Chaos in New Polynomial Discrete Logistic Maps With Fractional Derivative and Applications For Text Encryption
Chaos in New Polynomial Discrete Logistic Maps With Fractional Derivative and Applications For Text Encryption
, 1-8 (2013) 1
Applied Mathematics & Information Sciences
An International Journal
http://dx.doi.org/10.12785/amis/paper
Abstract: In this paper, we propose new polynomial discrete logistic equations based on the classical logistic map, which exhibit
chaotic behavior as control parameters vary. We also explore versions with fractional derivatives. Using the chaotic sequence generated
by these equations, we develop an encryption scheme for text. The scheme relies on initial conditions, control parameters, and a
transformation of text characters into values between 0 and 1, followed by a transformation to discrete chaotic values for transmission
Keywords: Polynomial discrete maps; logistic equation; fractional order; chaos; text encryption
conducted by Kumar Verma et al.[20]. The idea of text with the condition that it should satistfy the characteristics
encryption was also recently conducted by Charalampidis in (4). This leads to a set of linear algebraic equations
et al. using a new logistic map that they developed[21]. satisfied by the coefficients ak . The symmetry of the
function about x = 12 gives the possibility to generate the
However, in spite of these advances, dynamic lookup number of equations equal to the number of unknows ak .
table cryptosystems based on present logistic maps are Thus solving the set of algebraic equations, one obtains
not resistant to chosen and known plaintext attacks[22], the mathematical expressions of the polynomial f(x)
and simple logistic maps are not very well adapted to which can be rescaled in order to have the same first
secure communication[23]. Research investigations are terms of the classical logistic equation or also the rescale
therefore conducted with the aim to use more generalized of the value of the control parameter r. For instance, Table
logistic maps[5, 24, 25, 26], or fractional maps[26, 27] 1 presents the expressions of f (x) for N = 2, 3 and 4. For
since the addition of an extra parameter allows to increase
the number of keys. From the point of view of N f (x) Discrete polynomial
cryptography based on chaos theory, the increase of logistic equation
parameters allows the setup of more robust 2 x(1 − x).This is the xn+1 = rxn (1 − xn )
algorithms[28]. Moreover, the generalized and the classical logistic map
fractional models can be developed using the properties equation
1 1 2 1 3
of the classical logistic maps. This will facilitate their 3 4x− 8x − 8x xn+1 = 4r xn (1 − 12 xn − β xn2 )
4 8 3 4 4
integration into cryptography applications[29, 30]. 4 5 x − 5 x + 5x xn+1 = 45 rxn (1 − 2x2 + x3 )
The aim of this work is to propose new fractional
generalized discrete logistic maps starting from the
characteristic conditions of the classical logistic the case N = 3, we have also introduced a new controlling
sequences and then use the new map to put in place a new parameter α which will also has impact on the bifurcation
algorithm for text cryptography. Section 2 presents the diagrams (β = 0.5) for the actual development). This can
generalized maps or the polynomial discrete maps which also be done for the case of N = 4 in order to increase the
have the same boundaries and maximal curve properties number of parameters of the system.
as the classical logistic map. Section 3 presents the Figure 1 presents the chaotic sequences generated by the
discrete polynomial fractional maps and their bifurcation three polynomial logistic equations with the initial
diagrams. In Section 4, a text encryption scheme is conditions x0 = 0.110 and x0 = 0.11. One finds that the
presented based on the transformation of text into its three discrete equations generate chaotic discrete values
ASCII images which are then transformed into the belonging in the interval [0, 1].
correspondent numbers in the interval[0, 1]. Then the
discrete chaotic sequence whose values are enclosed in
the interval [0, 1] are used to encrypt the text. The
decryption stage follows the inverse scheme of the
encryption. Finally, in the last section, the conclusion is
presented.
c 2013 NSP
Natural Sciences Publishing Cor.
Appl. Math. Inf. Sci. 7, No. ?, 1-8 (2013) / www.naturalspublishing.com/Journals.asp 3
n
∆ α x(n + 1) = x(n + 1) − αx(n) + ∑ Cm x(n − m) (9)
m=1
c 2013 NSP
Natural Sciences Publishing Cor.
4 Z.Kalsouabe,M.H.Ahamat,Y.K.Mahamoud and P.Woafo: Chaos in new polynomial discrete logistic maps with fractiona
n
x(n + 1) = f (x(n)) + (α − 1)x(n) + ∑ Cm x(n − m) (13)
m=1
c 2013 NSP
Natural Sciences Publishing Cor.
