2023
DOI: 10.3390/app13137768
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Chaotic-Based PRNG for Secure Cryptography Applications

Abstract: This paper suggests a novel one-dimensional (1D) map to address the limitations of traditional chaotic 1D maps. In contrast to traditional 1D maps, the proposed map has three control parameters a, μ, and c, allowing it to exhibit chaotic behavior over a wide range of values. The dynamic behavior of the new 1D map was analyzed using well-known numerical methods, including the bifurcation diagram and Lyapunov exponent. Both tests showed their complex and diverse behavior. In addition, a novel image encryption sc… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…It is a one-dimensional map, renowned for its chaotic behavior and ease of integration into any crypto-system. The general expression of this map, denoted by the numerical sequence h, is defined by (1). The parameters (ℎ 0 ) and (𝑘) represent the initial value and control parameter, respectively.…”
Section: Axis 1: Choice Of Chaotic Sequences 211 Skew Tent Mapmentioning
confidence: 99%
See 1 more Smart Citation
“…It is a one-dimensional map, renowned for its chaotic behavior and ease of integration into any crypto-system. The general expression of this map, denoted by the numerical sequence h, is defined by (1). The parameters (ℎ 0 ) and (𝑘) represent the initial value and control parameter, respectively.…”
Section: Axis 1: Choice Of Chaotic Sequences 211 Skew Tent Mapmentioning
confidence: 99%
“…Ciphering images is the process of protecting them by altering their pixels in a way that makes them indecipherable. It protects image confidentiality and integrity, particularly when the images are sensitive and confidential, as is the military case [1] and medical images [2], [3]. Perturbations in ciphering steps complicate the statistical relationships between original and ciphered images and make predicting them difficult.…”
Section: Introductionmentioning
confidence: 99%
“…Ensuring the security of information during network transmission has become a widely explored research area. In this context, encryption technology plays a crucial role, with symmetric and asymmetric encryption algorithms applied in cryptography [1]. Symmetric encryption, known for its efficiency, heightened security, and rapid encryption speed with a large key, relies on preserving the ciphering key for its security.…”
Section: Introductionmentioning
confidence: 99%
“…Ciphering images is the process of protecting them by altering their pixels in a way that makes them indecipherable. It protects image confidentiality and integrity, particularly when the images are sensitive and confidential, as in the military case [1] and medical images [2,3]. Perturbations in ciphering steps complicate the statistical relationships between original and ciphered images and make predicting them difficult.…”
Section: Introductionmentioning
confidence: 99%