CFP last date
20 January 2025
Reseach Article

2-Step Logistic map Chaotic Cryptography using Dynamic Look-up Table

by Yamini Goyal, Geet Kalani, Shreya Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 10
Year of Publication: 2015
Authors: Yamini Goyal, Geet Kalani, Shreya Sharma
10.5120/ijca2015907082

Yamini Goyal, Geet Kalani, Shreya Sharma . 2-Step Logistic map Chaotic Cryptography using Dynamic Look-up Table. International Journal of Computer Applications. 130, 10 ( November 2015), 20-24. DOI=10.5120/ijca2015907082

@article{ 10.5120/ijca2015907082,
author = { Yamini Goyal, Geet Kalani, Shreya Sharma },
title = { 2-Step Logistic map Chaotic Cryptography using Dynamic Look-up Table },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 10 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number10/23246-2015907082/ },
doi = { 10.5120/ijca2015907082 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:25:02.020446+05:30
%A Yamini Goyal
%A Geet Kalani
%A Shreya Sharma
%T 2-Step Logistic map Chaotic Cryptography using Dynamic Look-up Table
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 10
%P 20-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption is to reorganize the message into discrepancy form so that the message is keep secret. The goal of encryption is to give an easy and inexpensive means of encryption and decryption to all authoritative users in possession of the suitable key and difficult and expensive means to estimate the plain text without use of the key. The Baptista proposed a Chaotic Encryption technique, which seems to be much better than traditional encryption methods used today. Chaotic encryption is the new trend of cryptography. It makes use of chaotic system properties such as sensitive to initial condition and lot of information. It is possible to encrypt a message (a text composed by some alphabet) using the Ergodic property of the simple low-dimensional and chaotic logistic equation. But it still has several problems, such as slow in speed and suffering from floating point operations and has less security. This paper is to overcome these problems with dynamic loop up table.

References
  1. Logistic map bifurcation diagram http://hyperchaos.wordpress.com/2011/04/27/logistic-map-bifurcation-diagram/, 2011.
  2. G Alvarez, F Montoya, M Romera, and G Pastor. Cryptanalysis of an ergodic chaotic cipher. Physics Letters A, 311(23):172 - 179, 2003.
  3. G. Alvarez, F. Montoya, M. Romera, and G. Pastor. Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Physics Letters A, 326(34):211 -218, 2004.
  4. Gonzalo Alvarez and Shujun Li. Some basic cryptographic requirements for chaos-baces cryptosystem. International Journal of Bifurcation and Chaos, 16(08):2129-2151, 2006.
  5. M.R.K. Ariffin and M.S.M. Noorani. Modified baptista type chaotic cryptosystem via matrix secret key. Physics Letters A, 372(33):5427 - 5430,2008.
  6. M.S. Baptista. Cryptography with chaos. Physics Letters A, 240(12):50 -54,1998.
  7. William Ditto and Toshinori Munakata. Principles and applications of chaotic systems. Commun. ACM, 38(11):96-102, November 1995.
  8. G. Cairns G. Davis J. Banks, J. Brooks and P. Stacey. On devaney’s definition of chaos. The American Mathematical Monthly, 99(4):332-334, April 1992.
  9. James A. Yorke Kathleen T. Alligood, Tim D. Sauer. Chaos : an introduction to dynamical systems. Springer, New York, 2000.
  10. L. Kocarev. Chaos-based cryptography: a brief overview. Circuits and Systems Magazine, IEEE, 1(3):6{21, 2001.
  11. Shujun Li, Xuanqin Mou, and Yuanlong Cai. Improving security of a chaotic encryption approach. Physics Letters A, 290(3-4):127{133, 2001.
  12. G. Millerioux, J.M. Amigo, and J. Daafouz. A connection between chaotic and conventional cryptography. Circuits and Systems I: Regular Papers, IEEE Transactions on, 55(6):1695{1703, 2008.
  13. N.K. Pareek, Vinod Patidar, and K.K. Sud. Cryptography using multiple one-dimensional chaotic maps.Communications in Nonlinear Science and Numerical Simulation, 10(7):715 { 723, 2005.
  14. Mamta Rani and Rashi Agarwal. A new experimental approach to study the stability of logistic map. Chaos, Solitons Fractals, 41(4):2062 { 2066, 2009.
  15. Rhouma Rhouma, Ercan Solak, David Arroyo, Shujun Li, Gonzalo Alvarez, and Safya Belghith. Comment on modi ed baptista type chaotic cryptosys-tem via matrix secret key [phys. lett. a 372 (2008) 5427]. Physics Letters A, 373(37):3398 { 3400, 2009.
  16. B. Schneier. Applied cryptography: protocols, algorithms and source code in C. John Wiley and Sons, New York, 1995.
  17. William Stallings. Cryptography and network security : principles and prac-tices. Pearson Education Dorling Kindersley, Delhi, 2006.
  18. T. Stojanovski and L. Kocarev. Chaos-based random number generators-part analysis [cryptography]. Circuits and Systems I: Fundamental Theory and Applications, IEEE Transactions on, 48(3):281{288, 2001.
  19. Jun Wei, Xiaofeng Liao, Kwok wo Wong, and Tsing Zhou. Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 12(5):814 { 822, 2007.
  20. K.W Wong. A fast chaotic cryptographic scheme with dynamic look-up table. Physics Letters A, 298(4):238 { 242, 2002.
  21. Di Xiao, Xiaofeng Liao, and Kwok-Wo Wong. Improving the security of a dynamic look-up table based chaotic cryptosystem. Circuits and Systems II: Express Briefs, IEEE Transactions on, 53(6):502{506, 2006.
  22. Kavita Chaudhary, Shiv Saxena. New Encryption Method Using Chaotic Logistic Map. Volume 4, Issue 8, August 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Cryptography Chaotic cryptography logistic map look up table.