Académique Documents
Professionnel Documents
Culture Documents
Abstract-A new data encryption algorithm based on dual Xn+1= �n(1-xn)' JiE [0, 4],xn E (0,1) , n = 1, 2,... (1)
chaotic system, DCS-EA, was presented in this paper. DCS-EA
is a stream cipher algorithm that introduced three new Logistic map is a typical nonlinear chaotic equation. It
techniques in order to heighten the data security. First, it used shows all the basic properties of chaotic motion. When the
two simple Logistic mappings with different system value of parameter f1 is determined, arbitrary initial value
parameters and initial value of variable, which can create more
complex chaotic signals to insist the threat of chaotic
Xo E (0,1) can generate a fixed sequence {X1,X2,...xJ. For
reconstruction, to generate key stream of encryption algorithm. different values of parameter f1 , Logistic sequence will
Second, linear congruence method was applied to involve in present different characteristics. It is continuous undergoing
fusion perturbation to enlarge the value field of key stream so bifurcation with the increasing of parameter f1 values, and
as to solve the finite precision problem of chaos sequence in the
computer. Third, it introduced the length of plaintext as the
achieving chaos state ultimately. When.u > 3.57, movement
parameter to control the iteration-times of dual-chaos system, form of the sequence {x,,} generated by the Logistic
which can increase the uncertainty of key generation process.
mapping appears typical chaotic characteristics.
Experimental and analytical results indicate that the algorithm
possessed excellent security and real-time characteristics. The a. Randomness. When Ji > 3.57 , Logistic mapping
results applied in a distributed simulation network
appear unstable motion within the limited iteration,
demonstrate that it can satisfy the requirements both in
and then long-term dynamic behavior shows
security and speed when encrypting real-time data.
randomness.
b. Certainty. Chaos sequence is generated by a certain
Keywords- Logistic map; dual chaotic system;data encryption;
equation. It can reproduce chaos state as long as the
linear congruence method.
parameters and initial values of equation are the
same.
I. INTRODUCTION c. Ergodicity. Ergodicity of chaotic motion is that
Chaotic signal possesses good randomness, especially chaotic variables can traverse all the states within a
after being processed in some certain ways. Chaotic system certain range on the basis of itself regularity, and its
can be used to generate high security key stream for data traversal will not repeat.
encryption algorithm. However, a single chaotic system is d. Sensitivity to initial values. The slight changes of
vulnerable to be attacked by chaotic reconstruction. The initial value Xo (as 1016
. ) will lead to enormous
paper proposed a new data encryption algorithm based on difference of the long-term behavior of the
dual-chaos system. The algorithm used dual chaotic system sequence { x n}
to generate key stream, which not only increased the number
.
LOG2: YIl+1= 1JY1l(1-YIl) ' 'fiE [3.57,4],yE (0,1) (3) The dual chaotic system shows better sensitivity to initial
condition than the single chaos system, and can meet the
Where,11 and 11 are control parameters, Xo and Yo are initial encryption requirement better.
values respectively in two equations.
In this dual-chaos system, Xn+1 is the output of chaotic
system LOG1, Yn+1 is the output of chaotic systems LOG2 0.6
with Yo= Xn+1. So, chaotic sequence {y n} is the final output of 0.6
this two dual-chaos system. It is produced by compositing 0.4
chaotic system LOG I and chaotic system LOG2. This
technique makes chaotic behavior more complex, and more 1 0.2
\I
difficult to analyze and predict. It also makes output chaotic 0
�
sequence having better randomness and can resist -0.2
reconstruction attacks.
