Application of nonlinear discrete maps to construct pseudo-chaotic cryptosystems.
DOI:
https://doi.org/10.15276/opu.2.70.2024.19Keywords:
pseudo-chaotic sequences, image encryption, cryptosystems, protection of information from unauthorized access, hardware-software platform, statistical analysis, discrete dynamical systems, unstable periodic orbits, stabilization of periodic orbitsAbstract
The article is devoted to the application of nonlinear discrete dynamical systems in computer cryptography. The basis of many stream encryption schemes is pseudo-chaotic sequences, which are generated using a certain selected trajectory of a discrete dynamical system. The main problem with using pseudo-chaotic dynamical systems in computer calculations is that the number of all possible states in a computer is finite, therefore, every constructed trajectory is periodic, and the period length can be small. In addition, different platforms (hardware and software) use different algorithms for calculating mathematical functions and store intermediate results with different precision, so the results obtained on different platforms can differ significantly. To overcome these problems, it is proposed to use a new dynamical system, namely the generalized Tent map with control, which stabilizes cycles of a given length. These cycles depend on the system parameters and the initial value; these values are a short key (seed) for generating a long pseudo-chaotic sequence. The article provides a simple statistical analysis to check the uncorrelation of the key sequence, as well as a graphical test. The experiments show the absence of significant correlation. The sensitivity of the elements of the key sequence to the variation of the key parameters was also investigated. As an example of the algorithm’s operation, the problem of image encryption is considered.
Downloads
References
Stinson, D. R. (2006). Cryptography: Theory and Practice (3rd ed.). Chapman and Hall/CRC.
Mao, W. (2003). Modern Cryptography: Theory and Practice. Pearson Education.
Bauer, F. L. (2007). Decrypted Secrets: Methods and Maxims of Cryptology (4th ed.). Springer. https://doi.org/10.1007/978-3-540-48121-8.
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of Applied Cryptology. CRC Press. https://cacr.uwaterloo.ca/hac/.
Shannon, C. E. (1948). A mathematical theory of communication. Bell System Technical Journal, 27(4), 379–423, 623–656. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x.
Zhu, C. X. (2012). A novel image encryption scheme based on improved hyperchaotic sequences. Optics Communications, 285(1), 29–37. https://doi.org/10.1016/j.optcom.2011.08.079.
Lu, Q., Yu, L., & Zhu, C. (2022). Symmetric Image Encryption Algorithm Based on a New Product Trigonometric Chaotic Map. Symmetry, 14(2), 373. https://doi.org/10.3390/sym14020373.
Zhang, W., Zhu, Z., & Yu, H. (2019). A symmetric image encryption algorithm based on a coupled logistic-Bernoulli map and cellular automata diffusion strategy. Entropy, 21(5), 504. https://doi.org/10.3390/e21050504.
Gupta, M., Gupta, K. K., Khosravi, M. R., Shukla, P. K., Kautish, S., & Shankar, A. (2021). An Intelligent Session Key-Based Hybrid Lightweight Image Encryption Algorithm Using Logistic-Tent Map and Crossover Operator for Internet of Multimedia Things. Wireless Personal Communications, 121, 1857–1878. https://doi.org/10.1007/s11277-021-08713-3.
Lozi, R. (2013). Can we trust in numerical computations of chaotic solutions of dynamical systems? In Ch. Letellier & R. Gilmore (Eds.), Topology and Dynamics of Chaos (Vol. 84, pp. 63–98). World Scientific. https://doi.org/10.1142/9789814434928_0003.
Shannon, C. E. (1949). Communication Theory of Secrecy Systems. Bell System Technical Journal, 28(4), 656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x.
Malik, D. S., & Shah, T. (2020). Color multiple image encryption scheme based on 3D-chaotic maps. Mathematics and Computers in Simulation, 178, 646–666. https://doi.org/10.1016/j.matcom.2020.07.011.
Öztürk, İ., & Kılıç, R. (2021). Utilizing true periodic orbits in chaos-based cryptography. Nonlinear Dynamics, 103, 2805–2818. https://doi.org/10.1007/s11071-021-06275-w.
