New encryption schema based on swarm intelligence chaotic map
Inf. Syst. Dept., Menofiya Univ., Shebin-El-Kom, Egypt
Conference: Informatics and Systems (INFOS), 2010 The 7th International Conference on
Recently, chaos has attracted much attention in the field of cryptography. It describes a dynamical system which is sensitive to initial condition. It generates apparently random behavior but at the same time the system is completely deterministic. Towards this direction, this paper presents a new encryption scheme based on a new chaotic map derived from a simplified model of Swarm Intelligence (SI). The proposed scheme is described in detail, along with the analysis of the possibility of using SI in the field of image cryptography. In the proposed schema, logistic map is used to control the parameters of swarm intelligence chaotic map (SICM) to increase the robustness of the developed cipher schema. Visually and computationally, experimental results are presented to demonstrate significantly encryption quality of the proposed schema.
Available from: Qinghai Gao
- "At the society level, evolutionary algorithms are invented to approach optimization problems. Among these, the genetic algorithm (GA), which imitates the principles of biological evolution by applying selection, mating and mutation operations, has been used for cryptanalysis of classic ciphers, for development of cryptographic primitive, and for cryptographic protocol design ; Ant Colony and Swarm Intelligence are applied for designing encryption scheme and for cryptanalysis . "
[Show abstract] [Hide abstract]
ABSTRACT: Biological systems have been a rich source of inspiration for computer security professionals. In this paper we briefly review some of the security proposals inspired by DNA. By looking at the procedures of genetic information processing we propose a few techniques that can be applied to protect information, including a secure communication protocol inspired by primer-based gene recognition, DNA-based key distribution inspired by DNA base sequence complementarities, DNA-based steganography with the chemical information of the bases co-inspired by the LSB-based image steganography, and steganography with intronization inspired by the intron removal process in the central dogma of biology. The security of the proposed techniques is briefly analyzed.
[Show abstract] [Hide abstract]
ABSTRACT: This paper presents a 64-bits chaotic block cryptosystem, which uses as noise generator one-dimensional chaotic maps with
8 bits sub-blocks data. These chaotic maps use a control parameter that allows them to operate in the chaotic region, which
guarantees that each sub-block of data is mixed with unpredictable random noise. Statistical mechanic tools such as: bifurcation
diagram, Lyapunov exponent, and invariant distribution have been used to analyze and evaluate the behavior of the noise generator.
The cryptosystem has been evaluated using concepts of information theory, such as: entropy, as a diffusion measure in the
encryption process, and mutual information as a measure of relationship between plaintext and its respective cryptogram. The
noise generator has been used on the non-balanced and dynamic network proposed by L. Kocarev. The randomness of the cryptograms
has been evaluated using the NIST random tests. The proposed cryptosystem can be a component in software applications that
provides security to stored or communicated information. The proposed cryptosystem has a similar behavior to the one of currently
used cryptosystems and it has been designed with chaotic sequence generators, which are aperiodic by definition.
Computational Intelligence in Security for Information Systems - 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings; 01/2011
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.