Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing

Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have become a topic of active research in computer science and network security such as robotic systems, encryption, and communication. The main aim of deploying a chaos-based cryptosystem is to provide encryption with several advantages over traditional encryption algorithms such as high security, speed, and reasonable computational overheads and computational power requirements. These challenges have motivated researchers to explore novel chaos-based data encryption techniques with digital logics dealing with hiding information for fast secure communication networks. This work provides an overview of how traditional data encryption techniques are revised and improved to achieve good performance in a secure communication network environment. A comprehensive survey of existing chaos-based data encryption techniques and their application areas are presented. The comparative tables can be used as a guideline to select an encryption technique suitable for the application at hand. Based on the limitations of the existing techniques, an adaptive chaos based data encryption framework of secure communication for future research is proposed

[1]  Jing Yu,et al.  Cryptography with two discretized chaotic maps , 2013, 2013 8th International Conference on Computer Science & Education.

[2]  Ljupco Kocarev,et al.  Theory and practice of chaotic cryptography , 2007 .

[3]  William L. Ditto,et al.  Principles and applications of chaotic systems , 1995, CACM.

[4]  Peng Shi,et al.  Sampled-Data Synchronization of Chaotic Lur'e Systems With Time Delays , 2013, IEEE Transactions on Neural Networks and Learning Systems.

[5]  Zhong Zhang,et al.  The research of hardware encryption card based on chaos , 2013, PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System.

[6]  Wolfgang Schwarz,et al.  General Design Rules for Chaos-Based Encryption Systems , 2005 .

[7]  Chun-Liang Lin,et al.  Text encryption using ECG signals with chaotic Logistic map , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.

[8]  Tao Yang,et al.  A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .

[9]  Xinhua Wu,et al.  A new digital anti-counterfeiting scheme based on chaotic cryptography , 2012, 2012 International Conference on ICT Convergence (ICTC).

[10]  Jinhong Luo,et al.  Research of Chaos Encryption Algorithm Based on Logistic Mapping , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[11]  Ercan Solak,et al.  Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps , 2008 .

[12]  Jing Yu,et al.  Selection of chaotic states in cryptosystem based on chaos with differential analysis , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).

[13]  S. Durga Bhavani,et al.  Symmetric encryption using logistic map , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).

[14]  Kwok-Wo Wong,et al.  Embedding Compression in Chaos-Based Cryptography , 2008, IEEE Transactions on Circuits and Systems II: Express Briefs.

[15]  Safwan El Assad,et al.  Chaos based improvement of the security of ZigBee and Wi-Fi networks used for industrial controls , 2011, International Conference on Information Society (i-Society 2011).

[16]  Leon O. Chua,et al.  Secure Communications via Chaotic Synchronization II: Noise Reduction by Cascading Two Identical Receivers , 1993 .

[17]  K. Ramar,et al.  Public Key Cryptosystems Based on Chaotic-Chebyshev Polynomials , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[18]  Safwan El Assad,et al.  A New Chaotic Encryption Algorithm to Enhance the Security of ZigBee and Wi-Fi networks , 2012 .

[19]  A.K. Aboulsoud,et al.  Cryptographic schemes using chaotic system , 2008, 2008 National Radio Science Conference.

[20]  Jing Yu,et al.  A novel authentication scheme based on chaos , 2013, 2013 8th International Conference on Computer Science & Education.

[21]  Jing Yu,et al.  Application of unicity distance in a cryptosystem based on chaos , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).

[22]  Fei Peng,et al.  An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos , 2013, IEEE Transactions on Information Forensics and Security.

[23]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[24]  Abbas Dandache,et al.  New hardware Cryptosystem based chaos for the secure real-time of embedded applications , 2011, 2011 IEEE Workshop on Signal Processing Systems (SiPS).

[25]  Yong-Peng Xiao,et al.  An Encrypt Approach using Dynamic Encrypt Keys , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[26]  Chin-Hsing Chen,et al.  A chaos-based multiple security encryption system for compressed video , 2011 .

[27]  Guanrong Chen,et al.  Block cipher design: Generalized single-use-algorithm based on chaos , 2011 .

