A one-time one-key encryption algorithm based on the ergodicity of chaos

In this paper, we propose a new one-time one-key encryption algorithm based on the ergodicity of a skew tent chaotic map. We divide the chaotic trajectory into sub-intervals and map them to integers, and use this scheme to encrypt plaintext and obtain ciphertext. In this algorithm, the plaintext information in the key is used, so different plaintexts or different total numbers of plaintext letters will encrypt different ciphertexts. Simulation results show that the performance and the security of the proposed encryption algorithm can encrypt plaintext effectively and resist various typical attacks.

[1]  Ljupco Kocarev,et al.  Analysis of some recently proposed chaos-based encryption algo-rithms , 2001 .

[2]  Safya Belghith,et al.  Comment on Modified Baptista type chaotic cryptosystem via matrix secret key [Phys. Lett. A 372 (2008) 5427] , 2009 .

[3]  Sun Qiuye,et al.  Novel pinning control strategies for synchronisation of complex networks with nonlinear coupling dynamics , 2010 .

[4]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[5]  M. Baptista Cryptography with chaos , 1998 .

[6]  L. Kocarev,et al.  Logistic map as a block encryption algorithm , 2001 .

[7]  Fu Jie,et al.  Global impulsive exponential synchronization of stochastic perturbed chaotic delayed neural networks , 2009 .

[8]  Kwok-Wo Wong,et al.  A chaotic cryptography scheme for generating short ciphertext , 2003 .

[9]  Ashraf A. Zaher,et al.  On the design of chaos-based secure communication systems , 2011 .

[10]  Peng Fei,et al.  Constructing a one-way hash function based on the unified chaotic system , 2008 .

[11]  X. Liao,et al.  Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map , 2007 .

[12]  Fu Jie,et al.  A practical approach to robust impulsive lag synchronization between different chaotic systems , 2008 .

[13]  Xing-yuan Wang,et al.  A switch-modulated method for chaos digital secure communication based on user-defined protocol , 2010 .

[14]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[15]  Vinod Patidar,et al.  Cryptography using multiple one-dimensional chaotic maps , 2005 .

[16]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[17]  Kwok-wo Wong,et al.  A modified chaotic cryptographic method , 2001 .