Skip to main content
Log in

Chaotic encryption algorithm based on alternant of stream cipher and block cipher

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In recent years, a growing number of discrete chaotic cryptographic algorithms have been proposed. However, most of them encounter some problems such as the lack of robustness and security. In this paper, a new encryption algorithm is proposed, which encrypts the plaintext based on alternant of the stream cipher and block cipher. A pseudo-random number is used to control which encryption mode is chosen. Using this algorithm, multiple kinds of files (such as TXT, DOC, WMA, and JPEG) are encrypted and decrypted, and the security of the proposed cryptosystem is analyzed. The results show that the security of the cryptosystem is intensified and the proposed algorithm can resist differential attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Wang, X.Y.: The Chaos in Complex Non-linear Systems. Electronic Industry Press, Beijing (2003)

    Google Scholar 

  2. Liu, Y.J., Zheng, Y.Q.: Adaptive robust fuzzy control for a class of uncertain chaotic systems. Nonlinear Dyn. 57, 431–439 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  3. Liu, Y.J., Wang, W., Tong, S.C., Liu, Y.S.: Robust adaptive tracking control for nonlinear systems based on bounds of fuzzy approximation parameters. IEEE Trans. Syst. Man Cybern., Part A, Syst. Hum. 40, 170–184 (2010)

    Article  Google Scholar 

  4. Liu, Y.J., Wang, W.: Adaptive fuzzy control for a class of uncertain nonaffine nonlinear systems. Inf. Sci. 177, 3901–3917 (2007)

    Article  MATH  Google Scholar 

  5. Zhang, H.G., Huang, W., Wang, Z.L., Chai, T.Y.: Adaptive synchronization between two different chaotic systems with unknown parameters. Phys. Lett. A 350, 363–366 (2006)

    Article  MATH  Google Scholar 

  6. Pareek, N.K., Patidar, V., Sud, K.K.: Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 10, 715–723 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  7. Matthews, R.: On the derivation of a chaotic encryption algorithm. Cryptologia 4, 29–42 (1989)

    Article  MathSciNet  Google Scholar 

  8. Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240, 50–54 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  9. Chen, G.R., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21, 749–761 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  10. Jakimoski, G., Kocarev, L.: Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. I 48, 163–169 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  11. Klomkarn, K., Jansri, A., Sooraksa, P.: A design of stream cipher based on multi-chaotic functions. In: International Symposium on Communications and Information Technologies, Sapporo, Japan, October 26–29, pp. 931–935 (2004)

  12. Li, S.J., . Mou, X.Q., Cai, Y.L.: Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. Lect. Notes Comput. Sci. 2247, 316–329 (2001)

    Article  MathSciNet  Google Scholar 

  13. Li, S.J., Zheng, X., Mou, X.Q., Cai, Y.L.: Chaotic encryption scheme for real-time digital video. In Real-Time Imaging VI. Proc. SPIE 4666, 149–160 (2002)

    Article  Google Scholar 

  14. Mao, Y.B., Chen, G.R., Lian, S.G.: A novel fast image encryption scheme based on the 3D chaotic baker map. Int. J. Bifurc. Chaos 14, 3613–3624 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  15. Pareek, N.K., Patidar, V., Sud, K.K.: Discrete chaotic cryptography using external key. Phys. Lett. A 309, 75–82 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  16. Wang, X.Y., Duan, C.F., Gu, N.N.: A new chaotic cryptography based on ergodicity. Int. J. Mod. Phys. B 22, 901–908 (2008)

    Article  MathSciNet  Google Scholar 

  17. Wong, W.K., Lee, L.P., Wong, K.W.: A modified chaotic cryptographic method. Comput. Phys. Commun. 138, 234–236 (2001)

    Article  MATH  Google Scholar 

  18. Wong, K.W.: A fast chaotic cryptographic scheme with dynamic lookup table. Phys. Lett. A 298, 238–242 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  19. Wong, K.W.: A combined chaotic cryptographic and hashing scheme. Phys. Lett. A 307, 292–298 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  20. Xiang, T., Liao, X.F., Tang, G.P., Chen, Y., Wong, K.W.: A novel block cryptosystem based on iterating a chaotic map. Phys. Lett. A 349, 109–115 (2006)

    Article  MATH  Google Scholar 

  21. Zhou, H., Luo, J., Ling, X.T.: Generating nonlinear feedback stream cipher via chaotic systems. Acta Electron. Sinica 25, 56–60 (1997)

    Google Scholar 

  22. Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38, 764–768 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  23. Xiao, D., Liao, X.F., Deng, S.J.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177, 1136–1142 (2007)

    Article  MathSciNet  Google Scholar 

  24. Xiao, D., Liao, X.F., Deng, S.J.: Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178, 1598–1602 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  25. Jiang, Z.T., Xiang, M.S., Wang, Y.M.: A research on new public-key encryption schemes. Appl. Math. Comput. 169, 51–61 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  26. Ranjan, B.: Novel public key encryption technique based on multiple chaotic systems. Phys. Rev. Lett. 95, 098702 (2005)

    Article  Google Scholar 

  27. Wang, K., Pei, W.J., Zou, L.H., Cheung, Y.M., He, Z.X.: Security of public key technique based on multiple chaotic systems. Phys. Lett. A 360, 259–262 (2006)

    Article  MATH  Google Scholar 

  28. Álvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys. Lett. A 319, 334–339 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  29. Álvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys. Lett. A 326, 211–218 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  30. Jakimoski, G., Kocarev, L.: Differential and linear probabilities of a block-encryption cipher. IEEE Trans. Circuits Syst. I 50, 121–123 (2003)

    Article  MathSciNet  Google Scholar 

  31. Li, S.J., Mou, X.Q., Ji, Z., Zhang, J.H.: Cryptanalysis of a class of chaotic stream ciphers. J. Electron. Inf. Tech. 25, 473–478 (2003)

    Google Scholar 

  32. Li, S.J., Chen, G.R., Wong, K.W., Mou, X.Q., Cai, X.L.: Baptista-type chaotic cryptosystems: problems and countermeasures. Phys. Lett. A 332, 368–375 (2004)

    Article  MATH  Google Scholar 

  33. Wei, J., Liao, X.F., Wong, K.W., Zhou, T.: Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 12, 814–822 (2007)

    Article  MATH  Google Scholar 

  34. Wang, Y., Liao, X.F., Xiang, T., Wong, K.W., Yang, D.G.: Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map. Phys. Lett. A 363, 277–281 (2007)

    Article  MATH  Google Scholar 

  35. Rukhin, A., Soto, J., Nechvatal, J., et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22 http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_softwa.html

  36. Biham, E., Shamir, A.: Differential Cryptanalysis of Data Encryption Standard. Springer, Berlin (1993)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianfeng Zhao.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, X., Wang, X., Zhao, J. et al. Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn 63, 587–597 (2011). https://doi.org/10.1007/s11071-010-9821-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-010-9821-4

Keywords

Navigation