Generalized logistic map and its application in chaos based cryptography

Similar documents
Cryptography. Lecture 8. Arpita Patra

A review on Lamb's atmospheric oscillations using initial value problem approach

3.4 Design Methods for Fractional Delay Allpass Filters

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

A Model for Randomly Correlated Deposition

Methods for detecting fatigue cracks in gears

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

Cryptanalysis of Pseudorandom Generators

A Public-Key Cryptosystem Based on Lucas Sequences

DEPARTMENT OF ECONOMICS ISSN DISCUSSION PAPER 20/07 TWO NEW EXPONENTIAL FAMILIES OF LORENZ CURVES

Uniform Law on the Unit Sphere of a Banach Space

On split sample and randomized confidence intervals for binomial proportions

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Monopolist s mark-up and the elasticity of substitution

Elliptic Curves and Cryptography

Developing A Deterioration Probabilistic Model for Rail Wear

Numerical Methods for Particle Tracing in Vector Fields

Dynamic System Eigenvalue Extraction using a Linear Echo State Network for Small-Signal Stability Analysis a Novel Application

Outline. Markov Chains and Markov Models. Outline. Markov Chains. Markov Chains Definitions Huizhen Yu

Introduction to Probability and Statistics

The analysis and representation of random signals

State Estimation with ARMarkov Models

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Statics and dynamics: some elementary concepts

F O R SOCI AL WORK RESE ARCH

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points.

Convex Optimization methods for Computing Channel Capacity

Trigonometry (Addition,Double Angle & R Formulae) - Edexcel Past Exam Questions. cos 2A º 1 2 sin 2 A. (2)

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

Location of solutions for quasi-linear elliptic equations with general gradient dependence

The Noise Power Ratio - Theory and ADC Testing

VISCOELASTIC PROPERTIES OF INHOMOGENEOUS NANOCOMPOSITES

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

Efficient algorithms for the smallest enclosing ball problem

A Simple Exchange Economy with Complex Dynamics

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

VIBRATIONS OF SHALLOW SPHERICAL SHELLS AND GONGS: A COMPARATIVE STUDY

Bayesian System for Differential Cryptanalysis of DES

Analysis of some entrance probabilities for killed birth-death processes

arxiv:cond-mat/ v2 25 Sep 2002

Some results of convex programming complexity

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler

A Modified Menezes-Vanstone Elliptic Curve Multi-Keys Cryptosystem

Analysis of Pressure Transient Response for an Injector under Hydraulic Stimulation at the Salak Geothermal Field, Indonesia

Feedback-error control

Ordered and disordered dynamics in random networks

A M,ETHOD OF MEASURING THE RESISTIVITY AND HALL' COEFFICIENT ON LAMELLAE OF ARBITRARY SHAPE

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes

Pretest (Optional) Use as an additional pacing tool to guide instruction. August 21

The Nottingham eprints service makes this work by researchers of the University of Nottingham available open access under the following conditions.

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Pulse Propagation in Optical Fibers using the Moment Method

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

NONRELATIVISTIC STRONG-FIELD APPROXIMATION (SFA)

An Analysis of Reliable Classifiers through ROC Isometrics

Discrete-time Geo/Geo/1 Queue with Negative Customers and Working Breakdowns

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

Chapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population

Figure : An 8 bridge design grid. (a) Run this model using LOQO. What is the otimal comliance? What is the running time?

Multi-Operation Multi-Machine Scheduling

F. Augustin, P. Rentrop Technische Universität München, Centre for Mathematical Sciences

Radial Basis Function Networks: Algorithms

Finding Shortest Hamiltonian Path is in P. Abstract

Research Article A Note on the Modified q-bernoulli Numbers and Polynomials with Weight α

Lattice Attacks on the DGHV Homomorphic Encryption Scheme

Infinite Number of Chaotic Generalized Sub-shifts of Cellular Automaton Rule 180

Generalized Coiflets: A New Family of Orthonormal Wavelets

Approximating min-max k-clustering

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes

1. Introduction. 2. Background of elliptic curve group. Identity-based Digital Signature Scheme Without Bilinear Pairings

OXFORD UNIVERSITY. MATHEMATICS, JOINT SCHOOLS AND COMPUTER SCIENCE WEDNESDAY 4 NOVEMBER 2009 Time allowed: hours

Adaptive estimation with change detection for streaming data

The Binomial Approach for Probability of Detection

An Improved Generalized Estimation Procedure of Current Population Mean in Two-Occasion Successive Sampling

On Wrapping of Exponentiated Inverted Weibull Distribution

Supplementary Material: Crumpling Damaged Graphene

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3

COMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS

Solutions of the Duffing and Painlevé-Gambier Equations by Generalized Sundman Transformation

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.

