Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data

Authors

  • Joel Kinganga Department of Mathematics, Statistics and Computer Science, Faculty of Science, University of Kinshasa, Kinshasa, Democratic Republic of the Congo. https://orcid.org/0009-0008-1404-9514
  • Nathanael Kasoro Department of Mathematics, Statistics and Computer Science, Faculty of Science, University of Kinshasa, Kinshasa, Democratic Republic of the Congo. https://orcid.org/0009-0004-2228-6617
  • Alain Musesa Department of Mathematics, Statistics and Computer Science, Faculty of Science, University of Kinshasa, Kinshasa, Democratic Republic of the Congo. https://orcid.org/0009-0008-7583-3759

DOI:

https://doi.org/10.23851/mjs.v36i1.1616

Keywords:

Elliptic curve cryptography, Chaotic functions, Data encryption, Hybrid cryptosystems, Key sensitivity analysis

Abstract

Background: Given the vast amount of data generated daily on the Internet, numerous cryptosystems have been developed to ensure data confidentiality using symmetric, asymmetric, or hybrid encryption techniques. However, many of these systems suffer from limitations such as slow execution times and large key sizes. Objective: This paper presents a novel cryptosystem for text data encryption that integrates elliptic curve cryptography with chaotic functions to enhance data confidentiality and security. Methods: The proposed system utilizes elliptic curve points and pseudo-random numbers generated from a hybrid chaotic map (a fusion of the logistic map, sine map, and piecewise linear chaotic map) to derive short key sizes. Various analyses, including frequency histograms, correlation coefficients, and key sensitivity tests, are conducted to demonstrate the system’s robustness and reliability. Results: The analyses confirm that the fusion of chaotic functions makes the system highly sensitive to initial conditions, thus providing strong protection against unauthorized access. Conclusions: By integrating elliptic curve cryptography with chaotic functions, the proposed cryptosystem effectively addresses the limitations of existing systems, offering enhanced data confidentiality and security through the use of short key sizes and strong sensitivity to initial conditions. 

Downloads

Download data is not yet available.

References

J. Kinganga, N. Kasoro, R. Mabela, K. Kyamakya, and E. K. Kazadi, "HRS-3K: A hybrid encryption system based on matrix computation and RSA with disordered alphabet in Z/44Z," in 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), IEEE, Dec. 2021, pp. 15–21.
CrossRef

P. Kuppuswamy, S. Q. Y. A. K. Al-Maliki, R. John, M. Haseebuddin, and A. A. S. Meeran, "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm," Bulletin of Electrical Engineering and Informatics, vol. 12, no. 2, pp. 1148–1158, 2023.
CrossRef

I. Khalid, T. Shah, S. M. Eldin, D. Shah, M. Asif, and I. Saddique, "An integrated image encryption scheme based on elliptic curve," IEEE Access, vol. 11, pp. 5483–5501, Dec. 2023.
CrossRef

N.-R. Zhou, L.-L. Hu, Z.-W. Huang, M.-M. Wang, and G.-S. Luo, "Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm," Expert Systems with Applications, vol. 238, p. 122 052, Mar. 2024.
CrossRef

X. Zhang and J. Tian, "Multiple-image encryption algorithm based on genetic central dogma," Physica Scripta, vol. 97, no. 5, p. 055 213, 2022.
CrossRef

M. Habek, Y. Genc, N. Aytas, A. Akkoc, E. Afacan, and E. Yazgan, "Digital image encryption using elliptic curve cryptography: A review," in 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), IEEE, Jun. 2022, pp. 1–8.
CrossRef

D. S. Laiphrakpam, R. Thingbaijam, K. M. Singh, and M. Al Awida, "Encrypting multiple images with an enhanced chaotic map," IEEE Access, vol. 10, pp. 87844–87859, Aug. 2022.
CrossRef

M. Ahmad, S. Agarwal, A. Alkhayyat, A. Alhudhaif, F. Alenezi, A. H. Zahid, and N. O. Aljehane, "An image encryption algorithm based on new generalized fusion fractal structure," Information Sciences, vol. 592, pp. 1–20, May 2022.
CrossRef

S. Patel, B. K. P, and R. K. M, "Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique," Multimedia Tools and Applications, vol. 79, no. 43–44, pp. 31739–31757, 2020.
CrossRef

S. R. M. Zeebaree, "DES encryption and decryption algorithm implementation based on FPGA," Indonesian Journal of Electrical Engineering and Computer Science, vol. 18, no. 2, pp. 774–781, 2020.
CrossRef

S. N. F. M. A. Antony and M. F. A. Bahari, "Implementation of elliptic curves in the polynomial blom key pre-distribution scheme for wireless sensor networks and distributed ledger technology," Journal of Sensor and Actuator Networks, vol. 12, no. 1, p. 15, 2023.
CrossRef

M. Deshmukh and A. S. Rawat, "Lightweight symmetric key encryption for text using XOR operation and permutation matrix," International Journal of Information Technology, vol. 15, no. 7, pp. 3555–3562, 2023.
CrossRef

