A Proposed Public Key Encryption Based on Hybrid Chaotic Maps

توێژەران

  • Ahmed T. Sadeeq Department of Computer Science, University of Technology - Iraq
  • Alaa K. Farhan Department of Computer Science, University of Technology – Iraq
  • Shaimaa A. Hassan Institute of Medical Technology, Middle Technical University- Iraq

##semicolon##

https://doi.org/10.25212/lfu.qzj.2.2.08

##semicolon##

Public Key Encryption, Hybrid Chaotic Map, 3D Logistic Map, 3D Arnold Cat Map, Rotation Equation.

پوختە

Cryptography has long history by providing a way to store sensitive information or transmit it across insecure networks (i.e. the Internet) so that it cannot be read by anyone except the intended recipient. Because data transmitted over the network is vulnerable to attack, it must be considering the security aspect of it. In this paper, a public key encryption algorithm based on hybrid chaotic maps is proposed. The proposed algorithm uses a mixing of three dimensional Logistic map, three dimensional Arnold Cat map, two dimensional Rotation Equation and Chebyshev map to set random values to this algorithm and to generate
privet and public keys that are used to encrypt and decrypt data. The experimental results show that the generated keys have the characteristics of truly random numbers and pass most of statistical and NIST tests.

##plugins.generic.usageStats.downloads##

##plugins.generic.usageStats.noStats##

سەرچاوەکان

Nicholas G. McDonald, "Past, Present, and Future Methods of Cryptography and Data Encryption", A Research Review, 2010.

William Stallings, "Cryptography and Network Security Principles and Practice", Fifth Edition, Prentice Hall, 2011.

Adel A., Amr H. , Hany H., "Survey Report on Chaos Based Public-key Cryptosystem" , International Journal of Emerging Technology and Advanced (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 12, December 2013).

David Levy, "Chaos Theory and Strategy: Theory, Application. And Managerial Implications", Massachusetts Strategic Management Journal, Vol. 15, 167-178, U.S.A (1994).

L. Douglas Kiel, Euel W. Elliott, "Chaos Theory in the Social Sciences: Foundations and Applications", The University of Michigan Press, 1996.

Étienne Ghys, "The Butterfly Effect", 12th International Congress on Mathematical Education, 2012.

Kharel, Rupak, "Design and Implementation of Secure Chaotic Communication Systems", Doctoral thesis, Northumbria University, 2011.

Ljupco Kocarev, Marjan Sterjev, Attila Fekete, Gabor Vattay, "Public-key encryption with chaos", American Institute of Physics, Vol. 14, No. 4, 1078-1082, 2004.

Shuichi Aono, Yoshifumi Nishio, "A Cryptosystem Based on Iterations of Chaotic Map", IEICE Technical Report, Vol.107, No.87, 2007.

K. Prasadh, K. Ramar, R. Gnana jeyaraman, "Public key cryptosystems based on chaotic Chebyshev polynomials", Journal of Engineering and Technology Research, Vol.1 (7), 122-128, 2009.

Pawan N. Khade, and Manish Narnaware, "3D Chaotic Functions for Image Encryption", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, 2012 ISSN 1694- 0814.

Skiadas, "Mathematical models of Chaos. In Chaos Applications in Telecommunications", Stavroulakis, P., Ed.; CRC Press: Boca Raton, FL, USA, 2006; pp. 383–413.

Skiadas, " In Chaotic Modelling and Simulation: Analysis of Chaotic Models, Attractors and Forms", CRC Press: Boca Raton, FL, USA, 2008.

Daniel-Ioan Curiac and Constantin Volosencu, "Path Planning Algorithm based on Arnold Cat Map for Surveillance UAVs", Defence Science Journal, Vol. 65, No. 6, November 2015, pp. 483-488, DOI : 10.14429/dsj.65.8483 ,2015, DESIDOC

Tang, W.K. & Liu, Y., "Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography. Chaos Based Cryptography", Springer Berlin Heidelberg, 2011, pp. 99-136.

Mohammed Saleh, "Proposed Block Cipher Algorithm with Cloud Computing Based on Key Generation", M.Sc. Thesis, University of Technology, 2013.

Maytham M. Hammood, Kenji Yoshigoe and Ali M. Sagheer, "Enhancing Security and Speed of RC4". International Journal of Computing and Network Technology ISSN 2210-1519 Int. J. Com. Net. Teach. 3, No. 2 (May 2015).

##submission.downloads##

بڵاو کرایەوە

2021-01-24

ژمارە

بەش

Articles