Abstract
As known to all that Hénon chaotic system is not appropriate for generating the key-streams because it has non-uniformly distributed output signal, a new key-stream generation scheme based on Hénon chaotic system is presented. In order to get the key-streams with good statistics and long enough cycle length, a specific method for dividing the Hénon attractor into numerous non-overlapping sub-regions, and a new one-to-one mapping strategy between the divided sub-regions and elements of dynamically generated matrix consisting of 0’s and 1’s are proposed. Experimental results demonstrate that the generated key-streams are with long enough cycle length and very sensitive to the initial values and secret keys. For example, key-streams with the cycle length of 1032 can easily be obtained. Moreover, even if the fluctuation to the initial values or secret keys is as small as 10−14, uncorrelated key-streams will be generated. Experimental results also demonstrate that the generated key-streams have good randomness and they can pass all the standard criteria specified in FIPS PUB 140-2 with no less than 98%.
Similar content being viewed by others
References
HENON M. A two-dimensional mapping with a strange attractor [J]. Communications in Mathematical Physics, 1976, 50(1):69–77.
ERDMANN D, MURPHY S. Hénon stream cipher [J]. Electronics Letters, 1992, 28(9):893–895.
FORRE R. The Hénon attractor as a key stream generator [C]// Abstracts of Eurocrypt’91. Brighton, UK, 1991:76–80.
ZHOU Li-hai, FENG Zheng-jin. A new idea of using one-dimensional PWL map in digital secure communications-Dual resolution approach [J]. IEEE Transactions on Circuits and Systems: Part II, 2000, 47(10):1107–1111.
SUN Fu-yan, LV Zong-wang, LIU Shu-tang. A new cryptosystem based on spatial chaotic system [J]. Optics Communications, 2010, 283(10):2066–2073.
YIN Ru-ming, YUAN Jian, YANG Qiu-hua, SHAN Xiu-ming, WANG Xi-qin. Discretization of coupled map lattices for a stream cipher [J]. Tsinghua Science and Technology, 2011, 16(3):241–246.
ZHU Cong-xu. A novel image encryption scheme based on improved hyperchaotic sequences [J]. Optics Communications, 2012, 285(1):29–37.
ALVAREZ G, LI Shu-jun. Some basic cryptographic requirements for chaos-based cryptosystems [J]. International Journal of Bifurcation and Chaos, 2006, 6(8):2129–2151.
KWOK H S, TANG W K S. A fast image encryption system based on chaotic maps with finite precision representation [J]. Chaos, Solutions and Fractals, 2007, 32(4):1518–1529.
GUAN Zhi-hong, HUANG Fang-jun, GUAN Wen-jie. A general chaos-based key stream generator [J]. Circuits Systems Signal Processing, 2005, 24(5):549–555.
MAY R M. Simple mathematical models with very complicated dynamics [J]. Nature, 1976, 261(10):459–474.
SANG Tao, WANG Ru-li, YAN Yi-xun. Perturbance-based algorithm to expand cycle length of chaotic key stream [J]. Electronics Letters, 1998, 34(9):873–874.
Security Requirements for Cryptographic Modules, FIPS PUB 140-2, NIST [EB/OL]. http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, 2001.
TONG Xiao-jun, CUI Ming-gen. Image encryption with compound chaotic sequence cipher shifting dynamically [J]. Image and Vision Computing, 2008, 26(6):843–850.
SUN Fu-yan, LIU Shu-tang. Cryptographic pseudo-random sequence from the spatial chaotic map [J]. Chaos, Solitons and Fractals, 2009, 41(5):2216–2219.
PAREEK N K, PATIDAR V, SUD K K. A random bit generator using chaotic maps [J]. International Journal of Network Security, 2010, 10(1):32–38.
ZHU Zheng-wei, ZHOU Jian-jiang. Super-resolution reconstruction of synthetic-aperture radar image using adaptive-threshold singular value decomposition technique [J]. Journal of Central South University of Technology, 2011, 18(3):809–815.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Projects(61172184, 61173147) supported by the National Natural Science Foundation of China; Project(12JJ6062) supported by Natural Science Foundation of Hunan Province, China; Project(12lgpy31) supported by the Fundamental Research Funds for the Central Universities of China; Project supported by the State Key Laboratory of Information Security (Institute of Software, Chinese Academy of Sciences), China
Rights and permissions
About this article
Cite this article
Huang, Fj., Zhao, Yq. New key-stream generation scheme based on Hénon chaotic system. J. Cent. South Univ. 20, 1904–1908 (2013). https://doi.org/10.1007/s11771-013-1689-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11771-013-1689-2