Abstract

Nowadays, in the modern digital era, the use of computer technologies such as smartphones, tablets and the Internet, as well as the enormous quantity of confidential information being converted into digital form have resulted in raised security issues. This, in turn, has led to rapid developments in cryptography, due to the imminent need for system security. Low-dimensional chaotic systems have low complexity and key space, yet they achieve high encryption speed. An image encryption scheme is proposed that, without compromising the security, uses reasonable resources. We introduced a chaotic dynamic state variables selection procedure (CDSVSP) to use all state variables of a hyper-chaotic four-dimensional dynamical system. As a result, less iterations of the dynamical system are required, and resources are saved, thus making the algorithm fast and suitable for practical use. The simulation results of security and other miscellaneous tests demonstrate that the suggested algorithm excels at robustness, security and high speed encryption.

Highlights

  • Along with the swift advancement of communications and computer literacy, the use of multimedia applications has progressed quickly in all sections of society, because of their simple perspective and appealing appearance

  • In the theory of cryptanalysis, the security of an encryption algorithm is determined by its key space

  • The usage of two independent keys in the permutation and diffusion stage, which is breakable by a known plaintext attack, can be pointed out as another drawback. These deficiencies can be counteracted by using higher-dimensional chaotic maps or chaotic dynamical systems, as well as by some improvements, such as time-varying delays [24], couple map lattices, S-box [25], etc

Read more

Summary

Introduction

Along with the swift advancement of communications and computer literacy, the use of multimedia applications has progressed quickly in all sections of society, because of their simple perspective and appealing appearance. The usage of two independent keys in the permutation and diffusion stage, which is breakable by a known plaintext attack, can be pointed out as another drawback These deficiencies can be counteracted by using higher-dimensional chaotic maps or chaotic dynamical systems, as well as by some improvements, such as time-varying delays [24], couple map lattices, S-box [25], etc. The simulation demonstrated an achievement of better results than Chen [26] This cryptosystem can provide the security necessities recommended in [27,28] and deal with the defects present in the broken cryptosystems by making improvements in the following features:. Chaotic state variables are generated from four-dimensional chaotic systems; a minor alteration in the secret key will influence the diffusion stage, and manipulate the permutation at the same time.

Selection Procedure
Diffusion algorithm
Diffusion Algorithm
Proposed Algorithm for Image Encryption and Decryption
Analysis and Simulation Results
Effectiveness Analysis
Efficiency Comparisons
Key Space Analysis
Key Sensitivity Analysis
Histogram
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call