Skip to main content
Log in

New key-stream generation scheme based on Hénon chaotic system

  • Published:
Journal of Central South University Aims and scope Submit manuscript

Abstract

As known to all that Hénon chaotic system is not appropriate for generating the key-streams because it has non-uniformly distributed output signal, a new key-stream generation scheme based on Hénon chaotic system is presented. In order to get the key-streams with good statistics and long enough cycle length, a specific method for dividing the Hénon attractor into numerous non-overlapping sub-regions, and a new one-to-one mapping strategy between the divided sub-regions and elements of dynamically generated matrix consisting of 0’s and 1’s are proposed. Experimental results demonstrate that the generated key-streams are with long enough cycle length and very sensitive to the initial values and secret keys. For example, key-streams with the cycle length of 1032 can easily be obtained. Moreover, even if the fluctuation to the initial values or secret keys is as small as 10−14, uncorrelated key-streams will be generated. Experimental results also demonstrate that the generated key-streams have good randomness and they can pass all the standard criteria specified in FIPS PUB 140-2 with no less than 98%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. HENON M. A two-dimensional mapping with a strange attractor [J]. Communications in Mathematical Physics, 1976, 50(1):69–77.

    Article  MathSciNet  MATH  Google Scholar 

  2. ERDMANN D, MURPHY S. Hénon stream cipher [J]. Electronics Letters, 1992, 28(9):893–895.

    Article  Google Scholar 

  3. FORRE R. The Hénon attractor as a key stream generator [C]// Abstracts of Eurocrypt’91. Brighton, UK, 1991:76–80.

    Google Scholar 

  4. ZHOU Li-hai, FENG Zheng-jin. A new idea of using one-dimensional PWL map in digital secure communications-Dual resolution approach [J]. IEEE Transactions on Circuits and Systems: Part II, 2000, 47(10):1107–1111.

    Article  Google Scholar 

  5. SUN Fu-yan, LV Zong-wang, LIU Shu-tang. A new cryptosystem based on spatial chaotic system [J]. Optics Communications, 2010, 283(10):2066–2073.

    Article  Google Scholar 

  6. YIN Ru-ming, YUAN Jian, YANG Qiu-hua, SHAN Xiu-ming, WANG Xi-qin. Discretization of coupled map lattices for a stream cipher [J]. Tsinghua Science and Technology, 2011, 16(3):241–246.

    Article  MATH  Google Scholar 

  7. ZHU Cong-xu. A novel image encryption scheme based on improved hyperchaotic sequences [J]. Optics Communications, 2012, 285(1):29–37.

    Article  Google Scholar 

  8. ALVAREZ G, LI Shu-jun. Some basic cryptographic requirements for chaos-based cryptosystems [J]. International Journal of Bifurcation and Chaos, 2006, 6(8):2129–2151.

    Article  MathSciNet  Google Scholar 

  9. KWOK H S, TANG W K S. A fast image encryption system based on chaotic maps with finite precision representation [J]. Chaos, Solutions and Fractals, 2007, 32(4):1518–1529.

    Article  MathSciNet  MATH  Google Scholar 

  10. GUAN Zhi-hong, HUANG Fang-jun, GUAN Wen-jie. A general chaos-based key stream generator [J]. Circuits Systems Signal Processing, 2005, 24(5):549–555.

    Article  MathSciNet  MATH  Google Scholar 

  11. MAY R M. Simple mathematical models with very complicated dynamics [J]. Nature, 1976, 261(10):459–474.

    Article  Google Scholar 

  12. SANG Tao, WANG Ru-li, YAN Yi-xun. Perturbance-based algorithm to expand cycle length of chaotic key stream [J]. Electronics Letters, 1998, 34(9):873–874.

    Article  Google Scholar 

  13. Security Requirements for Cryptographic Modules, FIPS PUB 140-2, NIST [EB/OL]. http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, 2001.

    Google Scholar 

  14. TONG Xiao-jun, CUI Ming-gen. Image encryption with compound chaotic sequence cipher shifting dynamically [J]. Image and Vision Computing, 2008, 26(6):843–850.

    Article  Google Scholar 

  15. SUN Fu-yan, LIU Shu-tang. Cryptographic pseudo-random sequence from the spatial chaotic map [J]. Chaos, Solitons and Fractals, 2009, 41(5):2216–2219.

    Article  Google Scholar 

  16. PAREEK N K, PATIDAR V, SUD K K. A random bit generator using chaotic maps [J]. International Journal of Network Security, 2010, 10(1):32–38.

    Google Scholar 

  17. ZHU Zheng-wei, ZHOU Jian-jiang. Super-resolution reconstruction of synthetic-aperture radar image using adaptive-threshold singular value decomposition technique [J]. Journal of Central South University of Technology, 2011, 18(3):809–815.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-qian Zhao  (赵于前).

Additional information

Foundation item: Projects(61172184, 61173147) supported by the National Natural Science Foundation of China; Project(12JJ6062) supported by Natural Science Foundation of Hunan Province, China; Project(12lgpy31) supported by the Fundamental Research Funds for the Central Universities of China; Project supported by the State Key Laboratory of Information Security (Institute of Software, Chinese Academy of Sciences), China

Rights and permissions

Reprints and permissions

About this article

Cite this article

Huang, Fj., Zhao, Yq. New key-stream generation scheme based on Hénon chaotic system. J. Cent. South Univ. 20, 1904–1908 (2013). https://doi.org/10.1007/s11771-013-1689-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11771-013-1689-2

Key words

Navigation