Novel orbit based symmetric cryptosystems

During the last few years considerable effort has been devoted to research related to chaotic encryption. In this paper a new symmetric key cryptosystem that exploits the idea of nonlinear mappings and their fixed points to encrypt information is presented. Furthermore, a measure of the quality of the keys used is introduced. The experimental results indicate that the proposed cryptosystem is efficient and secure to ciphertext-only attacks. Finally, three modifications of the basic cryptosystem that render it more robust are presented and efficiency issues are discussed.

[1]  Božidar V. Popović,et al.  Mathematical and Computer Modelling , 2011 .

[2]  J. Maynard Smith,et al.  Mathematical Ideas in Biology , 1968 .

[3]  Robert L. Devaney,et al.  A piecewise linear model for the zones of instability of an area-preserving map , 1984 .

[4]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[5]  Michael N. Vrahatis,et al.  Computing periodic orbits of nondifferentiable/discontinuous mappings through particle swarm optimization , 2003, Proceedings of the 2003 IEEE Swarm Intelligence Symposium. SIS'03 (Cat. No.03EX706).

[6]  Shoji Miyaguchi,et al.  Fast Data Encipherment Algorithm FEAL , 1987, EUROCRYPT.

[7]  S. Mascolo,et al.  A system theory approach for designing cryptosystems based on hyperchaos , 1999 .

[8]  M. Hénon Numerical study of quadratic area-preserving mappings , 1969 .

[9]  Michael N. Vrahatis,et al.  Solving systems of nonlinear equations using the nonzero value of the topological degree , 1988, TOMS.

[10]  Michael N. Vrahatis,et al.  On the computation of all global minimizers through particle swarm optimization , 2004, IEEE Transactions on Evolutionary Computation.

[11]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[12]  O. Rössler An equation for continuous chaos , 1976 .

[13]  Michael N. Vrahatis,et al.  Algorithm 666: Chabis: a mathematical software package for locating and evaluating roots of systems of nonlinear equations , 1988, TOMS.

[14]  Xuejia Lai,et al.  On the design and security of block ciphers , 1992 .

[15]  Michael N. Vrahatis,et al.  Structure and Breakdown of Invariant Tori in a 4-D Mapping Model of Accelerator Dynamics , 1997 .

[16]  Bruce Schneier One-way hash functions , 1991 .

[17]  Michael N. Vrahatis,et al.  An efficient method for locating and computing periodic orbits of nonlinear mappings , 1995 .

[18]  Leon O. Chua,et al.  Cryptography based on chaotic systems , 1997 .