A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption

被引:120
作者
Sahari, Mohamed Lamine [1 ]
Boukemara, Ibtissem [2 ]
机构
[1] Badji Mokhtar Annaba Univ, Dept Math, LANOS Lab, POB 12, Annaba 23000, Algeria
[2] Badji Mokhtar Annaba Univ, Dept Math, MDM Lab, POB 12, Annaba 23000, Algeria
关键词
Attractor; Cryptosystem; Chaos; Image encryption; Pseudo-random numbers; ALGORITHM; CIPHER; CRYPTOGRAPHY; SECURITY; BREAKING; STANDARD; SYSTEM;
D O I
10.1007/s11071-018-4390-z
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this work, we propose a novel 3D chaotic map obtained by coupling the piecewise and logistic maps. Showing excellent properties, like a high randomness, a high complexity and a very long period, this map has enabled us to implement and investigate a new chaotic pseudo-random number generator (CPRNG). The produced pseudo-random numbers exhibit a uniform distribution and successfully pass the NIST SP 800-22 randomness tests suite. In addition, an application in the field of color image encryption is proposed where the encryption key is strongly correlated with the plain image and is then used to perform the confusion and diffusion stages. Furthermore, the ability to expand the size of our map has an impact on the complexity of the system and increases the size of the key space, making our cryptosystems more efficient and safer. We also give some statistical tests and computer simulations which confirm that the proposed algorithm has a high level of security.
引用
收藏
页码:723 / 744
页数:22
相关论文
共 71 条
[1]   Image encryption based on Independent Component Analysis and Arnold's Cat Map [J].
Abbas, Nidaa AbdulMohsin .
EGYPTIAN INFORMATICS JOURNAL, 2016, 17 (01) :139-146
[2]   Chaos-based diffusion for highly autocorrelated data in encryption algorithms [J].
Ahmad, Jawad ;
Hwang, Seong Oun .
NONLINEAR DYNAMICS, 2015, 82 (04) :1839-1850
[3]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[4]  
[Anonymous], 2001, Numerical computing with IEEE floating point arithmetic
[5]   A novel extreme learning machine-based cryptography system [J].
Atee, Hayfaa Abdulzahra ;
Ahmad, Robiah ;
Noor, Norliza Mohd ;
Rahma, Abdul Monem S. ;
Sallam, Muhammad Samer .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5472-5489
[6]  
Atteya AM, 2014, IEEE INT NEW CIRC, P217, DOI 10.1109/NEWCAS.2014.6934022
[7]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[8]   Image and Video Encryption based on Dual Space-Filling Curves [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan ;
Raman, Balasubramanian .
COMPUTER JOURNAL, 2012, 55 (06) :667-685
[9]   The control of chaos: theory and applications [J].
Boccaletti, S ;
Grebogi, C ;
Lai, YC ;
Mancini, H ;
Maza, D .
PHYSICS REPORTS-REVIEW SECTION OF PHYSICS LETTERS, 2000, 329 (03) :103-197
[10]   Adaptive synchronization of chaos for secure communication [J].
Boccaletti, S ;
Farini, A ;
Arecchi, FT .
PHYSICAL REVIEW E, 1997, 55 (05) :4979-4981