Application of chaos theory in data security-a survey

In cryptography key sequence generation is one of the important areas. Earlier pseudo random number generators were used as key sequence in stream cipher. After the evolution of chaotic systems, it was found that properties of chaotic systems are more superior to pseudo random number generators. In this context, we have tried to explore the basic theoretical background of chaotic systems, their types and properties in this paper. Along with chaotic systems, sequence generation using chaotic systems and the application of sequences in various image encryption methods is also discussed. Finally, a suitable key sequence generation using chaotic system is proposed.

[1]  Arun S Menon,et al.  Image encryption based on chaotic algorithms : An overview , 2013 .

[2]  Dirk Werner,et al.  What's Happening in the Mathematical Sciences? , 2001 .

[3]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .

[4]  Robert Gold,et al.  Maximal recursive sequences with 3-valued recursive cross-correlation functions (Corresp.) , 1968, IEEE Trans. Inf. Theory.

[5]  A. Steffi,et al.  Modified Algorithm of Encryption and Decryption of Images using Chaotic Mapping , 2013 .

[6]  Luigi Fortuna,et al.  Does chaos work better than noise , 2002 .

[7]  Xingyuan Wang,et al.  A novel chaotic block image encryption algorithm based on dynamic random growth technique , 2015 .

[8]  Peter Stavroulakis,et al.  Chaos Applications in Telecommunications , 2005 .

[9]  Amir Akhavan,et al.  A novel dynamic model of pseudo random number generator , 2011, J. Comput. Appl. Math..

[10]  Mustafa Türk,et al.  Digital Image Encryption Scheme using Chaotic Sequences with a Nonlinear Function , 2012 .

[11]  Louis M Pecora,et al.  Synchronization of chaotic systems. , 2015, Chaos.

[12]  Carlos Gershenson Introduction to Chaos in Deterministic Systems , 2003 .

[13]  Guoqiang Han,et al.  An Enhanced Chaos Based Image Encryption Algorithm , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[14]  Vinod Patidar,et al.  A Random Bit Generator Using Chaotic Maps , 2010, Int. J. Netw. Secur..

[15]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[16]  Huang Xiao,et al.  An Image Encryption Scheme Based on Chaotic Systems , 2006, 2006 International Conference on Machine Learning and Cybernetics.

[17]  J.A. Hernandez,et al.  Chaos Theory Applied to Communications -- Part I: Chaos Generators , 2007, Electronics, Robotics and Automotive Mechanics Conference (CERMA 2007).

[18]  S. V. Sathyanarayana,et al.  Image encryption scheme with key sequences based on Chaotic functions , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[19]  Asem Mohammad Al-Najjar,et al.  Image Encryption Algorithm Based on Logistic Map and Pixel Mapping Table , 2011 .

[20]  Hyoungshick Kim,et al.  An image encryption scheme with a pseudorandom permutation based on chaotic maps , 2010 .

[21]  J. Tennyson In the wake of chaos. Unpredictable order in dynamical systems , 1995 .

[22]  Luigi Fortuna,et al.  Chaotic sequences to improve the performance of evolutionary algorithms , 2003, IEEE Trans. Evol. Comput..

[23]  Xiaoling Huang,et al.  A NEW DIGITAL IMAGE ENCRYPTION ALGORITHM BASED ON 4D CHAOTIC SYSTEM , 2012 .

[24]  Charles Herring,et al.  Random number generators are chaotic , 1989, CACM.

[25]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[26]  A Prime Case of Chaos , .

[27]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .