Comparative Study of 1-D Chaotic Generators for Digital Data Encryption

The security of transmitted digital information through a channel, against passive or active attacks, becomes more and more important. The use of a 1-D chaotic signal to mask useful information and to make it unrecognizable by an eavesdropper is a field of research in full expansi on. In order to obtain such high-level security; chaotic generat ors used to encrypt digital data, must have desirable dynamical statistical properties such as: noise-like autocorr elation, cross-correlation, uniformity, attractors, etc. In this paper; first, we design, improve and simulate using Matlab some 1-D chaotic generators: Logistic map, PWLCM (PieceWise Linear Chaotic Map) map, Perturbed PWLCM map, Frey map, perturbed Frey map, (n, t)-tailed shifts map a nd perturbed one. Second, we show the importance of perturbed chaotic orbit with a comparative study of the dynamical statistical properties obtained under simulation an d Nist tests.

[1]  Calin Vladeanu Optimum chaotic quantized sequences for asynchronous DS-CDMA system , 2005, 2005 13th European Signal Processing Conference.

[2]  Sang Tao,et al.  Perturbance-based algorithm to expand cycle length of chaotic key stream , 1998 .

[3]  D. R. Frey,et al.  Chaotic digital encoding: an approach to secure communication , 1993 .

[4]  Gianluca Mazzini,et al.  A tensor approach to higher order expectations of quantized chaotic trajectories. I. General theory and specialization to piecewise affine Markov systems , 2000 .

[5]  John H. Smith Preparation of Papers for the IAENG International Journal of Computer Science , 2009 .

[6]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[7]  Safwan El Assad,et al.  DIGITAL CHAOTIC CODEC FOR DS-CDMA COMMUNICATION SYSTEMS , 2006 .

[8]  Gonzalo Alvarez,et al.  Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.

[9]  Borko Furht,et al.  Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[10]  Daniele Fournier-Prunaret,et al.  Features analysis of a parametric PWL chaotic map and its utilization for secure transmissions , 2008 .

[11]  Shujun Li,et al.  Analyses and New Designs of Digital Chaotic Ciphers , 2003 .