REFINED STRAIN ENERGY OF THE SHELL

Learning Sequence Motif Models Using Gibbs Sampling

Metrics Performance Evaluation: Application to Face Recognition

The Value of Even Distribution for Temporal Resource Partitions

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs

Positivity, local smoothing and Harnack inequalities for very fast diffusion equations

Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

Supplementary Materials for Robust Estimation of the False Discovery Rate

Inequalities for finite trigonometric sums. An interplay: with some series related to harmonic numbers

On Fractional Predictive PID Controller Design Method Emmanuel Edet*. Reza Katebi.**

On the capacity of the general trapdoor channel with feedback

Minimax Design of Nonnegative Finite Impulse Response Filters

A New Asymmetric Interaction Ridge (AIR) Regression Method

Transcription:

Journal of Physics: Conference Series PAPER OPEN ACCESS Generalized logistic ma and its alication in chaos based crytograhy To cite this article: M Lawnik 207 J. Phys.: Conf. Ser. 936 0207 View the article online for udates and enhancements. This content was downloaded from IP address 48.25.232.83 on 02//208 at 09:57

Generalized logistic ma and its alication in chaos based crytograhy M Lawnik Faculty of Alied Mathematics, Silesian University of Technology, ul. Kaszubska 23, 44-00 Gliwice, Poland E-Mail: marcin.lawnik@olsl.l Abstract. The logistic ma is commonly used in, for examle, chaos based crytograhy. However, its roerties do not render a safe construction of encrytion algorithms. Thus, the scoe of the aer is a roosal of generalization of the logistic ma by means of a wellrecognized family of chaotic mas. In the next ste, an analysis of Lyaunov exonent and the distribution of the iterative variable are studied. The obtained results confirm that the analyzed model can safely and effectively relace a classic logistic ma for alications involving chaotic crytograhy.. Introduction Chaotic mas are widely used in many science branches, e.g. [-4]. One of the most commonly used chaotic dynamical system in ractice is the logistic ma (LM) given by the following exression: xk+ = 4qxk ( - xk ), () where q Î[ 0, ] and x Î [ 0,]. Its universal nature is certified by many alications, among others, in crytograhy based on chaos theory, e.g. [5,6]. Chaos based crytograhy regards chaotic mas as generators of seudo-random numbers, and the values of their initial conditions and arameters as the secret keys. From such oint of view, recurrence () has many disadvantages, which were indicated in rofessional ublications [7]. They include, among others, a small sace of allowable values of arameter q, not uniform distribution of the iterative variable, or unstable value of Lyaunov exonent. The Lyaunov exonent denotes the sensitivity of dynamical system x k+ = f ( x k ) to changes in the initial conditions and is calculated in accordance with the deendence: n å - k= 0 l = lim ln f '( xk ). (2) n n In the above-mentioned alications, it is definitely recommended that the values of arameter q of () are close to. This results from its distribution, which for such set of values is flat in the middle, and determined by the density function: r ( x) = (3) x ( - x) Furthermore, for q = the Lyaunov exonent for () reaches the maximum value equal to l = ln 2 among all allowable values of arameter q. The above results show that the admissible values of arameter q are considerably limited. This has a negative imact on the safety of algorithms and may Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. Published under licence by Ltd

