“…As shown in Table 1 , some previous chaos-based ciphers are vulnerable upon various attack methods, including chosen-ciphertext attack [ 16 ], chosen-/known-plaintext attack [ 12 ], differential cryptanalysis [ 17 ], even cipher-only attack [ 18 ]. Therefore, research on security is extremely important and has received much attention [ 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 ].…”