M. R. Kumar, R. Mani, P. Revathi, S. Sabarinathan, and V. Govindan, "A robust and fast symmetric text encryption algorithm based on Fermat's two squares theorem," in 2023 International Conference on Recent Advances in Electrical, Electronics, Ubiquitous Communication, and Computational Intelligence (RAEEUCCI), IEEE, Apr. 2023, pp. 1–5.
CrossRef

T. Ivanova, B. Stoyanov, and D. Dobrev, "Secure text encryption based on Clifford attractors," in 2023 31st National Conference with International Participation (TELECOM), IEEE, Nov. 2023, pp. 1–4.
CrossRef

Z. Abukari, E. Y. Baagyere, and M. M. Iddrisu, "A new text encryption scheme suitable for combating sniffing attacks in IoT applications via non-supersingular elliptic curves over binary extension fields," Earthline Journal of Mathematical Sciences, vol. 13, no. 2, pp. 451–472, 2023.
CrossRef

Z. W. Salman, H. I. Mohammed, and A. M. Enad, "SMS security by elliptic curve and chaotic encryption algorithms," Al-Mustansiriyah Journal of Science, vol. 34, no. 3, pp. 56–63, 2023.
CrossRef

A. Abdelli, W. El Hadj Youssef, L. Khriji, and M. Machhout, "Enhanced lightweight encryption algorithm based on chaotic systems," Physica Scripta, vol. 99, no. 10, p. 106 006, 2024.
CrossRef

J. Akbar, N. Siddiqui, S. Kanwal, and S. Inam, "A secure transmission of digital images using multiple chaotic maps and elliptic curve," International Journal of Research Publication and Reviews, vol. 5, no. 6, pp. 473–481, 2024.
CrossRef

J. Liu, Z. Liang, Y. Luo, L. Cao, S. Zhang, Y. Wang, and S. Yang, "A hardware pseudo-random number generator using stochastic computing and logistic map," Micromachines, vol. 12, no. 1, 2021.
CrossRef | PubMed

S. Adhikari and S. Karforma, "A novel audio encryption method using Henon-Tent chaotic pseudo random number sequence," International Journal of Information Technology, vol. 13, no. 4, pp. 1463–1471, 2021.
CrossRef

Q.-W. Zeng, Z.-Y. Wen, J.-F. Fu, and N.-R. Zhou, "Quantum watermark algorithm based on maximum pixel difference and tent map," International Journal of Theoretical Physics, vol. 60, no. 9, pp. 3306–3333, 2021.
CrossRef

P. Kiran and B. D. Parameshachari, "Logistic sine map (LSM) based partial image encryption," in 2021 National Computing Colleges Conference (NCCC), IEEE, Mar. 2021, pp. 1–6.
CrossRef

B. Khokhar, S. Dahiya, and K. S. Parmar, "Load frequency control of a microgrid employing a 2D Sine Logistic map based chaotic sine cosine algorithm," Applied Soft Computing, vol. 109, p. 107 564, Sep. 2021.
CrossRef

S. L. Nita and M. I. Mihailescu, "Elliptic curve-based query authentication protocol for IoT devices aided by blockchain," Sensors, vol. 23, no. 3, p. 1371, 2023.
CrossRef | PubMed

S. Kumar and D. Sharma, "A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm," Artificial Intelligence Review, vol. 57, no. 4, p. 87, 2024.
CrossRef

A. O. David and O. Sulaimon, "Text encryption with improved elliptic curve cryptography," Journal of Advances in Mathematics and Computer Science, vol. 38, no. 3, pp. 32–41, 2023.
CrossRef

K. E. Abdullah and N. H. M. Ali, "A secure enhancement for encoding/decoding data using elliptic curve cryptography," Iraqi Journal of Science, vol. 59, no. 1A, pp. 189–198, 2018.
CrossRef

D. Uzun Ozsahin, E. Precious Onakpojeruo, B. Bartholomew Duwa, A. G. Usman, S. Isah Abba, and B. Uzun, "COVID-19 prediction using black-box based Pearson correlation approach," Diagnostics, vol. 13, no. 7, p. 1264, 2023.
CrossRef | PubMed

D. Vamsi and P. R. CH, "Hybrid image encryption using elliptic curve cryptography, Hadamard transform and hill cipher," Webology, vol. 19, no. 1, pp. 2357–2378, 2022.
CrossRef

Downloads

Key Dates

Received

20-10-2024

Revised

19-02-2025

Accepted

01-03-2025

Published

30-03-2025

Data Availability Statement

Data is available in the article.

Issue

Section

Original Article

How to Cite

[1]
J. Kinganga, N. Kasoro, and A. Musesa, “Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data”, Al-Mustansiriyah J. Sci., vol. 36, no. 1, pp. 56–68, Mar. 2025, doi: 10.23851/mjs.v36i1.1616.

Similar Articles

1-10 of 256

You may also start an advanced similarity search for this article.