[28]  X. Mou,et al.  Improving security of a chaotic encryption approach , 2001, Physics Letters A.

[29]  Joseph Zambreno,et al.  A chaotic encryption scheme for real-time embedded systems: design and implementation , 2013, Telecommun. Syst..

[30]  Zhiliang Zhu,et al.  Cryptanalysis and Improvement on a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems , 2009, 2010 International Workshop on Chaos-Fractal Theories and Applications.

[31]  Ljupco Kocarev,et al.  Chaos-based Cryptography: an overview , 2005 .

[32]  Shujun Li,et al.  Determination of the Parameters for a Lorenz System and Application to Break the Security of Two-channel Chaotic Cryptosystems , 2008 .

[33]  Mohamed I. Sobhy,et al.  Chaotic algorithms for data encryption , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[34]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[35]  Ercan Solak Cryptanalysis of Observer Based Discrete-Time Chaotic Encryption Schemes , 2005, Int. J. Bifurc. Chaos.

[36]  Safwan El Assad,et al.  Chaos Based Information Hiding and Security , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[37]  P. Borne,et al.  Synchronization of discrete-time hyperchaotic maps based on aggregation technique for encryption , 2012, International Multi-Conference on Systems, Sygnals & Devices.

[38]  William Puech,et al.  A New Joint Lossless Compression and Encryption Scheme Combining a Binary Arithmetic Coding With a Pseudo Random Bit Generator , 2010 .

[39]  A. Palacios,et al.  Cryptography with cycling chaos , 2002 .

[40]  Chuandong Li,et al.  A secure communication scheme based on symbolic dynamics , 2004, 2004 International Conference on Communications, Circuits and Systems (IEEE Cat. No.04EX914).

[41]  G. Álvarez,et al.  Cryptanalysis of a chaotic encryption system , 2000 .

[42]  Y. Mu,et al.  Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding , 2013, Journal of Lightwave Technology.

[43]  Wolfgang A. Halang,et al.  Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey , 2007, ArXiv.

[44]  Stamatios V. Kartalopoulos Chaotic quantum cryptography: The ultimate for network security , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[45]  Jing Pan,et al.  The Research of Chaos-based SMS Encryption in Mobile Phone , 2012, 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control.

[46]  O. A. Fakolujo,et al.  LORENZ-BASED CHAOTIC SECURE COMMUNICATION SCHEMES , 2011 .

[47]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[48]  Long Jye Sheu,et al.  A Two-Channel Secure Communication Using Fractional Chaotic Systems , 2010 .

[49]  Ismail Mansour,et al.  Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[50]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[51]  Jiashu Zhang,et al.  Cryptanalysis of the chaotic-based key agreement protocols , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[52]  S. Ge,et al.  Adaptive synchronization of uncertain chaotic systems via backstepping design , 2001 .

[53]  Roland Schmitz,et al.  Use of chaotic dynamical systems in cryptography , 2001, J. Frankl. Inst..

[54]  Ilango Paramasivam,et al.  Higher dimensional chaos for Audio encryption , 2013, 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[55]  Kun Li,et al.  A new chaotic secure communication system , 2003, IEEE Trans. Commun..

[56]  Kwok-Wo Wong,et al.  Simultaneous Arithmetic Coding and Encryption Using Chaotic Maps , 2010, IEEE Transactions on Circuits and Systems II: Express Briefs.

[57]  Daniel Curiac,et al.  Chaos-Based Cryptography: End of the Road? , 2007, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007).

[58]  Sundarapandian Vaidyanathan,et al.  COMPLETE SYNCHRONIZATION OF HYPERCHAOTIC XU AND HYPERCHAOTIC LÜ SYSTEMS VIA ACTIVE CONTROL , 2012 .

[59]  Chenhui Jin,et al.  Cryptanalysis of a Chaos-based Stream Cipher , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[60]  Rogelio Hasimoto Beltrán Low-complexity chaotic encryption system , 2009 .

[61]  Brad Aimone,et al.  Chaotic Circuits and Encryption , 2006 .