CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Chaotic Map based Block Encryption

by Nisha Kushwah, Madhu Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 16
Year of Publication: 2013
Authors: Nisha Kushwah, Madhu Sharma
10.5120/12442-9134

Nisha Kushwah, Madhu Sharma . Chaotic Map based Block Encryption. International Journal of Computer Applications. 71, 16 ( June 2013), 26-33. DOI=10.5120/12442-9134

@article{ 10.5120/12442-9134,
author = { Nisha Kushwah, Madhu Sharma },
title = { Chaotic Map based Block Encryption },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 16 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number16/12442-9134/ },
doi = { 10.5120/12442-9134 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:35:44.789684+05:30
%A Nisha Kushwah
%A Madhu Sharma
%T Chaotic Map based Block Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 16
%P 26-33
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Number of cryptosystems based on chaos has been proposed, in recent years. Tao Xiang , Kwok-wo Wong, Xiaofeng Liao in 2008 proposed an improved scheme by using a symmetric key block cipher algorithm in which one-dimensional chaotic maps are used, in order to obtain chaotic sequences with better cryptographic feature. In this system, an encryption /decryption scheme was proposed, a cryptographic algorithm using one-dimensional chaotic maps and an external secret key. The chaotic map adopted in this cryptosystem is two logistic maps, and external secret key is of 128-bits. Based on the simulation result, more secure cryptosystem is proposed. As, two logistic maps are used in order to obtain chaotic sequences with improved cryptographic feature. All these advantages make this more secure cryptosystem for the use information transmission over insecure channel and secure application

References
  1. Tao Xiang, Kwok-wo Wong and Xiaofeng Liao, "An improved chaotic cryptosystem with external key", Communications in Nonlinear Science and Numerical Simulation 13, (2008), 1879–1887
  2. Pareek NK, Patidar V and Sud KK, "Discrete chaotic cryptography using external key", Phys Lett A, 2003, 309:75–82. 1886
  3. Pareek NK, Patidar V and Sud KK. "Cryptography using multiple one-dimensional chaotic maps", Commun Nonlinear Sci Numeri Simul, 2005, 10:715–23.
  4. Baptista MS, "Cryptography with chaos", Phys Lett A, 1998, 240:50–4.
  5. Shannon CE, "Communication theory of secrecy systems", Bell Syst Tech J, 1948, 28:656 715.
  6. Vinod Patidar and K. K. Sud, "A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing", Informatica 33, (2009), 441–452 441
  7. Alvarez G, Montoya F, Romera M and Pastor G, "Cryptanalysis of a discrete chaotic cryptosystem using external key", Phys Lett A, 2003, 319:334–9.
  8. Wei J, Liao XF, Wong KW and Zhou T, "Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps", Commun Nonlinear Sci Numeri Simul, 2007, 12:814–22.
  9. Wong WK, Lee LP and Wong KW, "A modified chaotic cryptographic method", Phys Lett A, 2001, 138:234–6.
  10. B. R. Ivan, S. D. Dhodapakar and Q. V. Lavande, "Chaos based Cryptography". Newsletter No. 258, July 2005.
  11. Alvarez G and Shujun Li. "Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems".
  12. David Arroyo1, Gonzalo Alvarez1, and Veronica Fernandez, "On the inadequacy of the logistic map for cryptographic applications".
  13. William Stallings "Cryptography and Network Security Principles and Practices", Fourth Edit
Index Terms

Computer Science
Information Sciences

Keywords

CBC mode Chaotic Cryptography Chaotic map Confusion Diffusion Ergodicity Logistic map Permutation operation