Ye, G., Wu, H., Liu, M., & Shi, Y. (2022). Image encryption scheme based on blind signature and an improved Lorenz system. Expert Systems with Applications, 205, 117709. https://doi.org/10.1016/j.eswa.2022.117709.
Zhu, S., Wang, G., & Zhu, C. (2019). A Secure and Fast Image Encryption Scheme based on Double Chaotic S-Boxes. Entropy, 21(8), 790. https://doi.org/10.3390/e21080790.
Chai, X., Fu, J., Gan, Z., Lu, Y., & Zhang, Y. (2022). An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dynamics, 108, 2671–2704. https://doi.org/10.1007/s11071-022-07331-5.
Liu, L., & Wang, J. (2023). A cluster of 1D quadratic chaotic map and its applications in image encryption. Mathematics and Computers in Simulation, 204, 89–114. https://doi.org/10.1016/j.matcom.2022.07.027.
Zhu, H., Ge, J., Qi, W., Zhang, X., & Lu, X. (2022). Dynamic analysis and image encryption application of a sinusoidal-polynomial composite chaotic system. Mathematics and Computers in Simulation, 198, 188–210. https://doi.org/10.1016/j.matcom.2022.02.027.
Zhu, S., Deng, X., Zhang, W., & Zhu, C. (2021). A New One-Dimensional Compound Chaotic System and Its Application in High-Speed Image Encryption. Applied Sciences, 11(23), 11206. https://doi.org/10.3390/app112311206.
Sun, K. H., He, S. B., He, Y., & Yin, L. Z. (2013). Complexity analysis of chaotic pseudo-random sequences based on spectral entropy algorithm. Acta Physica Sinica, 62(1), 010501. https://doi.org/10.7498/aps.62.010501.
Alawida, M., Samsudin, A., Teh, J. S., & Alkhawaldeh, R. S. (2019). A new hybrid digital chaotic system with applications in image encryption. Signal Processing, 160, 45–58. https://doi.org/10.1016/j.sigpro.2019.02.016.
Adleman, L. M. (1994). Molecular computation of solutions to combinatorial problems. Science, 266(5187), 1021–1024. https://doi.org/10.1126/science.7973651.
Midoun, M. A., Wang, X., & Talhaoui, M. Z. (2021). A sensitive dynamic mutual encryption system based on a new 1D chaotic map. Optics and Lasers in Engineering, 139, 106485. https://doi.org/10.1016/j.optlaseng.2020.106485.
Ayers, K., Dmitrishin, D., Radunskaya, A., Stokolos, A., & Stokolos, K. (2023). Search for invariant sets of the generalized tent map. Journal of Difference Equations and Applications, 29(9-12), 1156–1183. https://doi.org/10.1080/10236198.2024.2307521.
Elaydi, S. N. (2007). Discrete Chaos: With Applications in Science and Engineering (2nd ed.). Chapman & Hall/CRC.
Dmitrishin, D., Stokolos, A., & Iacob, J. (2020). Average predictive control for nonlinear discrete dynamical systems. Advances in Systems Science and Applications, 20(1), 27–49. https://doi.org/10.25728/assa.2020.20.1.848.
Teh, J. S., Alawida, M., & Sii, Y. C. (2020). Implementation and practical problems of chaos-based cryptography revisited. Journal of Information Security and Applications, 50, 102421. https://doi.org/10.1016/j.jisa.2019.102421.
Biham, O., & Wenzel, W. (1989). Characterization of Unstable Periodic Orbits in Chaotic Attractors and Repellers. Physical Review Letters, 63(8), 819–822. https://doi.org/10.1103/PhysRevLett.63.819.
Dmitrishin, D., Skrinnik, I., Lesaja, G., & Stokolos, A. (2019). A new method for finding cycles by semilinear control. Physics Letters A, 383(16), 1871–1878. https://doi.org/10.1016/j.physleta.2019.03.018.
Miller, J. R., & Yorke, J. A. (2000). Finding all periodic orbits of maps using Newton methods: sizes of basins. Physica D: Nonlinear Phenomena, 135(3-4), 195–211. https://doi.org/10.1016/S0167-2789(99)00114-1.

