A New Method of Encryption Algorithm Based on Chaos and ECC

Chaotic encryption algorithm represents a new encryption way with less memory consumption and operation time. However, the chaotic sequences will cause the phenomenon of short period due to the computational accuracy of hardware processing, which brings the security problem. The Elliptic Curve Cryptography (ECC), which is famous for its high efficiency, has been proved as one of the most safe and effective public key cryptosystems. But it is inefficient to improve the security from increasing the length of key. This paper aims to improve its security through combining the chaotic encryption algorithm and the ellipse encryption algorithm. In this paper, we design a encryption method that processes the plaintext using the one-dimension Logistic sequence before encrypting it to provide the first level of security, and encrypts it using ECC encryption algorithm which had been optimized to provide the second level of security. It does not only improve the security comparing with the individual algorithm, but also avoid the resource consumption caused by increasing the length of the key in ECC encryption system.

[1]  Erich Wenger,et al.  Harder, better, faster, stronger: elliptic curve discrete logarithm computations on FPGAs , 2016, Journal of Cryptographic Engineering.

[2]  Mohammad S. Obaidat,et al.  A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography , 2017, Int. J. Comput. Math..

[3]  Jing Pan,et al.  A New Improved Scheme of Chaotic Masking Secure Communication Based on Lorenz System , 2012, Int. J. Bifurc. Chaos.

[4]  Jing Pan,et al.  Design and Hardware Implementation of FPGA & Chaotic Encryption-based Wireless Transmission System , 2011, 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control.

[5]  M. Aswatha Kumar,et al.  Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p) , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[6]  Leon O. Chua,et al.  Cryptography based on chaotic systems , 1997 .

[7]  Geng Zhao,et al.  Research on Elliptic Curve Cryptographic Algorithms Based on Chaotic System , 2013, 2013 International Conference on Computer Sciences and Applications.

[8]  Guo Kui,et al.  A new elliptic curve cryptosystem algorithm based on the system of chebyshev polynomial , 2014, 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference.

[9]  Li Man-gui Study on Public Key Infrastructure in Support of Public Key Cryptographic Algorithm SM2 based on Elliptic Curves , 2011 .

[10]  Asif Ullah Khan,et al.  Proposed Method for Multimedia Data Security Using Cyclic Elliptic Curve, Chaotic System, and Authentication Using Neural Network , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[11]  Qiang Liu,et al.  FPGA Design and Applicable Analysis of Discrete Chaotic Maps , 2014, Int. J. Bifurc. Chaos.

[12]  Arjen K. Lenstra,et al.  On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography , 2009, IACR Cryptol. ePrint Arch..

[13]  Yuh-Min Tseng,et al.  Efficient searchable ID-based encryption with a designated server , 2014, Ann. des Télécommunications.

[14]  Yuh-Min Tseng,et al.  Efficient Revocable Multi-Receiver ID-Based Encryption , 2013, Inf. Technol. Control..

[15]  Shay Gueron,et al.  Fast software implementation of binary elliptic curve cryptography , 2015, Journal of Cryptographic Engineering.

[16]  Tim Güneysu,et al.  Utilizing hard cores of modern FPGA devices for high-performance cryptography , 2011, Journal of Cryptographic Engineering.

[17]  Q. Ding,et al.  Research on the quantifications of chaotic random number generators , 2013 .

[18]  Kazuhiro Yokoyama,et al.  Elliptic curve cryptosystem , 2000 .

[19]  Edlyn Teske,et al.  Speeding Up Pollard's Rho Method for Computing Discrete Logarithms , 1998, ANTS.

[20]  Joe Suzuki,et al.  Elliptic Curve Discrete Logarithms and the Index Calculus , 1998, ASIACRYPT.

[21]  M. Baptista Cryptography with chaos , 1998 .

[22]  Kwok-Wo Wong,et al.  A random number generator based on elliptic curve operations , 2004 .