A Novel Method to Identify Initial Values of Chaotic Maps in Cybersecurity

Chaos theory has applications in several disciplines and is focusing on the behavior of dynamical systems that are highly sensitive to initial conditions. Chaotic dynamics are the impromptu behavior displayed by some nonlinear dynamical frameworks and have been used as a source of diffusion in cybersecurity for more than two decades. With the addition of chaos, the overall strength of communication security systems can be increased, as seen in recent proposals. However, there is a major drawback of using chaos in communication security systems. Chaotic communication security systems rely on private keys, which are the initial values and parameters of chaotic systems. This paper shows that these chaotic communication security systems can be broken by identifying those initial values through the statistical analysis of standard deviation and variance. The proposed analyses are done on the chaotic sequences of Lorenz chaotic system and Logistic chaotic map and show that the initial values and parameters, which serve as security keys, can be retrieved and broken in short computer times. Furthermore, the proposed model of identifying the initial values can also be applied on other chaotic maps as well.

[1]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[2]  Iqtadar Hussain,et al.  A technique for digital steganography using chaotic maps , 2014 .

[3]  Zeeshan Ahmed,et al.  A Technique for Designing Substitution Box Based on Van der Pol Oscillator , 2015, Wirel. Pers. Commun..

[4]  Iqtadar Hussain,et al.  A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps , 2018, The European Physical Journal Plus.

[5]  Anil K. Jain,et al.  Validating a Biometric Authentication System: Sample Size Requirements , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  M. U. Akhmet,et al.  Entrainment by Chaos , 2012, J. Nonlinear Sci..

[7]  M. Bucolo,et al.  Nonlinear systems synchronization for modeling two-phase microfluidics flows , 2018 .

[8]  Hongjun Liu,et al.  Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..

[9]  Iqtadar Hussain,et al.  An extended image encryption using chaotic coupled map and S-box transformation , 2014, Nonlinear Dynamics.

[10]  Sharath Pankanti,et al.  Evaluation techniques for biometrics-based authentication systems (FRR) , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[11]  Adil Masood Siddiqui,et al.  A technique for digital watermarking in combined spatial and transform domains using chaotic maps , 2013, 2013 2nd National Conference on Information Assurance (NCIA).

[12]  Iqtadar Hussain,et al.  A novel algorithm for thermal image encryption. , 2018, Journal of integrative neuroscience.

[13]  R. Fisher XV.—The Correlation between Relatives on the Supposition of Mendelian Inheritance. , 1919, Transactions of the Royal Society of Edinburgh.

[14]  Fawad Ahmed,et al.  Hash-Based Authentication of Digital Images in Noisy Channels , 2015 .

[15]  Anil K. Jain,et al.  On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[16]  Relativistic chaos in the anisotropic harmonic oscillator , 2018, Chaos, Solitons & Fractals.

[17]  Lea F. Santos,et al.  Realistic Many-Body Quantum Systems vs. Full Random Matrices: Static and Dynamical Properties , 2016, Entropy.

[18]  Luigi Fortuna,et al.  Experimental robust synchronization of hyperchaotic circuits , 2009 .

[19]  Tariq Shah,et al.  A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems , 2012, Nonlinear Dynamics.

[20]  L. Penrose,et al.  THE CORRELATION BETWEEN RELATIVES ON THE SUPPOSITION OF MENDELIAN INHERITANCE , 2022 .

[21]  Stefan Balint,et al.  Chaotic Dynamics of a Delayed Discrete-Time Hopfield Network of Two Nonidentical Neurons with no Self-Connections , 2008, J. Nonlinear Sci..

[22]  Amir Anees,et al.  Construction of Nonlinear Component for Block Cipher Based on One-Dimensional Chaotic Map , 2015 .

[23]  Sanjay Kumar,et al.  Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing , 2015, Entropy.

[24]  E. Lega,et al.  Geometric chaos indicators and computations of the spherical hypertube manifolds of the spatial circular restricted three-body problem , 2018, Physica D: Nonlinear Phenomena.

[25]  Paul C.-P. Chao,et al.  Chaotic Synchronizing Systems with Zero Time Delay and Free Couple via Iterative Learning Control , 2018 .

[26]  Robert M. May,et al.  Simple mathematical models with very complicated dynamics , 1976, Nature.

[27]  Robwt,et al.  Biological Populations Obeying Difference Equations : Stable Points , Stable Cycles , and Chaos , 2003 .

[28]  Iqtadar Hussain,et al.  Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications , 2018, Chinese Journal of Physics.

[29]  Anton V. Doroshin Chaos as the hub of systems dynamics. The part I--The attitude control of spacecraft by involving in the heteroclinic chaos , 2018, Commun. Nonlinear Sci. Numer. Simul..

[30]  P.R.L. Alves,et al.  Detecting chaos and predicting in Dow Jones Index , 2018 .

[31]  R M May,et al.  Biological Populations with Nonoverlapping Generations: Stable Points, Stable Cycles, and Chaos , 1974, Science.

[32]  Amir Anees,et al.  An Image Encryption Scheme Based on Lorenz System for Low Profile Applications , 2015 .

[33]  Mohammed Yakoob Siyal,et al.  A Noisy Channel Tolerant Image Encryption Scheme , 2014, Wireless Personal Communications.

[34]  Iqtadar Hussain,et al.  Application of Mean of Absolute Deviation Method for the Selection of Best Nonlinear Component Based on Video Encryption , 2013 .

[35]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[36]  Geoff Boeing,et al.  Visual Analysis of Nonlinear Dynamical Systems: Chaos, Fractals, Self-Similarity and the Limits of Prediction , 2016, Syst..

[37]  A. Akhavan,et al.  A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .

[38]  Amir Anees,et al.  Analysis of optimized signal processing algorithms for smart antenna system , 2012, Neural Computing and Applications.

[39]  Adil Masood Siddiqui,et al.  Chaotic substitution for highly autocorrelated data in encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..

[40]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[41]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[42]  Ishfaq Ahmad,et al.  On Some Statistical Approximation by (p, q)-Bleimann, Butzer and Hahn Operators , 2018, Symmetry.

[43]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[44]  P. Verhulst Recherches mathématiques sur la loi d’accroissement de la population , 2022, Nouveaux mémoires de l'Académie royale des sciences et belles-lettres de Bruxelles.

[45]  Mohamed I. Sobhy,et al.  Methods of attacking chaotic encryption and countermeasures , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[46]  Sajjad Shaukat Jamal,et al.  An efficient scheme for digital watermarking using chaotic map , 2013 .