Cryptosystem with One Dimensional Chaotic Maps
This paper presents a 64-bits chaotic block cryptosystem, which uses as noise generator one-dimensional chaotic maps with 8 bits sub-blocks data. These chaotic maps use a control parameter that allows them to operate in the chaotic region, which guarantees that each sub-block of data is mixed with unpredictable random noise. Statistical mechanic tools such as: bifurcation diagram, Lyapunov exponent, and invariant distribution have been used to analyze and evaluate the behavior of the noise generator. The cryptosystem has been evaluated using concepts of information theory, such as: entropy, as a diffusion measure in the encryption process, and mutual information as a measure of relationship between plaintext and its respective cryptogram. The noise generator has been used on the non-balanced and dynamic network proposed by L. Kocarev. The randomness of the cryptograms has been evaluated using the NIST random tests. The proposed cryptosystem can be a component in software applications that provides security to stored or communicated information. The proposed cryptosystem has a similar behavior to the one of currently used cryptosystems and it has been designed with chaotic sequence generators, which are aperiodic by definition.
KeywordsChaotic cryptosystem Block cryptosystem Chaotic maps
Unable to display preview. Download preview PDF.
- 1.Devanney, R.L.: An introduction to chaotic dynamical systems. Addison Wesley Publishing Company, Reading (1989)Google Scholar
- 2.Moon, F.C.: Chaotic and fractal in dynamics: an introduction for applied scientists and engineers. Wiley-IEEE (1992)Google Scholar
- 5.He, J., Zheng, J., Li, Z.-b., Qian, H.-f.: Color Image Cryptography Using Multiple One-Dimensional Chaotic Maps and OCML. In: International Symposium on Information Engineering and Electronic Commerce, IEEC 2009, pp. 85–89 (2009)Google Scholar
- 6.Hussein, R.M., Ahmed, H.S., El-Wahed, W.: New encryption schema based on swarm intelligence chaotic map. In: 7th International Conference on Informatics and Systems (INFOS), pp. 1–7 (2010)Google Scholar
- 7.Rodríguez-Sahagún, M.T., Mercado-Sánchez, J.B., López-Mancilla, D., Jaimes-Reátegui, R., García-López, J.H.: Image Encryption Based on Logistic Chaotic Map for Secure Communications. In: IEEE Electronics, Robotics and Automotive Mechanics Conference, CERMA 2010, pp. 319–324 (2010)Google Scholar
- 9.Kartalopoulos, S.V.: Annulling Traps & Fixed Traps in Chaos Cryptography. In: New Technologies, Mobility and Security, NTMS 2008, pp. 1–4, 5-7 (2008)Google Scholar
- 10.Rukhin A., Soto J., Nechvatal J., Smid M., Barker E., Leigh S., Levenson M., Vangel M., Banks D., Heckert A., Dray J., Vo S.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST SP 800-22 Rev 1a (2010), http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf