Key Generation based on Henon map and Lorenz system


  • Ansam Sabah Bader Department of Computer Science, University of Technology
  • Shaymaa Hameed Department of Computer Science, University of Technology
  • Maisa’a Abid Ali K. Department of Computer Science, University of Technology



2D Henon map, 3D Lorenz system, NIST test suite.


Securing information has been the most significant process for communication and data store. Orderly to secure information such as data authentication,  data integrity, and confidentiality must be verified based on algorithms of cryptography. Where, the most important part of any encryption algorithms is the key which specifies if the system is strong enough or not. The proposal of this paper is a new method to generate keys based on two kinds of chaos theory in order to improve the security of cryptographic algorithms. The base of this proposal is to investigate a new method for generating random numbers by using the 3D Lorenz system and 2D Henon map. The newly generated keys have successfully passed the National Institute of Standards and Technology (NIST) statistical test suite


Download data is not yet available.

Author Biography

  • Ansam Sabah Bader, Department of Computer Science, University of Technology
    computer science/information system


Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem," Innovative Method for enhancing Key generation and management in the AES-algorithm", Apr 2015. CrossRef

Nikita Somani, Dharmendra Mangal," An Improved RSA Cryptographic System ", International Journal of Computer Applications, Volume 105 - No. 16, November 2014.

Rajan.S.Jamgekar, Geeta Shantanu Joshi," File Encryption and Decryption Using Secure RSA ", International Journal of Emerging Science and Engineering (IJESE), Volume-1, Issue-4, February 2013.

Aayush Chhabra, Srushti Mathur," Modified RSA Algorithm ", IEEE,2011.

Ravi Shankar Dhakar, Prashant Sharma, Amit Kumar Gupta," Modified RSA Encryption Algorithm (MREA)", IEEE, 2012. CrossRef

Avi Kak, "Public-Key Cryptography and the RSA Algorithm", Avinash Kak, Purdue University, February 20, 2019.

Gutha Jaya Krishna, Ravi Vadlamani, Nagesh Bhattu," Key Generation for Plain Text in Stream Cipher via Bi-Objective Evolutionary Computing", Applied Soft Computing, May 2018. CrossRef

N. S. Raghava & Ashish Kumar, "Image Encryption Using Henon Chaotic Map With Byte Sequence", International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), Vol. 3, Issue 5, Dec 2013, pp 11-18.

Ali Kashmar, "Key Generator to Encryption Images Based on Chaotic Maps" November 2018.

"The Lorenz Equations", Online

Haoran Wen, "A review of the H'enon map and its physical interpretations", Georgia Tech PHYS,2014.

Zhiliang Zhu, Zhe Lin, Beilei Wang, Hongjuan Liu, Huiyan Jiang ," An encryption algorithm based Logistic and Henon mapping for agricultural images in remote transmission", Proceedings of SPIE - The International Society for Optical Engineering, 2016.

Ronald Marsh and Scott Kerlin," A Many-key Image Encryption Method Using the Lorenz System",2013.

Obaida M. Al-hazaimeh, Mohammad Fawaz Al-Jamal," Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys ", Neural Computing and Applications, August 2017. CrossRef

Ekhlas Abbas Albahrani, Tayseer Karam," A New Key Stream Generator Based on 3D Henon map and 3D Cat map", International Journal of Scientific & Engineering Research, Volume 8, Issue 1, January-2017.

G.Madhuri, (M.Tech), I.M.V.Krishna, M.Tech," Chaotic Maps for Key Generation in Block Cipher for Multimedia Encryption/Decryption" International Journal of Computer Science and Information Technologies, Vol. 7 (6) , 2016, 2476-2480.

M. FRANCOIS, D. DEFOUR," A Pseudo-Random Bit Generator Using Three Chaotic Logistic Maps", hal.archives-ouvertes,February 6, 2013.., How to write Results, NY: Wiesly company, 2003, p. 55.


Key Dates





Original Article

How to Cite

A. S. Bader, S. Hameed, and M. A. A. K., “Key Generation based on Henon map and Lorenz system”, Al-Mustansiriyah Journal of Science, vol. 31, no. 1, pp. 41–46, Mar. 2020, doi: 10.23851/mjs.v31i1.734.

Similar Articles

1-10 of 143

You may also start an advanced similarity search for this article.