lead to successful brutal attack. In view of this, the designation of a chaotic ma that could combine the simlicity of () and, at the same time, render much better roerties, seems relevant. In [8] the following family of chaotic functions was resented: ì æ r ö ï ç - xk q -, 0 < x < ï ç x è ø k + = í, (4) ï æ r ö ç - xk ïq -, x < ç ï - î è ø where, q, r reresents arameters. If = 0.5, r = 2 and q Î[ 0, ], ma (4) may be reduced to LM (). Thus, LM is a secial case of (4). In [8] only for selected values of arameters, q and r an casual analysis of Lyaunov exonent of (4) was resented, indicating the domains for which it has a ositive value. From the oint of view of above mentioned alications, such analysis is insufficient. 2. The generalized logistic ma The generalized logistic ma (GLM) can be given by the formula: ì - q 2 ( ) ï - x +, 0 2 k q xk x k+ = í, (5) - q 2 ï ( - x ) +, < 2 k q xk ïî ( - ) where Î( 0, ) and q Î[ 0, ]. GLM (5) is a secific case of (4) for the arameter value r = 2. 3. Analysis In figure, the grah of Lyaunov exonent for the values of arameters and q is resented. As shown in the grah, a large range of the domain [ 0.89,] [ 0,] has a ositive value of Lyaunov exonent. Furthermore, it may be reasoned that for the value of arameter q close to and the entire variation range of arameter, the GLM (5) has a ositive Lyaunov exonent, as shown in detail in figure 2. Accordingly, the analysis of Lyaunov exonent for this ma renders a considerably wider range of the allowable values in comarison with a LM (). 2

Figure. Grah of the Lyaunov exonent of GLM (5). The non-ositive value of the exonent is marked in black. As indicated in figure 2 the value of Lyaunov exonent is stable for arameter q close to. This means that Lyaunov time, which determines the number of iterations that the system requires to forget the initial condition, is also stable. In alications, Lyaunov time determines how many initial iterations of the system must be rejected, in order to obtain a chaotic solution, which has also an imact on the calculations effectiveness of the algorithms involving crytograhy. Figure 2. The grah of the Lyaunov exonent of the GLM (5) for values of arameter q close to. The distribution of the iterative variable for the value of arameter q close to is flat in the middle (figure 3), just as in a LM (). However, in the discussed examle, the distribution is the same for the entire variation of arameter, and not only for one value. This significantly extends the range of the allowable arameters, and, at the same time, enhances the safety of the algorithm - see figure 4. Figure 3. Distributions of the GLM (5) obtained in a numerical way for values of arameter q close to and = 0. 4. 3

4. Conclusions Figure 4. Distribution of GLM (5) obtained in a numerical way for set values of arameter and q = (continuous line). The broken line marks density function (3). The analysis of the generalized logistic ma with the use of function family (4) was conducted. The resented calculations indicated that the analyzed model has much better roerties than a classic logistic ma, such as wider range of the allowable arameters with a ositive value of Lyaunov exonent and flat distribution of the iterative variable in the middle art. From the oint of view of crytograhy based on the chaos theory, the roerties of the analyzed function rovide its successful alication. On the other hand, the analyzed model combines the simlicity of its classic corresondent. This should lead to the relacement of a logistic ma by its generalized form in crytograhy alications. References [] Berezowski M and Lawnik M 204 Identification of fast-changing signals by means of adative chaotic transformations Nonlinear Analysis: Modelling and Control 9(2) 72 77 [2] Lawnik M and Berezowski M 204 Identification of the oscillation eriod of chemical reactors by chaotic samling of the conversion degree Chem. Process Eng. 35(3) 387 393 [3] Lawnik M 204 Generation of numbers with the distribution close to uniform with the use of chaotic mas Proceedings of the 4th International Conference on Simulation and Modeling Methodologies, Technologies and Alications 45 455 [4] Lawnik M 204 The aroximation of the normal distribution by means of chaotic exression Journal of Physics: Conference Series 490 02072 [5] Batista M S 998 Crytograhy with chaos Physics Letters A 240 50 54 [6] Pareek N K, Vinod Patidar and Sud K K 2006 Cover image Image encrytion using chaotic logistic ma Image and Vision Comuting 24(9) 926 934 [7] Arroyo D, Alvarez G and Fernandez V 2008 On the inadequacy of the logistic ma for crytograhic alications eds. L Hernandez A Martin X Reunin (Esa nola sobre Critolog ıa y Seguridad de la Informaci on) 77 82 [8] Skrobek A 2007 Metoda rojektowania dyskretnych chaotycznych szyfrów strumieniowych oarta na krytoanalizie Phd thesis (in olish) 4