Skip to main content
Log in

Design of dynamic cipher electronic lock based on chaotic system

  • Published:
International Journal of Dynamics and Control Aims and scope Submit manuscript

Abstract

Compared with the static cipher, the dynamic cipher has the characteristic of "one cipher at a time" proposed by Shannon theory. Therefore, it is regarded as the safest among many forms of identity authentication. This paper proposes a five-dimensional chaotic system suitable for the construction of dynamic cipher and analyzes its relevant characteristics, including stability, balance, time-domain waveform, Poincaré cross sectional diagram, Lyapunov exponent and bifurcation diagram. The results show that the chaotic system has multiple controllable parameters and a wide range of chaos, which is very suitable for constructing chaotic dynamic ciphers. The complexity of the proposed chaotic system is analyzed to verify the high security of the proposed system. On this basis, a dynamic cipher electronic lock based on chaotic system is designed in this paper. In the designed hardware circuit, the fourth order Runge–Kutta solving algorithm is used to discretize the constructed system, and the chaos is successfully implemented in the single-chip microcomputer. The phase diagram obtained from the circuit simulation data is basically consistent with the numerical simulation. Finally, the circuits of the handheld terminal and the electronic lock terminal are designed and simulated. The simulation results show that the preset function can be basically realized, and the generated chaotic dynamic cipher is random and irregular. The five-dimensional chaotic system proposed in this paper has complex dynamic characteristics, which makes the dynamic cipher electronic lock based on the chaotic system extremely safe.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Rossler OE (1979) An equation for hyperchaos. Phys Lett A 71(2–3):155–157

    Article  MathSciNet  Google Scholar 

  2. ]Signing VRF, Kengne J, (2018) Coexistence of hidden attractors, 2-torus and 3-torus in a new simple 4-d chaotic system with hyperbolic cosine nonlinearity. Int J Dyn Control 6(4):1421–1428

    Article  MathSciNet  Google Scholar 

  3. Vaidyanathan S, Sambas A, Kacar S, Çavuşoğlu Ü (2018) A new threedimensional chaotic system with a cloud-shaped curve of equilibrium points, its circuit implementation and sound encryption. Int J Model Identif Control 30(3):184–196

    Article  Google Scholar 

  4. Wang J, Yu W, Wang J et al (2019) A new six-dimensional hyperchaotic system and its secure communication circuit implementation. J Circuit Theory Appl 47(5):702–717

    Article  Google Scholar 

  5. Yu W, Wang J et al (2019) Design of a new seven-dimensional hyperchaotic circuit and its application in secure communication. IEEE Access 7:125586–125608

    Article  Google Scholar 

  6. Tong X, Cui M (2008) Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis Comput 26(6):843–850

    Article  Google Scholar 

  7. Hu G et al (2017) An efficient chaotic image cipher with dynamic lookup table driven bit-level permutation strategy. Nonlinear Dyn 87(2):1359–1375

    Article  Google Scholar 

  8. Gayathri J, Subashini S (2019) An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase. J Inf Sci 489:227–254

    Article  Google Scholar 

  9. Chen L et al (2020) Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table. Nonlinear Dyn 100:3959–3978

    Article  Google Scholar 

  10. Di X, Liao X, Wang Y (2009) Parallel keyed hash function construction based on chaotic neural network. Neurocomputing 72(10–12):2288–2296

    Google Scholar 

  11. Chai X, Zheng X et al (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124–144

    Article  Google Scholar 

  12. Wang X, Zhu X, Wu X et al (2018) Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt Lasers Eng 107:370–379

    Article  Google Scholar 

  13. Teh JS, Alawida M, Ho JJ (2020) Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic. Nonlinear Dyn 100:713–729

    Article  Google Scholar 

  14. Wang G, Zheng Y, Liu J (2007) A hyperchaotic Lorenz attractor and its circuit implementation. Acta Phys Sinica 56(6):3113–3120

    Article  MathSciNet  Google Scholar 

  15. Zhang Y (2019) Research on electronic lock security based on 3DES algorithm. Huazhong University of Science and Technology

  16. Qiao X, Bao B (2009) Three-dimensional four-wing generalized augmented Lü system. J Phys 58(12):8152–8159

    MathSciNet  MATH  Google Scholar 

  17. Sun KH, He SB, Zhu CX et al (2013) Analysis of chaotic complexity characteristics based on C0 algorithm. Tien Tzu Hsueh Pao/acta Electronica Sinica 41(9):1765–1771

    Google Scholar 

Download references

Acknowledgements

This work was supported by the China Postdoctoral Science Foundation funded Project No.2017M622574. Chinese National Natural Science Foundation No. 61973109, Hunan Provincial Degree and Graduate Education Reform Project No. 2020JGYB189; Key Scientific Research Project of Hunan Education Department No. 19A183.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenxin Yu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, J., Yu, W., Wang, J. et al. Design of dynamic cipher electronic lock based on chaotic system. Int. J. Dynam. Control 9, 1505–1522 (2021). https://doi.org/10.1007/s40435-021-00769-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40435-021-00769-5

Keywords

Navigation