Abstract

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
 While using chaotic maps, in the suggested system, called Chaotic-based Proposed Feistel Cipher System (CPFCS), we made the confusion and diffusion in dynamical behavior based on Standard and Lorenz maps. The first is used for substitution, and the second one for permutation operations .A proposed cryptographic system uses the same work (the same way) for both enciphering and deciphering. The proposed cipher operates on more than 500 bytes (4000-bit) readable text blocks by six round computing. Within the basic operator of the cipher, i.e., in the function of the round F, a dynamical lookup table 2D standard map system is used to enhance the complexity and diffusion of the unreadable text. Also, a 3D Logistic map used for key sequence generator and chaos based dynamical Initial Permutation (dynamical IP) are used to increase the diffusion and confusion. Three different image sizes and three different text length were implemented in CPFCS. The results of the proposed system and security tests improve the applicability of PFCS in the data protection and security.

Highlights

  • In the past years, chaos theory has big attention for many papers researchers and been widely used in the fields of coding and security of data and secure connecting benefit from its great properties such as periodicity, unability to predict, and sensitivity to the seed and parameters which met some conditions such as diffusion and confusion in the sensibility of coding

  • 3 D logistic map is used for key generation, while 4 D Lorenz for permutation, 2D standard map for substitution operation, Gauss iterated map for enciphering/ deciphering operations and the controls parameter values for all chaos methods are kept without any change in the chaotic domain throughout the algorithm

  • The domain produced by the logistics maps, based upon the secretive keys used in the propose algorithm, is passed to the 4D Lorenz maps and 2D standard maps

Read more

Summary

Introduction

In the past years, chaos theory has big attention for many papers researchers and been widely used in the fields of coding and security of data and secure connecting benefit from its great properties such as periodicity, unability to predict, and sensitivity to the seed and parameters which met some conditions such as diffusion and confusion in the sensibility of coding. As a chaotic system characterizes excellent properties of diffusion and confusion, it is widely used to design various cryptographic schemes, for example, the cryptographic systems based on chaotic maps (1), and chaotic s-box function (2). K. Sud, 2010, 'Block cipher using 1D and 2D chaotic maps', This work, block cipher but with a new chaotic has been presented in henon maps, logistic maps, and secretive keys are be utilized. 2010, 'Block cipher using 1D and 2D chaotic maps', This work, block cipher but with a new chaotic has been presented in henon maps, logistic maps, and secretive keys are be utilized In this suggestion cipher based chaos, diffusion and confusion are completed beside the CBC and secretive keys depend upon permute choice box (6). Z, 2014, "A lightweight Block cipher based on chaotic maps", through that work, a lightweight block cipher applied in the resource-limited environment

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.