Symmetric Key Encryption Based on Rotation-Translation Equation

In this paper, an improved encryption algorithm based on numerical methods and rotation–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key. Symmetric key algorithms use the same key for both encryption and decryption. Most symmetric key encryption algorithms use either block ciphers or stream ciphers. Our goal in this work is to improve an existing encryption algorithm by using a faster convergent iterative method, providing secure convergence of the corresponding numerical scheme, and improved security by a using rotation–translation formula.

[1]  Lequan Min,et al.  A 6 dimensional chaotic generalized synchronization system and design of pseudorandom number generator with application in text encryption , 2014 .

[2]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[3]  Amartya Ghosh,et al.  A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY , 2013 .

[4]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[5]  P. Jarratt Some fourth order multipoint iterative methods for solving equations , 1966 .

[6]  Ioannis M. Kyprianidis,et al.  Text Encry ption Scheme Realized with a Chaotic Pseudo - Random Bit Generator , 2013 .

[7]  Majid Babaei,et al.  A novel text and image encryption method based on chaos theory and DNA computing , 2012, Natural Computing.

[8]  Krasimir Kordov,et al.  Image Encryption Using Chebyshev Map and Rotation Equation , 2015, Entropy.

[9]  Indrajit Banerjee,et al.  Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map , 2019, J. Inf. Secur. Appl..

[10]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[11]  L. Cardoza-Avendaño,et al.  A novel pseudorandom number generator based on pseudorandomly enhanced logistic map , 2016, Nonlinear Dynamics.

[12]  J. Traub Iterative Methods for the Solution of Equations , 1982 .

[13]  Chun-Liang Lin,et al.  Text encryption using ECG signals with chaotic Logistic map , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.

[14]  C. Sanchez-Avila,et al.  The Rijndael block cipher (AES proposal) : a comparison with DES , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).

[15]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[16]  Kui Wu,et al.  DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem , 2012, SecureComm.

[17]  Gulshan Singh,et al.  On the Location of Zeros of Polynomials , 2011, Am. J. Comput. Math..

[18]  M. A. Murillo-Escobar,et al.  A novel symmetric text encryption algorithm based on logistic map , 2014 .

[19]  Xing-Yuan Wang,et al.  New chaotic encryption algorithm based on chaotic sequence and plain text , 2014, IET Inf. Secur..

[20]  Vejdi I. Hasanov,et al.  On some families of multi-point iterative methods for solving nonlinear equations , 2006, Numerical Algorithms.

[21]  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application , 2001 .

[22]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[23]  Madhumita Panda,et al.  Plain Text Encryption Using AES, DES and SALSA20 by Java Based Bouncy Castle API on Windows and Linux , 2015, 2015 Second International Conference on Advances in Computing and Communication Engineering.

[24]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[25]  Zahraddeen Abubakar Pindar,et al.  A Survey on the Cryptographic Encryption Algorithms , 2017 .

[26]  Rajesh Bansode,et al.  AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection , 2016 .

[27]  Ioannis M. Kyprianidis,et al.  Text encryption device based on a chaotic random bit generator , 2018, 2018 IEEE 9th Latin American Symposium on Circuits & Systems (LASCAS).

[28]  Christos H. Skiadas,et al.  Chaotic Modelling and Simulation: Analysis of Chaotic Models, Attractors and Forms , 2008 .

[29]  Christos K. Volos,et al.  Secure Text Encryption Based on Hardware Chaotic Noise Generator , 2014 .

[30]  James Demmel,et al.  IEEE Standard for Floating-Point Arithmetic , 2008 .

[31]  Y. Hassoun,et al.  Entropy model for symmetric key cryptography algorithms based on numerical methods , 2015, 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR).

[32]  Leonhard Euler Public-Key Cryptosystem , 2011, Encyclopedia of Cryptography and Security.

[33]  Xuejia Lai,et al.  A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.

[34]  Akif Akgul,et al.  Text encryption by using one-dimensional chaos generators and nonlinear equations , 2013, 2013 8th International Conference on Electrical and Electronics Engineering (ELECO).

[35]  Jiasong Wu,et al.  A Novel Chaos-Based Symmetric Image Encryption Using Bit-Pair Level Process , 2019, IEEE Access.