Documente Academic
Documente Profesional
Documente Cultură
www.elsevier.com/locate/cpc
Abstract
We propose a modified version of the chaotic cryptographic method based on iterating a logistic map. Simulation results show
that the distribution of the ciphertext is flatter and the encryption time is shorter. Moreover, the trade-off between the spread of
the distribution of ciphertext and the encryption time can be controlled by a single parameter. 2001 Elsevier Science B.V. All
rights reserved.
PACS: 05.45.+b
The use of chaotic systems for secure or private Xn+1 = bXn (1 − Xn ), (1)
communications has been an active area of research
in the past few years. It is based on the facts that where b is the gain and Xn ∈ [0, 1].
chaotic signals are usually noise-like and chaotic Since the ciphertexts are small integers, they are
systems are very sensitive to initial condition. Besides suitable to be transmitted through today’s public digi-
tal networks. In order to avoid statistical and differen-
the analogue secure communications that are relied
tial cryptanalysis, a random number is generated each
on the synchronization of chaotic systems [1–3],
time the chaotic trajectory has reached the desired re-
digital chaotic cryptographic approaches have also
gion. If it is greater than a threshold η, the current
been proposed [4,5].
number of iterations will be transmitted as ciphertext.
Recently, Baptista proposed a chaotic cryptographic
Otherwise, the iteration will continue.
method that encrypts the message text as the number
There are two major drawbacks with Baptista’s
of iterations applied in the chaotic map in order
approach. First, the resultant ciphertext is usually
to reach the region corresponds to that text [4].
concentrated at the smaller number of iterations, as
He demonstrated his approach using a simple one-
observed from Fig. 1 that shows the distribution of
dimensional logistic map governed by the following
the ciphertext obtained by encrypting a typical 495 KB
equation
text file downloaded arbitrarily from the Internet. In
the figure, the solid line corresponds to the case that
✩
the threshold η is chosen as 0.7 while the dashed
The work described in this paper was fully supported by a Grant
provided by City University of Hong Kong. Project No. 7001077. line shows the distribution when η is set at 0.9. Note
* Corresponding author. that the statistics are gathered at intervals of 100
E-mail address: eekww@cityu.edu.hk (K.-w. Wong). iterations. As the distribution of ciphertext is not flat
0010-4655/01/$ – see front matter 2001 Elsevier Science B.V. All rights reserved.
PII: S 0 0 1 0 - 4 6 5 5 ( 0 1 ) 0 0 2 2 0 - X
W.-k. Wong et al. / Computer Physics Communications 138 (2001) 234–236 235
Table 1
The encryption time on text files of different sizes at different parameter values using the proposed and Baptista’s
methods
rmax Encryption time Encryption time Encryption time
for a 4 KB file/s for a 40 KB file/s for a 495 KB file/s
Proposed method 5000 1 17 240
10 000 2 23 241
15 000 2 29 308
20 000 2 36 377
25 000 3 42 448
32 767 4 54 557
Baptista’s method η = 0.7 3 39 410
η = 0.9 8 110 1229