Chaotic encryption algorithm based on alternant of stream cipher and block cipher

In recent years, a growing number of discrete chaotic cryptographic algorithms have been proposed. However, most of them encounter some problems such as the lack of robustness and security. In this paper, a new encryption algorithm is proposed, which encrypts the plaintext based on alternant of the stream cipher and block cipher. A pseudo-random number is used to control which encryption mode is chosen. Using this algorithm, multiple kinds of files (such as TXT, DOC, WMA, and JPEG) are encrypted and decrypted, and the security of the proposed cryptosystem is analyzed. The results show that the security of the cryptosystem is intensified and the proposed algorithm can resist differential attacks.

[1]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[2]  Xuanqin Mou,et al.  Chaotic encryption scheme for real-time digital video , 2002, IS&T/SPIE Electronic Imaging.

[3]  Yiu-ming Cheung,et al.  Security of public key encryption technique based on multiple chaotic systems , 2005, nlin/0510017.

[4]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[5]  Kwok-Wo Wong,et al.  Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.

[6]  T. Chai,et al.  Adaptive synchronization between two different chaotic systems with unknown parameters , 2006 .

[7]  M. Baptista Cryptography with chaos , 1998 .

[8]  Song Han,et al.  Security of a key agreement protocol based on chaotic maps , 2008 .

[9]  Xiaofeng Liao,et al.  Using time-stamp to improve the security of a chaotic maps-based key agreement protocol , 2008, Inf. Sci..

[10]  Xiaofeng Liao,et al.  A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..

[11]  Z. Ji,et al.  Cryptanalysis of a Class of Chaotic Stream Ciphers (一类混沌流密码的分析) , 2003 .

[12]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[13]  Ranjan Bose,et al.  Novel public key encryption technique based on multiple chaotic systems. , 2005, Physical review letters.

[14]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[15]  Xingyuan Wang,et al.  A NEW CHAOTIC CRYPTOGRAPHY BASED ON ERGODICITY , 2008 .

[16]  P. Sooraksa,et al.  A design of stream cipher based on multi-chaotic functions , 2004, IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004..

[17]  Yanjun Liu,et al.  Adaptive robust fuzzy control for a class of uncertain chaotic systems , 2009 .

[18]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[19]  Yumin Wang,et al.  A research on new public-key encryption schemes , 2005, Appl. Math. Comput..

[20]  Vinod Patidar,et al.  Cryptography using multiple one-dimensional chaotic maps , 2005 .

[21]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[22]  X. Liao,et al.  Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map , 2007 .

[23]  X. Liao,et al.  A novel block cryptosystem based on iterating a chaotic map , 2006 .

[24]  Yan-Jun Liu,et al.  Adaptive fuzzy control for a class of uncertain nonaffine nonlinear systems , 2007, Inf. Sci..

[25]  G. Álvarez,et al.  Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .

[26]  Shaocheng Tong,et al.  Robust Adaptive Tracking Control for Nonlinear Systems Based on Bounds of Fuzzy Approximation Parameters , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[27]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[28]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[29]  Ljupco Kocarev,et al.  Differential and linear probabilities of a block-encryption cipher , 2003 .

[30]  Kwok-wo Wong,et al.  A modified chaotic cryptographic method , 2001 .

[31]  Kwok-Wo Wong,et al.  Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps , 2007 .

[32]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[33]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.