Conference Paper

New encryption schema based on swarm intelligence chaotic map

Inf. Syst. Dept., Menofiya Univ., Shebin-El-Kom, Egypt
Conference: Informatics and Systems (INFOS), 2010 The 7th International Conference on
Source: IEEE Xplore

ABSTRACT Recently, chaos has attracted much attention in the field of cryptography. It describes a dynamical system which is sensitive to initial condition. It generates apparently random behavior but at the same time the system is completely deterministic. Towards this direction, this paper presents a new encryption scheme based on a new chaotic map derived from a simplified model of Swarm Intelligence (SI). The proposed scheme is described in detail, along with the analysis of the possibility of using SI in the field of image cryptography. In the proposed schema, logistic map is used to control the parameters of swarm intelligence chaotic map (SICM) to increase the robustness of the developed cipher schema. Visually and computationally, experimental results are presented to demonstrate significantly encryption quality of the proposed schema.

3 Followers
 · 
81 Views
  • [Show abstract] [Hide abstract]
    ABSTRACT: For the preceding conference see Zbl 1206.68010.
  • [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a 64-bits chaotic block cryptosystem, which uses as noise generator one-dimensional chaotic maps with 8 bits sub-blocks data. These chaotic maps use a control parameter that allows them to operate in the chaotic region, which guarantees that each sub-block of data is mixed with unpredictable random noise. Statistical mechanic tools such as: bifurcation diagram, Lyapunov exponent, and invariant distribution have been used to analyze and evaluate the behavior of the noise generator. The cryptosystem has been evaluated using concepts of information theory, such as: entropy, as a diffusion measure in the encryption process, and mutual information as a measure of relationship between plaintext and its respective cryptogram. The noise generator has been used on the non-balanced and dynamic network proposed by L. Kocarev. The randomness of the cryptograms has been evaluated using the NIST random tests. The proposed cryptosystem can be a component in software applications that provides security to stored or communicated information. The proposed cryptosystem has a similar behavior to the one of currently used cryptosystems and it has been designed with chaotic sequence generators, which are aperiodic by definition.
    Computational Intelligence in Security for Information Systems - 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings; 01/2011
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Biological systems have been a rich source of inspiration for computer security professionals. In this paper we briefly review some of the security proposals inspired by DNA. By looking at the procedures of genetic information processing we propose a few techniques that can be applied to protect information, including a secure communication protocol inspired by primer-based gene recognition, DNA-based key distribution inspired by DNA base sequence complementarities, DNA-based steganography with the chemical information of the bases co-inspired by the LSB-based image steganography, and steganography with intronization inspired by the intron removal process in the central dogma of biology. The security of the proposed techniques is briefly analyzed.
    LISAT; 05/2011