Hybrid encryption algorithm (HEA) based on chaotic system
- PDF / 4,906,650 Bytes
- 12 Pages / 595.276 x 790.866 pts Page_size
- 45 Downloads / 203 Views
(0123456789().,-volV)(0123456789().,-volV)
METHODOLOGIES AND APPLICATION
Hybrid encryption algorithm (HEA) based on chaotic system Mimoun Hamdi1,2
•
Jamel Miri1 • Borhane Moalla2
Springer-Verlag GmbH Germany, part of Springer Nature 2020
Abstract In this paper, we present a very simple and efficient hybrid encryption algorithm based on block and stream ciphers using chaotic systems. Due to the specific characteristics of chaotic systems which are described by a set of nonlinear deterministic dynamic equations, chaos-based encryption achieves a very high level of security. The chaotic system used in this algorithm is Chirikov Standard Map, which is chosen in order to further minimize the encryption time. The proposed scheme adopts two main operations one to generate pseudorandom data block that will be used for stream cipher, and the second to create substitution and permutation tables in initial step and perform rounds for confusion and diffusion processes in block cipher. Some cryptographic tests and metrics are applied to measure the degree of security and analyze the performance of the encryption scheme. The evaluation and simulation analysis indicate that our proposal possesses excellent cryptographic properties; it is extremely sensitive to the small change in secret key, resists against common cryptanalytic attacks, has a high speed and easy to implement. Keywords Encryption Block and stream cipher Chaotic systems Substitution–permutation network
1 Introduction The increased need for confidentiality in the communication systems always leads to develop new techniques and algorithms for encryption. These algorithms must be fast enough to avoid further delay in operation. The theory of nonlinear systems has been recently applied to cryptography in order to increase the level of security. Many schemes of chaotic systems (Jakimoski and Kocarev 2001; Hua et al. 2018a, b, 2019; Francois et al. 2013; Zhang and Tang 2018; Patidar et al. 2009; Wang et al. 2013; Ghebleh et al. 2018; C¸avus¸ og˘lu et al. 2017; Asgari-Chenaghlu et al. 2019; Masuda and Aihara 2002; Farajallah et al. 2016; Chen et al. 2018; Ye et al. 2018; Xu et al. 2016, 2017) are proposed to cure the weaknesses of classical encryption algorithms such as International Data Encryption Communicated by V. Loia. & Mimoun Hamdi [email protected] 1
Higher School of Communication of Tunis, University of Carthage, Technological City of Communications Raoued Km 3, 5, 2083 Ariana, Tunisia
2
Military Academy of Tunis, Military Academy Foundouk Je´did, 8012 Nabeul, Tunisia
Algorithm (IDEA), Advanced Encryption Standard (AES) and Rivest, Shamir, Adleman (RSA) that are becoming unable to resist against quantum attacks and increasingly less efficient to achieve fast and secure encryption simultaneously for large size data (Francois et al. 2013; Cheng et al. 2017; Ye et al. 2018; Hamdi et al. 2016, 2017; Chai et al. 2017; Teng et al. 2018). Research has shown that chaos-based encryption achieves a very high level of security, efficiently and adaptively
Data Loading...