Appl. Math. Inf. Sci. 7, No. ?, 1-8 (2013) / www.naturalspublishing.com/Journals.asp 5
4 Text Cryptography
In this section, we propose a text encryption algorithm
based on three stages: conversion of the ASCII table in a
table having values belonging to the interval [0,1];
transformation of a given message to its correspondence
in this interval; mixing of the message with the chaotic
sequence generated by the polynomial logistic map. We
use here the third order polynomial model having the
parameter β as another key. More details are given below.
c 2013 NSP
Natural Sciences Publishing Cor.
6 Z.Kalsouabe,M.H.Ahamat,Y.K.Mahamoud and P.Woafo: Chaos in new polynomial discrete logistic maps with fractiona
5 V. CONCLUSION
4.2 Examples of encrypted and decrypted
messages with correlation test In this work, we have proposed polynomial discrete maps
derived from the classical logistic map with the
Example 1: requirements that the polynomial functions satisfy the
The first example of the message encrypted is boundary values and the symmetry of the classical
?Mummy goes to the market?. Its equivalent in the ASCII logistic one. We have limited the expansion to polynomial
table is: 77, 117, 109, 109, 121, 32, 103, 111, 101, 115, of the fourth order. But the extension can be conducted
32, 116, 111, 32, 116, 104, 101, 32, 109, 97, 114, 107, for high order polynomials. The new polynomial discrete
101, 116. Its correspondence in the interval [0,1] is: maps have shown transition to chaos in the same manner
0.30078125, 0.45703125, 0.42578125, 0.42578125, as the classical one with however different values for the
0.47265625, 0.00390625, 0.40234375, 0.43359375, bifurcation points. New control parameters can be
c 2013 NSP
Natural Sciences Publishing Cor.
Appl. Math. Inf. Sci. 7, No. ?, 1-8 (2013) / www.naturalspublishing.com/Journals.asp 7
introduced as the coefficients of each term of the [12] G.Makris , L.Antoniou, Cryptography with Chaos,Chaotic
polynomials as we did for the third order polynomial. Modeling and Simulation (CMSIM)1 ,169−178(2013).
One of the new fractional discrete polynomial maps [13] R.M .May,,Simple mathematical models with very
has been used to propose a new text encryption scheme complicated dynamics, Nature261,459−467(1976).
based on three stages. The first consists of converting the [14] P.F.Verhulst ,Notice sur la loi que la population suit dans son
ASCII table into a table of values belonging to the accroissement, Correspondence Mathematique et Physique
(Ghent)10 ,113−121(1838).
interval [0,1]. The second stage converts any text from its
[15] N.Bacar,Verhulst and the logistic equation (1838). In:
equivalent to its equivalent in the interval [0,1]. Then in A Short History of Mathematical Population Dynamics.
the third stage, the message is multiplied by chaotic Springer, London,35−39(2011).
sequences of number generated from the logistic (with a [16] M.S. Baptista ,Cryptography with chaos,Physics Letters
size equal to the length of the text message). The number A240 ,50−54(1998).
of keys gives some security for the encryption scheme. [17] W.Wong, L.Lee, K.Wong,A modified chaotic cryptographic
The chaos generated by the new polynomial logistic maps method,Computer Physics Communications 138(3)),
could be used for the encryption of other types of 234−236(2001).
messages such as images and audio-videos messages, [18] O.Datcu, R.Hobincu, M.Stanciu, R .A.Badea, Encrypting
using the encryption scheme presented here or other Multimedia Data Using Modified Baptista?s Chaos-
chaos cryptography methods. Based Algorithm, In: Future Access Enablers for
The authors are grateful to the anonymous referee for a Ubiquitous and Intelligent Infrastructures. Ed. by Springer,
careful checking of the details and for helpful comments Cham.,185−190(2018).
[19] D.Xiao, X.Liao , K.Wong, Improving the Security of a
that improved this paper.
Dynamic Look-Up Table Based Chaotic Cryptosystem,IEEE
The authors are grateful to the anonymous referee for a
Transactions on Circuits and Systems 53,502−506(2006).
careful checking of the details and for helpful comments [20] D.K.Verma, M.Rani, R.K.Tyagi, B.B Sagar, Baptista
that improved this paper. chaotic cryptosystem based on alternate superior dynamic
lookup table,Journal of Discrete Mathematical Sciences and
Cryptography 22(8),1383−1392(2019).
