High-performance multimedia encryption system based on chaos.

Current chaotic encryption systems in the literature do not fulfill security and performance demands for real-time multimedia communications. To satisfy these demands, we propose a generalized symmetric cryptosystem based on N independently iterated chaotic maps (N-map array) periodically perturbed with a three-level perturbation scheme and a double feedback (global and local) to increase the system's robustness to attacks. The first- and second-level perturbations make cryptosystem extremely sensitive to changes in the plaintext data since the system's output itself (ciphertext global feedback) is used in the perturbation process. Third-level perturbation is a system reset, in which the system-key and chaotic maps are replaced for totally new values. An analysis of the proposed scheme regarding its vulnerability to attacks, statistical properties, and implementation performance is presented. To the best of our knowledge we provide a secure cryptosystem with one of the highest levels of performance for real-time multimedia communications.

[1]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[2]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[3]  A. Palacios,et al.  Cryptography with cycling chaos , 2002 .

[4]  Kwok-Wo Wong,et al.  Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.

[5]  Jiun-In Guo,et al.  New voice over Internet protocol technique with hierarchical data security protection , 2002 .

[6]  X. Liao,et al.  A More Secure Chaotic Cryptographic Scheme Based on the Dynamic Look-Up Table , 2005 .

[7]  W. Schwarz,et al.  Chaos and cryptography , 2001 .

[8]  J. Cernák Digital generators of chaos , 1996 .

[9]  S. Li,et al.  Breaking an encryption scheme based on chaotic baker map , 2004, Physics Letters.

[10]  Binder,et al.  Simulating chaotic behavior with finite-state machines. , 1986, Physical review. A, General physics.

[11]  Gonzalo Alvarez,et al.  Chaotic cryptosystems , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[12]  X. Mou,et al.  Performance analysis of Jakimoski–Kocarev attack on a class of chaotic cryptosystems , 2003 .

[13]  Eli Biham,et al.  Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91 , 1991, EUROCRYPT.

[14]  Michael Dellnitz,et al.  Cycling chaos , 1995 .

[15]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[16]  G. Álvarez,et al.  Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .

[17]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[18]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[19]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.

[20]  M. Baptista Cryptography with chaos , 1998 .

[21]  X. Mou,et al.  On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .

[22]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[23]  Sang Tao,et al.  Perturbance-based algorithm to expand cycle length of chaotic key stream , 1998 .

[24]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[25]  Guanrong Chen,et al.  Cryptanalysis of a data security protection scheme for VoIP , 2006 .

[26]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[27]  H. Atmanspacher,et al.  Characterizing spontaneous irregular behavior in coupled map lattices , 2005 .

[28]  Ljupco Kocarev,et al.  Analysis of some recently proposed chaos-based encryption algo-rithms , 2001 .

[29]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .