Key Generation based on Henon map and Lorenz system
DOI:
https://doi.org/10.23851/mjs.v31i1.734Keywords:
2D Henon map, 3D Lorenz system, NIST test suite.Abstract
Securing information has been the most significant process for communication and data store. Orderly to secure information such as data authentication, data integrity, and confidentiality must be verified based on algorithms of cryptography. Where, the most important part of any encryption algorithms is the key which specifies if the system is strong enough or not. The proposal of this paper is a new method to generate keys based on two kinds of chaos theory in order to improve the security of cryptographic algorithms. The base of this proposal is to investigate a new method for generating random numbers by using the 3D Lorenz system and 2D Henon map. The newly generated keys have successfully passed the National Institute of Standards and Technology (NIST) statistical test suiteReferences
Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem," Innovative Method for enhancing Key generation and management in the AES-algorithm", Apr 2015. CrossRef
Nikita Somani, Dharmendra Mangal," An Improved RSA Cryptographic System ", International Journal of Computer Applications, Volume 105 - No. 16, November 2014.
Rajan.S.Jamgekar, Geeta Shantanu Joshi," File Encryption and Decryption Using Secure RSA ", International Journal of Emerging Science and Engineering (IJESE), Volume-1, Issue-4, February 2013.
Aayush Chhabra, Srushti Mathur," Modified RSA Algorithm ", IEEE,2011.
Ravi Shankar Dhakar, Prashant Sharma, Amit Kumar Gupta," Modified RSA Encryption Algorithm (MREA)", IEEE, 2012. CrossRef
Avi Kak, "Public-Key Cryptography and the RSA Algorithm", Avinash Kak, Purdue University, February 20, 2019.
Gutha Jaya Krishna, Ravi Vadlamani, Nagesh Bhattu," Key Generation for Plain Text in Stream Cipher via Bi-Objective Evolutionary Computing", Applied Soft Computing, May 2018. CrossRef
N. S. Raghava & Ashish Kumar, "Image Encryption Using Henon Chaotic Map With Byte Sequence", International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), Vol. 3, Issue 5, Dec 2013, pp 11-18.
Ali Kashmar, "Key Generator to Encryption Images Based on Chaotic Maps" November 2018.
"The Lorenz Equations", Online
Haoran Wen, "A review of the H'enon map and its physical interpretations", Georgia Tech PHYS,2014.
Zhiliang Zhu, Zhe Lin, Beilei Wang, Hongjuan Liu, Huiyan Jiang ," An encryption algorithm based Logistic and Henon mapping for agricultural images in remote transmission", Proceedings of SPIE - The International Society for Optical Engineering, 2016.
Ronald Marsh and Scott Kerlin," A Many-key Image Encryption Method Using the Lorenz System",2013.
Obaida M. Al-hazaimeh, Mohammad Fawaz Al-Jamal," Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys ", Neural Computing and Applications, August 2017. CrossRef
Ekhlas Abbas Albahrani, Tayseer Karam," A New Key Stream Generator Based on 3D Henon map and 3D Cat map", International Journal of Scientific & Engineering Research, Volume 8, Issue 1, January-2017.
G.Madhuri, (M.Tech), I.M.V.Krishna, M.Tech," Chaotic Maps for Key Generation in Block Cipher for Multimedia Encryption/Decryption" International Journal of Computer Science and Information Technologies, Vol. 7 (6) , 2016, 2476-2480.
M. FRANCOIS, D. DEFOUR," A Pseudo-Random Bit Generator Using Three Chaotic Logistic Maps", hal.archives-ouvertes,February 6, 2013.., How to write Results, NY: Wiesly company, 2003, p. 55.
Downloads
Published
How to Cite
Issue
Section
License
Articles accepted for publication in Al-Mustansiriyah Journal of Science (MJS) are protected under the Creative Commons Attribution 4.0 International License (CC-BY-NC). Authors of accepted articles are requested to sign a copyright release form prior to their article being published. All authors must agree to the submission, sign copyright release forms, and agree to be included in any correspondence between MJS and the authors before submitting a work to MJS. For personal or educational use, permission is given without charge to print or create digital copies of all or portions of a MJS article. However, copies must not be produced or distributed for monetary gain. It is necessary to respect the copyright of any parts of this work that are not owned by MJS.