Performance Analysis of Chaotic Encryption Using a Shared Image as a Key

Most of the secret key encryption algorithms in use today are designed based on either the feistel structure or the substitution-permutation structure. This paper focuses on data encryption technique using multi-scroll chaotic natures and a publicly shared image as a key. A key is generated from the shared image using a full period pseudo random multiplicative LCG. Then, multi-scroll chaotic attractors are generated using a hysteresis switched, second order linear system. The bits of the image of the chaotic attractors are mixed with a plaintext to obtain a ciphertext. The plaintext can be recovered from the ciphertext during the deciphering process only by mixing the cipher with a chaos generated using the same secret key. As validated by a functional, NIST randomness, and Monte Carlo simulation tests, the cipher is very much diffused and not prone to statistical or selected cipher attacks. In addition, the performance is measured and analyzed using such metrics as encryption time, encryption throughput, power consumption and compared with such existing encryption algorithms as AES and RSA. Then, the performance analysis and simulation results verify that the chaotic  based data encryption algorithm is valid. Key Words: Secret key encryption, shared image, hysteresis switched second order system, multiplicative LCG, chaotic attractors, randomness.

[1]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[2]  Nigel P. Smart,et al.  Cryptography: An Introduction , 2004 .

[3]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[4]  Jinhu Lu,et al.  Generating multi-scroll chaotic attractors by thresholding , 2008 .

[5]  William Stallings,et al.  Data and Computer Communications , 1985 .

[6]  Xinghuo Yu,et al.  Generating 3-D multi-scroll chaotic attractors: A hysteresis series switching method , 2004, Autom..

[7]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[8]  Man Young Rhee,et al.  Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .

[9]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[10]  Xinghuo Yu,et al.  Fingerprint images encryption via multi-scroll chaotic attractors , 2007, Appl. Math. Comput..

[11]  Xinghuo Yu,et al.  Generating multi-scroll chaotic attractors via a linear second-order hysteresis system , 2005 .

[12]  Raj Jain,et al.  The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.

[13]  Sagar Naik,et al.  Software Implementation Strategies for Power-Conscious Systems , 2001, Mob. Networks Appl..

[14]  F. Han,et al.  A new way of generating grid-scroll chaos and its application to biometric authentication , 2005, 31st Annual Conference of IEEE Industrial Electronics Society, 2005. IECON 2005..