A New Encryption Method Using Chaotic Logistic Map

Encryption is to rearrange the message into difference form so that the message is keep secret. The goal of encryption is to provide an easy and inexpensive means of encryption and decryption to all authorized users in possession of the appropriate key and difficult and expensive means to estimate the plain text without use of the key Nowadays the Internet becomes popular and encryption technology becomes essential to everyone. Traditional encryption methods such as DES, RSA etc are widely used today and it seems to be computationally secure [1]. The Baptista proposed a Chaotic Encryption Method, which seems to be much better than traditional encryption methods used today [1]. Chaotic encryption is the new direction of cryptography. It makes use of chaotic system properties such as sensitive to initial condition and lot of information. But it still has several problems, such as slow in speed and suffering from floating point operations and has less security. This project is to overcome these problems so that this technique is applicable [3]. The purpose of this project is to learn the method to use chaotic function in security purpose. Thus we can say that the technique of this encryption method for images and data are .more secure as compare to previous encryption method and we are sure that this technique is much more secured and enhanced the security.

[1]  Sodeif Ahadpour,et al.  A Novel Chaotic Image Encryption using Generalized Threshold Function , 2012 .

[2]  Yong Wang,et al.  One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..

[3]  Jiun-In Guo,et al.  A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[4]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[5]  Zhiliang Zhu,et al.  Cryptanalysis and Improvement on a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems , 2009, 2010 International Workshop on Chaos-Fractal Theories and Applications.

[6]  Kai Wang,et al.  Symbolic Vector Dynamics Approach to Initial Condition and Control Parameters Estimation of Coupled Map Lattices , 2008, IEEE Transactions on Circuits and Systems I: Regular Papers.

[7]  Wallace Kit-Sang Tang,et al.  A Chaos-Based Cryptographic Hash Function for Message Authentication , 2005, Int. J. Bifurc. Chaos.

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Jiashu Zhang,et al.  Investigation on Pseudorandom Properties of Chaotic Stream Ciphers , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.

[10]  Xuanqin Mou,et al.  Chaotic encryption scheme for real-time digital video , 2002, IS&T/SPIE Electronic Imaging.

[11]  Sodeif Ahadpour,et al.  A Novel Chaotic Image Encryption using Generalized Threshold Function , 2011, 1112.3791.

[12]  Zengqiang Chen,et al.  Image encryption based on a new total shuffling algorithm , 2008 .

[13]  R. Badlishah Ahmad,et al.  A chaotic neural network-based encryption algorithm for MPEG-2 encoded video signal , 2013, Int. J. Artif. Intell. Soft Comput..

[14]  Donald E. Knuth,et al.  The art of computer programming: sorting and searching (volume 3) , 1973 .

[15]  Alin SUCIU,et al.  GENERATION AND TESTING OF RANDOM NUMBERS FOR CRYPTOGRAPHIC APPLICATIONS , 2012 .

[16]  Vinod Patidar,et al.  Cryptography using multiple one-dimensional chaotic maps , 2005 .

[17]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[18]  Huan Jian,et al.  A NOVEL CHAOS-BASED VIDEO ENCRYPTION ALGORITHM , 2004 .

[19]  Ahmed A. Abd El-Latif,et al.  A chaotic block cipher algorithm for image cryptosystems , 2010 .

[20]  Ali Kanso,et al.  Keyed hash function based on a chaotic map , 2012, Inf. Sci..

[21]  Chuan-Kuei Huang,et al.  Multi chaotic systems based pixel shuffle for image encryption , 2009 .

[22]  M. Baptista Cryptography with chaos , 1998 .

[23]  D. Chattopadhyay,et al.  Robust Chaotic Image Encryption based on Perturbation Technique , 2011 .

[24]  A. Kanso,et al.  Logistic chaotic maps for binary numbers generations , 2009 .

[25]  Mohd Aizaini Maarof,et al.  Randomness analysis of pseudorandom bit sequences , 2009 .

[26]  S. Li,et al.  Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption , 2009 .

[27]  Ali Kanso,et al.  Irregularly Decimated Chaotic Map(S) for Binary Digits Generations , 2009, Int. J. Bifurc. Chaos.

[28]  Sven Schreiber,et al.  Random Number Generation in gretl , 2012 .

[29]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[30]  C. Piccardi On parameter estimation of chaotic systems via symbolic time-series analysis. , 2006, Chaos.

[31]  Rhouma Rhouma,et al.  Cryptanalysis of a new image encryption algorithm based on hyper-chaos , 2008 .

[32]  Hongxia Wang,et al.  Efficient Image Encryption Using a Chaos-based PWL Memristor , 2010 .

[33]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[34]  Guanrong Chen,et al.  A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images , 2004, ISNN.

[35]  Xiaofeng Liao,et al.  A digital secure image communication scheme based on the chaotic Chebyshev map , 2004, Int. J. Commun. Syst..

[36]  Pierre L'Ecuyer,et al.  TestU01: A C library for empirical testing of random number generators , 2006, TOMS.