This paper compares examples of non-chaotic and chaotic ciphers from the viewpoint of their suitability for speech encryption, especially in real-time and lightweight cipher systems
An image encryption system based on generalized discrete maps
This paper presents a new image encryption scheme based on the fractional-order Lorenz system which gives more degrees of freedom in key generation
Chaos-based hardware speech encryption scheme using modified tent map and bit permutation
This paper proposes a speech encryption scheme based on a generalized modified chaotic tent map and bit permutation and presents its hardware realization
Image encryption algorithms using non-chaotic substitutions and permutations
This paper presents substitution and/or permutation symmetric-key encryption algorithms based on non-chaotic generators
Utilizing LFSR and Feistel networks in image encryption
This paper presents a novel method for designing a pseudo random keystream generator (PRKG) based on fractal images
Speech encryption using generalized modified chaotic logistic and tent maps
This paper presents a speech encryption application, which utilizes several proposed generalized modified discrete chaotic maps based on the logistic and tent maps for pseudo-random number generation
Control and synchronization of fractional-order chaotic systems
The chaotic dynamics of fractional-order systems and their applications in secure communication have gained the attention of many recent researches. Fractional-order systems provide extra degrees of freedom and control capability with integer-order differential equations as special cases. Synchronization is a necessary function in any communication system and is rather hard to be achieved for chaotic signals that are ideally aperiodic. This chapter provides a general scheme of control, switching and generalized synchronization of fractional-order chaotic systems. Several systems are used as examples for demonstrating the required mathematical analysis and simulation results validating it. The non-standard finite difference method, which is suitable for fractional-order chaotic systems, is used to solve each system and get the responses. Effect of the fractional-order parameter on the responses of the systems extended to fractional-order domain is considered. A control and switching synchronization technique is proposed that uses switching parameters to decide the role of each system as a master or slave. A generalized scheme for synchronizing a fractional-order chaotic system with another one or with a linear combination of two other fractional-order chaotic systems is presented. Static (timeindependent) and dynamic (time-dependent) synchronization, which could generate multiple scaled versions of the response, are discussed. © Springer International Publishing AG 2017. All rights reserved.
Self-excited attractors in jerk systems: Overview and numerical investigation of chaos production
Chaos theory has attracted the interest of the scientific community because of its broad range of applications, such as in secure communications, cryptography or modeling multi-disciplinary phenomena. Continuous flows, which are expressed in terms of ordinary differential equations, can have numerous types of post transient solutions. Reporting when these systems of differential equations exhibit chaos represents a rich research field. A self-excited chaotic attractor can be detected through a numerical method in which a trajectory starting from a point on the unstable manifold in the neighborhood of an unstable equilibrium reaches an attractor and identifies it. Several simple systems based on jerk-equations and different types of nonlinearities were proposed in the literature. Mathematical analyses of equilibrium points and their stability were provided, as well as electrical circuit implementations of the proposed systems. The purpose of this chapter is double-fold. First, a survey of several self-excited dissipative chaotic attractors based on jerk-equations is provided. The main categories of the included systems are explained from the viewpoint of nonlinearity type and their properties are summarized. Second, maximum Lyapunov exponent values are explored versus the different parameters to identify the presence of chaos in some ranges of the parameters. © 2018, Springer International Publishing AG.
Chaotic properties of various types of hidden attractors in integer and fractional order domains
Nonlinear dynamical systems with chaotic attractors have many engineering applications such as dynamical models or pseudo-random number generators. Discovering systems with hidden attractors has recently received considerable attention because they can lead to unexpected responses to perturbations. In this chapter, several recent examples of hidden attractors, which are classified into several categories from two different viewpoints, are reviewed. From the viewpoint of the equilibrium type, they are classified into systems with no equilibria, with a line of equilibrium points, and with one stable equilibrium. The type of nonlinearity presents another method of categorization. System properties are explored versus the different parameters to identify the values corresponding to the presence of strange attractors. The behavior of the systems is explored for integer order and fractional order derivatives using the suitable numerical techniques. The studied properties include time series, phase portraits, and maximum Lyapunov exponent. © 2018 Elsevier Inc. All rights reserved.
A generalized framework for elliptic curves based PRNG and its utilization in image encryption
In the last decade, Elliptic Curves (ECs) have shown their efficacy as a safe fundamental component in encryption systems, mainly when used in Pseudorandom Number Generator (PRNG) design. This paper proposes a framework for designing EC-based PRNG and maps recent PRNG design techniques into the framework, classifying them as iterative and non-iterative. Furthermore, a PRNG is designed based on the framework and verified using the National Institute of Standards and Technology (NIST) statistical test suite. The PRNG is then utilized in an image encryption system where statistical measures, differential attack measures, the NIST statistical test suite, and system key sensitivity analysis are used to demonstrate the system’s security. The results are good and promising as compared with other related work. © 2022, The Author(s).

