Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing

Piyush Shukla, Ankur Khare, Murtaza Rizvi, Shalini Stalin, Sanjay Kumar
2015 Entropy  
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have become a topic of active research in computer science and network security such as robotic systems, encryption, and communication. The main aim of deploying a chaos-based cryptosystem is to provide encryption with several advantages over traditional encryption algorithms such as high security, speed, and reasonable computational overheads and computational power requirements. These challenges have
more » ... e challenges have motivated researchers to explore novel chaos-based data encryption techniques with digital logics dealing with hiding information for fast secure communication networks. This work provides an overview of how traditional data encryption techniques are revised and improved to achieve good performance in a secure communication network environment. A comprehensive survey of existing chaos-based data encryption techniques and their application areas are presented. The OPEN ACCESS Entropy 2015, 17 1388 comparative tables can be used as a guideline to select an encryption technique suitable for the application at hand. Based on the limitations of the existing techniques, an adaptive chaos based data encryption framework of secure communication for future research is proposed. Switching of packets in computer networks. Encryption. Control of chaos in robotic systems. Communications Information compression and storage. Computer network design and management. Medicine and Biology Cardiology, heart rhythm (EEG) analysis,Prediction and control of irregular heart activity (chaos-aware defibrillator). Security and reliability of chaos-based encryption algorithms is enhanced by using PWLCM and Periodic Switching in C++ and a Matlab environment but at the same time implementation and maintenance cost of techniques are also increased because of the complexity of the algorithms. These applications are very useful for industrial and medical applications [3, 9, 16] . If an algorithm is compromised with security and feasibility then the cost and space-time complexity is reduced [3, 6, 43] . Qualities of techniques depend upon the accuracy, cost and processing time of the algorithm. If the feasibility of an algorithm is not possible then it shows the low quality and efficiency of the encryption technique [10, 11, 46] . Key length is also used to measure the prediction possibility and the complexity of algorithms. Large key length enhances the security and also space and time complexity but also increases the processing and memory cost [5, [45] [46] [47] . Security of algorithms is analyzed against security attacks, i.e., linear and differential cryptanalysis attacks using the Baptista system and TDCM system [13, 17] . Some proposed algorithms are very strong against all cryptanalysis (plain text attack, known plaintext attack, etc.) attacks but the cost of these cryptosystems also enhanced with the quality and accuracy [12, 13, 17, 18] . Key length is taken to be very large for increasing the complexity and security of algorithms [12] [13] [14] . Feasibility and efficiency are also used to describe the quality of maintenance and accuracy [18, 48] . Chaotic masking and switching used for block and stream cipher in non-linear dynamic systems enhances the security, speed, accuracy and reliability of encryption systems without compromising the quality and feasibility [23, 24, 50, 57] . Complexity of the algorithms is also increased with large key size, large space complexity and high processing speed by using discrete time chaotic systems for internet banking and communication systems, but also this also enhances the processing and maintenance costs [19, 20, 23, 49] . Industrial and communication systems widely use unpredictable and feasible encryption techniques for secure and fast transmission of information [8, 26, 29] . Speed and accuracy of algorithms are also important factors for measuring the complexity and quality of algorithms. Security is a major issue for military and industrial applications [1] . It is the strength of the algorithms against different intruder attacks and cryptanalysis attacks [25, 26, 30] . Data integration, repudiation, secrecy and authentication are necessary key factors of any communication system. These are achieved by using some special techniques PLCM map, 3D Baker map, Huffman coding and unicity distance which are secure, fast, reliable and accurate [27, 28, 32, 34] . Feasible and predictive systems are easily attacked by intruders with some effort [27, 37] . The secrecy and security is enhanced by using large key size and complex algorithms. These techniques are widely used in multimedia applications [33, 51] . High cost is an unnecessary drawback for industrial and communication systems but systems cannot use cheap circuits and equipment because of security [31, 35, 52] . Cost is also increased by using large key-based encryption systems and expensive environment like the NIST, Rosseler system and Lyapunov exponent system but security and quality of the algorithm are also enhanced [24, 53] . All the systems are not much stronger against different types of attacks so these are not useful for real time applications [22, 52] . The running time and space complexity have much high for large key size [36, 54] . These properties are useful for industrial and multimedia applications with secure, qualitative, accurate and fast transmission for authenticated and confidential communication [15, 56] . Feasible systems with data integration, repudiation, secrecy and
doi:10.3390/e17031387 fatcat:4wc2ve5dzjexdge4hyuxbxutly