A novel data encryption method using an interlaced chaotic transform
dc.authorid | Tora, Hakan/0000-0002-0427-483X | |
dc.authorid | Gokcay, Erhan/0000-0002-4220-199X | |
dc.authorscopusid | 7004217859 | |
dc.authorscopusid | 6506642154 | |
dc.authorwosid | Gokcay, Erhan/JOK-0734-2023 | |
dc.contributor.author | Gokcay, Erhan | |
dc.contributor.author | Tora, Hakan | |
dc.contributor.other | Software Engineering | |
dc.contributor.other | Airframe and Powerplant Maintenance | |
dc.date.accessioned | 2024-07-05T15:21:43Z | |
dc.date.available | 2024-07-05T15:21:43Z | |
dc.date.issued | 2024 | |
dc.department | Atılım University | en_US |
dc.department-temp | [Gokcay, Erhan] Atilim Univ, Dept Software Engn, TR-06830 Ankara, Turkiye; [Tora, Hakan] Atilim Univ, Dept Avion, TR-06830 Ankara, Turkiye | en_US |
dc.description | Tora, Hakan/0000-0002-0427-483X; Gokcay, Erhan/0000-0002-4220-199X | en_US |
dc.description.abstract | We present a novel data encryption approach that utilizes a cascaded chaotic map application. The chaotic map used in both permutation and diffusion is Arnold's Cat Map (ACM), where the transformation is periodic and the encrypted data can be recovered. The original format of ACM is a two-dimensional mapping, and therefore it is suitable to randomize the pixel locations in an image. Since the values of pixels stay intact during the transformation, the process cannot encrypt an image, and known-text attacks can be used to get back the transformation matrix. The proposed approach uses ACM to shuffle the positions and values of two-dimensional data in an interlaced and nested process. This combination extends the period of the transformation, which is significantly longer than the period of the initial transformation. Furthermore, the nested process's possible combinations vastly expand the key space. At the same time, the interlaced pixel and value transformation makes the encryption highly resistant to any known-text attacks. The encrypted data passes all random-data tests proposed by the National Institute of Standards and Technology. Any type of data, including ASCII text, can be encrypted so long as it can be rearranged into a two-dimensional format. | en_US |
dc.identifier.citation | 3 | |
dc.identifier.doi | 10.1016/j.eswa.2023.121494 | |
dc.identifier.issn | 0957-4174 | |
dc.identifier.issn | 1873-6793 | |
dc.identifier.scopus | 2-s2.0-85171752157 | |
dc.identifier.uri | https://doi.org/10.1016/j.eswa.2023.121494 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14411/2123 | |
dc.identifier.volume | 237 | en_US |
dc.identifier.wos | WOS:001080403000001 | |
dc.identifier.wosquality | Q1 | |
dc.institutionauthor | Gökçay, Erhan | |
dc.institutionauthor | Tora, Hakan | |
dc.language.iso | en | en_US |
dc.publisher | Pergamon-elsevier Science Ltd | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Arnold 's cat map | en_US |
dc.subject | Encryption | en_US |
dc.subject | Random-data | en_US |
dc.subject | Known-text attack | en_US |
dc.subject | Interlaced chaotic transform | en_US |
dc.title | A novel data encryption method using an interlaced chaotic transform | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 07b095f1-e384-448e-8662-cd924cb2139d | |
relation.isAuthorOfPublication | 3b369df4-6f40-4e7f-9021-94de8b562a0d | |
relation.isAuthorOfPublication.latestForDiscovery | 07b095f1-e384-448e-8662-cd924cb2139d | |
relation.isOrgUnitOfPublication | d86bbe4b-0f69-4303-a6de-c7ec0c515da5 | |
relation.isOrgUnitOfPublication | 0ad0b148-c2aa-44e7-8f0a-53ab5c8406d5 | |
relation.isOrgUnitOfPublication.latestForDiscovery | d86bbe4b-0f69-4303-a6de-c7ec0c515da5 |