Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data
DOI:
https://doi.org/10.23851/mjs.v36i1.1616Keywords:
Elliptic curve cryptography, Chaotic functions, Data encryption, Hybrid cryptosystems, Key sensitivity analysisAbstract
Background: Given the vast amount of data generated daily on the Internet, numerous cryptosystems have been developed to ensure data confidentiality using symmetric, asymmetric, or hybrid encryption techniques. However, many of these systems suffer from limitations such as slow execution times and large key sizes. Objective: This paper presents a novel cryptosystem for text data encryption that integrates elliptic curve cryptography with chaotic functions to enhance data confidentiality and security. Methods: The proposed system utilizes elliptic curve points and pseudo-random numbers generated from a hybrid chaotic map (a fusion of the logistic map, sine map, and piecewise linear chaotic map) to derive short key sizes. Various analyses, including frequency histograms, correlation coefficients, and key sensitivity tests, are conducted to demonstrate the system’s robustness and reliability. Results: The analyses confirm that the fusion of chaotic functions makes the system highly sensitive to initial conditions, thus providing strong protection against unauthorized access. Conclusions: By integrating elliptic curve cryptography with chaotic functions, the proposed cryptosystem effectively addresses the limitations of existing systems, offering enhanced data confidentiality and security through the use of short key sizes and strong sensitivity to initial conditions.
Downloads
References
J. Kinganga, N. Kasoro, R. Mabela, K. Kyamakya, and E. K. Kazadi, "HRS-3K: A hybrid encryption system based on matrix computation and RSA with disordered alphabet in Z/44Z," in 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), IEEE, Dec. 2021, pp. 15–21.
CrossRef
P. Kuppuswamy, S. Q. Y. A. K. Al-Maliki, R. John, M. Haseebuddin, and A. A. S. Meeran, "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm," Bulletin of Electrical Engineering and Informatics, vol. 12, no. 2, pp. 1148–1158, 2023.
CrossRef
I. Khalid, T. Shah, S. M. Eldin, D. Shah, M. Asif, and I. Saddique, "An integrated image encryption scheme based on elliptic curve," IEEE Access, vol. 11, pp. 5483–5501, Dec. 2023.
CrossRef
N.-R. Zhou, L.-L. Hu, Z.-W. Huang, M.-M. Wang, and G.-S. Luo, "Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm," Expert Systems with Applications, vol. 238, p. 122 052, Mar. 2024.
CrossRef
X. Zhang and J. Tian, "Multiple-image encryption algorithm based on genetic central dogma," Physica Scripta, vol. 97, no. 5, p. 055 213, 2022.
CrossRef
M. Habek, Y. Genc, N. Aytas, A. Akkoc, E. Afacan, and E. Yazgan, "Digital image encryption using elliptic curve cryptography: A review," in 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), IEEE, Jun. 2022, pp. 1–8.
CrossRef
D. S. Laiphrakpam, R. Thingbaijam, K. M. Singh, and M. Al Awida, "Encrypting multiple images with an enhanced chaotic map," IEEE Access, vol. 10, pp. 87844–87859, Aug. 2022.
CrossRef
M. Ahmad, S. Agarwal, A. Alkhayyat, A. Alhudhaif, F. Alenezi, A. H. Zahid, and N. O. Aljehane, "An image encryption algorithm based on new generalized fusion fractal structure," Information Sciences, vol. 592, pp. 1–20, May 2022.
CrossRef
S. Patel, B. K. P, and R. K. M, "Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique," Multimedia Tools and Applications, vol. 79, no. 43–44, pp. 31739–31757, 2020.
CrossRef
S. R. M. Zeebaree, "DES encryption and decryption algorithm implementation based on FPGA," Indonesian Journal of Electrical Engineering and Computer Science, vol. 18, no. 2, pp. 774–781, 2020.
CrossRef
S. N. F. M. A. Antony and M. F. A. Bahari, "Implementation of elliptic curves in the polynomial blom key pre-distribution scheme for wireless sensor networks and distributed ledger technology," Journal of Sensor and Actuator Networks, vol. 12, no. 1, p. 15, 2023.
CrossRef
M. Deshmukh and A. S. Rawat, "Lightweight symmetric key encryption for text using XOR operation and permutation matrix," International Journal of Information Technology, vol. 15, no. 7, pp. 3555–3562, 2023.
