A switched chaotic encryption scheme using multi-mode generalized modified transition map

  • PDF / 7,051,026 Bytes
  • 30 Pages / 439.642 x 666.49 pts Page_size
  • 41 Downloads / 171 Views

DOWNLOAD

REPORT


A switched chaotic encryption scheme using multi-mode generalized modified transition map Wafaa S. Sayed1 · Mohammed F. Tolba2 · Ahmed G. Radwan1,2 · Salwa K. Abd-El-Hafiz1 · Ahmed M. Soliman3 Received: 12 February 2020 / Revised: 3 August 2020 / Accepted: 28 August 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract This paper presents a multi-mode generalized modified transition chaotic map and a switched chaotic encryption scheme based on it. Eight different modes of operation can be selected based on the map graph (concave or convex), the range modification procedure (shrinking or widening) and the sign of one of its independent parameters. The generalization and modification preserve the controllability and continuous chaotic behavior properties, respectively. For the same encryption key and map equation, multi-mode operation occurs through switching between four alternatives of the dependent parameters. Switching between various modes is shown to overpass single modes in randomness by investigating the frequency distribution, autocorrelation function, histograms and 0-1 test. In addition, most bits, 75%, of the scaled and quantized chaotic output are shown to be suitable for pseudo-random number generation based on National Institute of Standards & Technology (NIST) statistical test suite. The performance of the proposed scheme is validated for several speech, grayscale and RGB images through various evaluation criteria, where good results are achieved. These criteria include basic perceptual and statistical aspects, the more advanced NIST tests, key sensitivity and robustness against brute force and differential attacks. The efficiency of the scheme is improved by up to three or six times faster than encrypting one sample or one channel of a pixel at a time for speech and image inputs, respectively. The proposed scheme demonstrates good security and efficiency with more applied evaluation criteria compared to similar recent works. Keywords Chaos theory · Discrete chaotic maps · Encryption · Modified transition map · Switching

1 Introduction In recent years, the worldwide spread of the Internet and smart devices allowed massive exchange of multimedia data. Hence, security of different data types and protecting them from third party hackers have evolved even more. Cryptography has a long history and  Wafaa S. Sayed

[email protected]

Extended author information available on the last page of the article.

Multimedia Tools and Applications

dates back to ancient times. Yet, modern technologies have contributed much to this field through, for instance, computer passwords, electronic commerce, chip-based payment cards and digital currencies. Hence, the privacy of speech, images and video content in mobile and telephone communication, e-learning, video conferencing and news broadcasting needs protection. Standard ciphers such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES) [22] suffer from high computational complexity, which makes them unsuitable