Hybrid Publicly Verifiable Authenticated Encryption Scheme Based on Chaotic Maps and Factoring Problems

ABSTRACT A new public authenticated encryption scheme based on chaotic maps and factoring problems is proposed. The chaos-based cryptosystem offers an encryption scheme with several advantages including secure transfer, high speed encryption, and reasonable computational overheads. Cryptographic factoring and chaotic system are employed to enhance the security of our convertible authenticated encryption scheme. The encryption, signature generation, signature verification, and message recovery are discussed in details. Several security attacks are proposed to illustrate the system shield through chaotic maps and factoring problems. The performance analysis of the proposed scheme show a much improved performance over existing techniques.

[1]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[2]  Yuliang Zheng,et al.  Signcryption and Its Applications in Efficient Public Key Solutions , 1997, ISW.

[3]  Eddie Shahril Ismail,et al.  New Cryptosystem Using Multiple Cryptographic Assumptions , 2011 .

[4]  Min-Shiang Hwang,et al.  A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms , 2017, Int. J. Netw. Secur..

[5]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[6]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[7]  Ángel Martín del Rey,et al.  A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes , 2008, Int. J. Netw. Secur..

[8]  Chenggen Quan,et al.  Optical color image encryption based on Arnold transform and interference method , 2009 .

[9]  Wen-Chung Kuo,et al.  A new digital signature scheme based on chaotic maps , 2013, Nonlinear dynamics.

[10]  Yu Fu,et al.  Color image encryption based on interference and virtual optics , 2010 .

[11]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[12]  Zhenfeng Zhang,et al.  Chaotic encryption algorithm based on alternant of stream cipher and block cipher , 2011 .

[13]  Djiby Sow,et al.  A Factoring and Discrete Logarithm based Cryptosystem , 2012, ArXiv.

[14]  Tambe,et al.  Driving systems with chaotic signals. , 1992, Physical review. A, Atomic, molecular, and optical physics.

[15]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[16]  Tzonelih Hwang,et al.  Publicly verifiable authenticated encryption , 2003 .

[17]  Min-Shiang Hwang,et al.  A new convertible authenticated encryption scheme with message linkages , 2007, Comput. Electr. Eng..

[18]  Hyunsoo Yoon,et al.  New Modular Multiplication Algorithms for Fast Modular Exponentiation , 1996, EUROCRYPT.

[19]  Aboul Ella Hassanien,et al.  A Fast and Secure One-Way Hash Function , 2011, FGIT-SecTech.

[20]  Chin-Chen Chang,et al.  Authenticated encryption scheme without using a one way function , 1995 .

[21]  Rastislav Lukac,et al.  Efficient encryption of wavelet-based coded color images , 2005, Pattern Recognit..

[22]  Patrick Horster,et al.  Authenticated encryption schemes with low communication costs , 1994 .

[23]  Ljupco Kocarev,et al.  Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[24]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[25]  Cheng-Chi Lee,et al.  A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem , 2009, Int. J. Found. Comput. Sci..

[26]  Daomu Zhao,et al.  Optical color image encryption with redefined fractional Hartley transform , 2010 .