A new 3D chaotic cipher for encrypting two data streams simultaneously

A new three-dimensional (3D) discrete chaotic cipher is proposed which is based on the 3D Lorenz chaotic system. Non-autonomous modulation which is used in continuous chaotic cryptographic systems is employed to encrypt two messages simultaneously. Each pair of data values is encrypted twice so that only one state variable need be transmitted. The proposed algorithm has a simple structure and so is suitable for practical applications. The cryptographic properties are analyzed. Results are presented which show that this algorithm provides excellent security and is resistant to existing attacks such as those based on synchronization.

[1]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[2]  Michael Peter Kennedy,et al.  Chaos shift keying : modulation and demodulation of a chaotic carrier using self-sychronizing chua"s circuits , 1993 .

[3]  Leon O. Chua,et al.  Secure communication via chaotic parameter modulation , 1996 .

[4]  Vinod Patidar,et al.  A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption , 2011 .

[5]  Louis M. Pecora,et al.  Synchronizing chaotic circuits , 1991 .

[6]  U. Parlitz,et al.  A SIMPLE METHOD TO REVEAL THE PARAMETERS OF THE LORENZ SYSTEM , 1996 .

[7]  Gonzalo Alvarez,et al.  Breaking projective chaos synchronization secure communication using filtering and generalized synchronization , 2004, Chaos, Solitons & Fractals.

[8]  Sattar Mirzakuchaki,et al.  A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..

[9]  Hui Wang,et al.  Integrability and exact solutions of the nonautonomous mixed mKdV-sinh-Gordon equation , 2014, Commun. Nonlinear Sci. Numer. Simul..

[10]  Xingyuan Wang,et al.  A new image encryption algorithm based on chaos , 2012 .

[11]  Xing-yuan Wang,et al.  A new image alternate encryption algorithm based on chaotic map , 2014, Nonlinear Dynamics.

[12]  Hanping Hu,et al.  Analyzing and improving a chaotic encryption method , 2004 .

[13]  Ta-lun Yang,et al.  Breaking chaotic switching using generalized synchronization: examples , 1998 .

[14]  Hua Wang,et al.  Image encryption based on synchronization of fractional chaotic systems , 2014, Commun. Nonlinear Sci. Numer. Simul..

[15]  Safya Belghith,et al.  OCML-based colour image encryption , 2009 .

[16]  Hongjun Liu,et al.  Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..

[17]  X. Niu,et al.  A hybrid chaotic system and cyclic elliptic curve for image encryption , 2013 .

[18]  Xiaoling Huang,et al.  An image encryption algorithm based on hyper-chaos and DNA sequence , 2012, Multimedia Tools and Applications.

[19]  Seiichi Uchida,et al.  A parallel image encryption method based on compressive sensing , 2012, Multimedia Tools and Applications.

[20]  Mohamed I. Sobhy,et al.  Secure Computer Communication using Chaotic Algorithms , 2000, Int. J. Bifurc. Chaos.

[21]  Leon O. Chua,et al.  Experimental Demonstration of Secure Communications via Chaotic Synchronization , 1992, Chua's Circuit.

[22]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[23]  Guanrong Chen,et al.  Breaking a chaos-based secure communication scheme designed by an improved modulation method , 2004, nlin/0411007.

[24]  Ri-Gui Zhou,et al.  Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations , 2013 .

[25]  Gonzalo Alvarez,et al.  A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis , 2010, Communications in Nonlinear Science and Numerical Simulation.

[26]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[27]  A. Kanso,et al.  A novel image encryption algorithm based on a 3D chaotic map , 2012 .

[28]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[29]  Sudhish N. George,et al.  A novel approach for secure compressive sensing of images using multiple chaotic maps , 2014 .

[30]  Vadim S. Anishchenko,et al.  Correlation analysis of dynamical chaos , 2003 .

[31]  Ercan Solak,et al.  Partial identification of Lorenz system and its application to key space reduction of chaotic cryptosystems , 2004, IEEE Transactions on Circuits and Systems II: Express Briefs.

[32]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[33]  G. Álvarez,et al.  Breaking parameter modulated chaotic secure communication system , 2003, nlin/0311041.

[34]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[35]  Wei Liu,et al.  Optical color image hiding scheme based on chaotic mapping and Hartley transform , 2013 .

[36]  G. Ye A block image encryption algorithm based on wave transmission and chaotic systems , 2013, Nonlinear Dynamics.

[37]  Chun-Mei Yang,et al.  Cryptanalyzing chaotic secure communications using return maps , 1998 .