciNet  MATH  Google Scholar 

  • Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Technol J 28(4):656–715

    Article  MathSciNet  Google Scholar 

  • Singh A, Agarwal P, Chand M (2019) Image encryption and analysis using dynamic AES. In: IEEE 5th international conference on optimization and applications (ICOA), pp 1–6

  • Sprott JC (2003) Chaos and time-series analysis, vol 69. Oxford University Press, Oxford

    MATH  Google Scholar 

  • Teng L, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit-level permutation. Multimed Tools Appl 77(6):6883–6896

    Article  Google Scholar 

  • Wang X, Zhang W, Guo W, Zhang J (2013) Secure chaotic system with application to chaotic ciphers. Inf Sci 221:555–570

    Article  MathSciNet  Google Scholar 

  • Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Article  Google Scholar 

  • Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41–52

    Article  Google Scholar 

  • Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurc Chaos 28(1):1850010

    Article  MathSciNet  Google Scholar 

  • Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-Box. Inf Sci 450:361–377

    Article  MathSciNet  Google Scholar 

  • Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77(6):6647–6669

    Article  Google Scholar 

  • Zhang Y, Wang X, Liu L, Liu J (2018) Fractional order spatiotemporal chaos with delay in spatial nonlinear coupling. Int J Bifurc Chaos 28(02):1850020

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mimoun Hamdi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hamdi, M., Miri, J. & Moalla, B. Hybrid encryption algorithm (HEA) based on chaotic system. Soft Comput 25, 1847–1858 (2021). https://doi.org/10.1007/s00500-020-05258-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-020-05258-z

Keywords

Navigation