用于安全通信应用的WAM 3D离散混沌映射

IF 1.3 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher
{"title":"用于安全通信应用的WAM 3D离散混沌映射","authors":"Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher","doi":"10.11113/ijic.v13n1-2.419","DOIUrl":null,"url":null,"abstract":"Chaotic systems have become widely adopted as an effective way for secure data communications, because of its simple mathematical complexity and good security. The relationship between encryption algorithms and chaos systems has gained a lot of attention in the past few years, since it avoids the data spreading as well as lower the transmission delay and costs. In this paper a novel 3D discrete chaotic map is proposed for data encryption and secure communication and named as WAM. For secure communication, the Pecora and Carroll (P-C) method was utilized to achieve synchronization between the master system and the slave system. The simulation results of WAM 3D discrete chaotic map showed that the system has a chaotic behavior and a characteristic randomness and can pass 0-1, Lyapunov exponent (LE) and NIST tests which are usually used to check chaotic behavior. The statistical outcomes of the LE test were 0.0193, the frequency test (FT) was 0.4237, and the run test (RT) yielded a value of 0.0607. As a result, it enrich the theoretical basis of the equations and implementation of chaos, and it is superior for encryption algorithms and communication security applications.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.3000,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"WAM 3D Discrete Chaotic Map for Secure Communication Applications\",\"authors\":\"Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher\",\"doi\":\"10.11113/ijic.v13n1-2.419\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Chaotic systems have become widely adopted as an effective way for secure data communications, because of its simple mathematical complexity and good security. The relationship between encryption algorithms and chaos systems has gained a lot of attention in the past few years, since it avoids the data spreading as well as lower the transmission delay and costs. In this paper a novel 3D discrete chaotic map is proposed for data encryption and secure communication and named as WAM. For secure communication, the Pecora and Carroll (P-C) method was utilized to achieve synchronization between the master system and the slave system. The simulation results of WAM 3D discrete chaotic map showed that the system has a chaotic behavior and a characteristic randomness and can pass 0-1, Lyapunov exponent (LE) and NIST tests which are usually used to check chaotic behavior. The statistical outcomes of the LE test were 0.0193, the frequency test (FT) was 0.4237, and the run test (RT) yielded a value of 0.0607. As a result, it enrich the theoretical basis of the equations and implementation of chaos, and it is superior for encryption algorithms and communication security applications.\",\"PeriodicalId\":50314,\"journal\":{\"name\":\"International Journal of Innovative Computing Information and Control\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.3000,\"publicationDate\":\"2023-09-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Innovative Computing Information and Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.11113/ijic.v13n1-2.419\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Innovative Computing Information and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.11113/ijic.v13n1-2.419","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 3

摘要

混沌系统由于其简单的数学复杂度和良好的安全性而被广泛采用作为一种有效的数据安全通信方式。近年来,加密算法与混沌系统之间的关系受到了广泛的关注,因为它既避免了数据的传播,又降低了传输的延迟和成本。本文提出了一种新的用于数据加密和安全通信的三维离散混沌映射,并将其命名为WAM。为了保证通信安全,采用Pecora和Carroll (P-C)方法实现主系统和从系统之间的同步。WAM三维离散混沌映射的仿真结果表明,该系统具有混沌行为和特征随机性,能够通过0-1、李雅普诺夫指数(LE)和NIST测试等检测混沌行为的常用方法。LE检验的统计结果为0.0193,频率检验(FT)的统计结果为0.4237,运行检验(RT)的统计结果为0.0607。因此,它丰富了混沌方程和实现的理论基础,在加密算法和通信安全应用方面具有优越性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
WAM 3D Discrete Chaotic Map for Secure Communication Applications
Chaotic systems have become widely adopted as an effective way for secure data communications, because of its simple mathematical complexity and good security. The relationship between encryption algorithms and chaos systems has gained a lot of attention in the past few years, since it avoids the data spreading as well as lower the transmission delay and costs. In this paper a novel 3D discrete chaotic map is proposed for data encryption and secure communication and named as WAM. For secure communication, the Pecora and Carroll (P-C) method was utilized to achieve synchronization between the master system and the slave system. The simulation results of WAM 3D discrete chaotic map showed that the system has a chaotic behavior and a characteristic randomness and can pass 0-1, Lyapunov exponent (LE) and NIST tests which are usually used to check chaotic behavior. The statistical outcomes of the LE test were 0.0193, the frequency test (FT) was 0.4237, and the run test (RT) yielded a value of 0.0607. As a result, it enrich the theoretical basis of the equations and implementation of chaos, and it is superior for encryption algorithms and communication security applications.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
3.20
自引率
20.00%
发文量
0
审稿时长
4.3 months
期刊介绍: The primary aim of the International Journal of Innovative Computing, Information and Control (IJICIC) is to publish high-quality papers of new developments and trends, novel techniques and approaches, innovative methodologies and technologies on the theory and applications of intelligent systems, information and control. The IJICIC is a peer-reviewed English language journal and is published bimonthly
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信