References [21] N.Charalampidis, C.Volos, L.Moysis, A.V.Tutueva,
D.Butusov, I.Stouboulos, Text Encryption Based on a Novel
[1] Federal Information Processing Standards Publication. Data One-Dimensional Piecewise Chaotic Map, 2022 Conference
Encryption Standard (DES). NIST 46 (1999). of Russian Young Researchers in Electrical and Electronic
[2] Federal Information Processing Standards Publication. Engineering (ElConRus), 263−268(2022).
Advanced Encryption Standard (AES). NIST 197 (2001). [22] J.K.Pal,Administering a cryptology centre by means of
[3] R .L. Rivest ,A. Shamir ,L.M. Adleman , Method for scientometric indicators, Collnet Journal of Scientometrics
Obtaining Digital Signatures and Public-Key Cryptosystems, and Information Management10(1),97−123(2016).
[23] D.Arroyo, G.Alverez, V.Fernandez,On the inadequacy
Communications of the ACM 2,120−126(1978).
of the logistic map for cryptographic applications.
[4] G.Gong,K.C. Gupta, M.Hell, Y.Nawaz, Towards a General
arXiv:0805.4355v1[nlin.CD] 28 May 2008.
RC4-Like Keystream Generator, Lecture Notes in Computer
[24] M.Stavroulaki,D.Sotiropoulos, The Energy of Generalized
Science,162−174(2005).
Logistic Maps at Full Chaos, Chaotic Modeling and
[5] A. G.Radwan , On some generalized discrete logistic maps,
Simulation (CMSIM)2 ,543−550(2012).
Journal of Advanced Research 4(2),163−171(2013) [25] W.Xingyuan, L. Yanpei, A new one-dimensional chaotic
[6] R. R. Kumar ,R. Pandian , T.Prem Jacob, A.Pravin ,P. system with applications in image encryption, Chaos,
Indumathi , Cryptography Using Multiple Chaos, Journal of Solitons and Fractals 139,(2020).
Physics: Conference Series 1770(012092) (2021). [26] Z.Ying-Qian, H.Jun-Ling, W.Xing-Yuan W,An Efficient
[7] R. R. Kumar ,R. Pandian , T.Prem Jacob, A.Pravin Image Encryption Scheme Based on S-Boxes and
,P. Indumathi, Cryptography Using Chaos in Fractional-Order Differential Logistic Map, IEEE
Communication Systems. Journal of Physics: Conference Access,8(202),54175−54188(2020).
Series1770(012095)(2021). [27] V.Sangavi, P.Thangavel, An Image Encryption Algorithm
[8] N.K.Pareek , Vinod Patidar ,K. K, Sud,Cryptography using Based On Fractal Geometry, Procedia Computer Science,
multiple one-dimensional chaotic maps. Communications 165,462−469(2019).
in Nonlinear Science and Numerical Simulation10 [28] S.K,Abd-El-Hafiz, A.G.Radwan, S.H.AbdEl-
(7),715−723(2005). Haleem , Encryption Applications of a Generalized
[9] T.Xiang,K.Wong, Xiaofeng, X.Liao, An improved Chaotic Map,Applied Mathematics and Information
chaotic cryptosystem with external key, Sciences9(6),3215−3233(2015).
Communications in Nonlinear Science and Numerical [29] M.Lawnik, Generalized logistic map and its application
Simulation13(9),1879−1887(2008). in chaos-based cryptography,Journal of Physics Conference
[10] G.B West, J.H Brown, and B.J Enquist,Nature 413, 628-631 Series 936(012017),(2017).
(2001). [30] H.Natiq, N.M.G.Al-Saidi, S.J.Obaiys, M.N. Mahdi,
[11] S.Agarwal ,Chaotic Dynamics of Complex Logistic Map A.K. Farhan, Image Encryption Based on Local
in I-Superior Orbi. International Journal of Information Fractional Derivative Complex Logistic Map, Symmetry,
Technology and Computer Science 12 (4) ,11−18 (2020). 14(9),1874(2022).
c 2013 NSP
Natural Sciences Publishing Cor.
8 Z.Kalsouabe,M.H.Ahamat,Y.K.Mahamoud and P.Woafo: Chaos in new polynomial discrete logistic maps with fractiona
c 2013 NSP
Natural Sciences Publishing Cor.