CrossRef
M. R. Kumar, R. Mani, P. Revathi, S. Sabarinathan, and V. Govindan, "A robust and fast symmetric text encryption algorithm based on Fermat's two squares theorem," in 2023 International Conference on Recent Advances in Electrical, Electronics, Ubiquitous Communication, and Computational Intelligence (RAEEUCCI), IEEE, Apr. 2023, pp. 1–5.
CrossRef
T. Ivanova, B. Stoyanov, and D. Dobrev, "Secure text encryption based on Clifford attractors," in 2023 31st National Conference with International Participation (TELECOM), IEEE, Nov. 2023, pp. 1–4.
CrossRef
Z. Abukari, E. Y. Baagyere, and M. M. Iddrisu, "A new text encryption scheme suitable for combating sniffing attacks in IoT applications via non-supersingular elliptic curves over binary extension fields," Earthline Journal of Mathematical Sciences, vol. 13, no. 2, pp. 451–472, 2023.
CrossRef
Z. W. Salman, H. I. Mohammed, and A. M. Enad, "SMS security by elliptic curve and chaotic encryption algorithms," Al-Mustansiriyah Journal of Science, vol. 34, no. 3, pp. 56–63, 2023.
CrossRef
A. Abdelli, W. El Hadj Youssef, L. Khriji, and M. Machhout, "Enhanced lightweight encryption algorithm based on chaotic systems," Physica Scripta, vol. 99, no. 10, p. 106 006, 2024.
CrossRef
J. Akbar, N. Siddiqui, S. Kanwal, and S. Inam, "A secure transmission of digital images using multiple chaotic maps and elliptic curve," International Journal of Research Publication and Reviews, vol. 5, no. 6, pp. 473–481, 2024.
CrossRef
J. Liu, Z. Liang, Y. Luo, L. Cao, S. Zhang, Y. Wang, and S. Yang, "A hardware pseudo-random number generator using stochastic computing and logistic map," Micromachines, vol. 12, no. 1, 2021.
CrossRef | PubMed
S. Adhikari and S. Karforma, "A novel audio encryption method using Henon-Tent chaotic pseudo random number sequence," International Journal of Information Technology, vol. 13, no. 4, pp. 1463–1471, 2021.
CrossRef
Q.-W. Zeng, Z.-Y. Wen, J.-F. Fu, and N.-R. Zhou, "Quantum watermark algorithm based on maximum pixel difference and tent map," International Journal of Theoretical Physics, vol. 60, no. 9, pp. 3306–3333, 2021.
CrossRef
P. Kiran and B. D. Parameshachari, "Logistic sine map (LSM) based partial image encryption," in 2021 National Computing Colleges Conference (NCCC), IEEE, Mar. 2021, pp. 1–6.
CrossRef
B. Khokhar, S. Dahiya, and K. S. Parmar, "Load frequency control of a microgrid employing a 2D Sine Logistic map based chaotic sine cosine algorithm," Applied Soft Computing, vol. 109, p. 107 564, Sep. 2021.
CrossRef
S. L. Nita and M. I. Mihailescu, "Elliptic curve-based query authentication protocol for IoT devices aided by blockchain," Sensors, vol. 23, no. 3, p. 1371, 2023.
CrossRef | PubMed
S. Kumar and D. Sharma, "A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm," Artificial Intelligence Review, vol. 57, no. 4, p. 87, 2024.
CrossRef
A. O. David and O. Sulaimon, "Text encryption with improved elliptic curve cryptography," Journal of Advances in Mathematics and Computer Science, vol. 38, no. 3, pp. 32–41, 2023.
CrossRef
K. E. Abdullah and N. H. M. Ali, "A secure enhancement for encoding/decoding data using elliptic curve cryptography," Iraqi Journal of Science, vol. 59, no. 1A, pp. 189–198, 2018.
CrossRef
D. Uzun Ozsahin, E. Precious Onakpojeruo, B. Bartholomew Duwa, A. G. Usman, S. Isah Abba, and B. Uzun, "COVID-19 prediction using black-box based Pearson correlation approach," Diagnostics, vol. 13, no. 7, p. 1264, 2023.
CrossRef | PubMed
D. Vamsi and P. R. CH, "Hybrid image encryption using elliptic curve cryptography, Hadamard transform and hill cipher," Webology, vol. 19, no. 1, pp. 2357–2378, 2022.
CrossRef

Downloads
Key Dates
Received
Revised
Accepted
Published
Data Availability Statement
Data is available in the article.
Issue
Section
License
Copyright (c) 2025 Joel Kinganga, Nathanael Kasoro, Alain Musesa

This work is licensed under a Creative Commons Attribution 4.0 International License.
(Starting May 5, 2024) Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.