-0.4
The simulation experiment is done with Matlab in order
to test and compare the sensitivity to initial value Xo of single -0.6
V4-432
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
V4-433
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
IV. EXPERIMENTAL RESULTS AND Yn are two sequences whose length is N. The
PERFORMANCE ANALYSIS autocorrelation function and the cross-correlation
function are defined as equation (7) and equation (8) [7]:
A. Experimental results
1 N
The experiment of using DCS-EA to encrypt information
has been done, in which the parameters j.l =3.95 , f\
Rx(J)=-L>iXi+J
N i=1
(7)
a: 116807 c:
r- m: 12147483647 zO:
� autocorrelation curve is shown in figure5; Let Xu 0.01 , =
I I
Figure 4, The results of encryption and decryption
0.8
0.6
From figure4, we can get the following conclusions. First, �
the length of ciphertext is the same with the length of 0.4
a:
plaintexts with parts of same content but different length. For ..O...",L ...' ...k old,.J I I L.,ll!oJL, \,"', ,_""... ,"
example, three segments of plaintext, 'plaintext' , 'plaintext 0 l r
11' "I
e' and 'plaintex' in figure4 have the same first eight -0.2
-1000 -800 -GOO -400 -2OJ 0 20J 400 GOO 800 1000
characters, but their ciphertexts are very different instead of
having the same first eight characters in ciphertexts. It is
because the length of plaintext involved in the process of key Figure 5, The autocorrelation curve of dual chaotic sequence
stream generation. It is very difficult for attackers to find the
relationship between plaintext and ciphertext.
B. Performance analysis
The performance of the DCS-EA in following aspects is
analyzed. 0.8
a. Sensitivity to initial value
A maior characteristic of Logistic chaotic system is 0.6
extremely sensitive to initial value. Therefore, a dual =
0.4
�
V4-434
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
should be similar to the function 8, and the cross-correlation [4] Yong Wang,Shengzhu Li, Maokang Du, "Block Encryption
Algorithm Based on Multiple Logistic Maps", Computer Engineering,
value should be close to zero. From Figure 5, we can see that
VoU3, No.20, Oct.2007, pp.l62-164.
the dual chaotic sequence has good autocorrelation property,
[5] Yonghui Hu, Xingye Li, "Image encryption algorithm based on inter
which is sharp peak when j=O, and is similar equal to 0 when perturbation of dual chaotic systems",Journal of Computer
.i is equal to other values. So, the autocorrelation property is Applications, VoI.29,No.ll, Nov.2009, pp.2993-2997.
similar to the function 8, with white noise. From Figure6, we [6] Shuai Chen,Xianxin Zhong, Shiyong Zhu, "Image Encryption
can see that the length of sequence is 1000, the cross Through Pseudo-Random Sequence Based on Linear Congruence",
correlation values of the sequence are mainly distributed in Computer Technology and Development, Vo1.l6,No.4, Apr.2006,
(0,0.05). That is, dual chaotic sequence has very small cross pp.17-IS.
correlation value almost close to zero with the increase of [7] Sanguo Yan, Yongbin Chen, "Perfonnance Analysis of Full Mapping
Chaotic Sequence about Logistic", Electronic Technology,
sequence length. Therefore, the generated chaotic sequence 2010,pp.194-197.
has ideal autocorrelation and cross-correlation.
c. Algorithm cost
Algorithm costs include time cost and space cost. Time
cost is divided into preparation time and encryption time.
The DCS-EA belongs to the stream cipher encryption
algorithm for a very short preparation time. As only XOR
operation has been done to each bit of data during the
encryption. Encryption time has been spent only on the
production of key stream. The cost of time is less than the
other type of encryption algorithms. The cost of space is also
divided into the static space of algorithm implementation and
the space in the running. The static space is itself occupied
space when the algorithm become a procedure, namely, the
length of the implementation code. Running state space is the
temporary space required during the encryption process.
Because temporary variables of the DCS-EA are not more, it
generates key stream through recycling, and storage
variables of recycling process are fewer. Therefore, the DCS
EA just takes up very small running state space.
V. CONCLUSION
The data encryption algorithm based on dual chaotic
system, DCS-EA presented in this paper has excellent
security. It introduced three new techniques. First, it used
two simple Logistic mappings with different system
parameters and initial value of variable to generate more
complex chaotic sequence as key stream. So that it can insist
the threat of chaotic reconstruction. Second, linear
congruence method was applied to involve in fusion
perturbation to enlarge the value field of key stream so that it
solved the finite precision problem of chaos sequence in the
computer. Third, it introduced the length of plaintext as the
parameter to control the iteration-times of dual-chaos system
and LCM equation, so that it increased the uncertainty of key
generation process. The results applied in a distributed
simulation network demonstrate that it can satisfy the
requirements both in security and speed when encrypting
real-time data.
REFERENCES
V4-435