A Novel Data Encryption Method Using an Interlaced Chaotic Transform

dc.authorid Tora, Hakan/0000-0002-0427-483X
dc.authorid Gokcay, Erhan/0000-0002-4220-199X
dc.authorscopusid 7004217859
dc.authorscopusid 6506642154
dc.authorwosid Gokcay, Erhan/JOK-0734-2023
dc.contributor.author Gokcay, Erhan
dc.contributor.author Tora, Hakan
dc.contributor.other Software Engineering
dc.contributor.other Airframe and Powerplant Maintenance
dc.date.accessioned 2024-07-05T15:21:43Z
dc.date.available 2024-07-05T15:21:43Z
dc.date.issued 2024
dc.department Atılım University en_US
dc.department-temp [Gokcay, Erhan] Atilim Univ, Dept Software Engn, TR-06830 Ankara, Turkiye; [Tora, Hakan] Atilim Univ, Dept Avion, TR-06830 Ankara, Turkiye en_US
dc.description Tora, Hakan/0000-0002-0427-483X; Gokcay, Erhan/0000-0002-4220-199X en_US
dc.description.abstract We present a novel data encryption approach that utilizes a cascaded chaotic map application. The chaotic map used in both permutation and diffusion is Arnold's Cat Map (ACM), where the transformation is periodic and the encrypted data can be recovered. The original format of ACM is a two-dimensional mapping, and therefore it is suitable to randomize the pixel locations in an image. Since the values of pixels stay intact during the transformation, the process cannot encrypt an image, and known-text attacks can be used to get back the transformation matrix. The proposed approach uses ACM to shuffle the positions and values of two-dimensional data in an interlaced and nested process. This combination extends the period of the transformation, which is significantly longer than the period of the initial transformation. Furthermore, the nested process's possible combinations vastly expand the key space. At the same time, the interlaced pixel and value transformation makes the encryption highly resistant to any known-text attacks. The encrypted data passes all random-data tests proposed by the National Institute of Standards and Technology. Any type of data, including ASCII text, can be encrypted so long as it can be rearranged into a two-dimensional format. en_US
dc.identifier.citationcount 3
dc.identifier.doi 10.1016/j.eswa.2023.121494
dc.identifier.issn 0957-4174
dc.identifier.issn 1873-6793
dc.identifier.scopus 2-s2.0-85171752157
dc.identifier.uri https://doi.org/10.1016/j.eswa.2023.121494
dc.identifier.uri https://hdl.handle.net/20.500.14411/2123
dc.identifier.volume 237 en_US
dc.identifier.wos WOS:001080403000001
dc.identifier.wosquality Q1
dc.institutionauthor Gökçay, Erhan
dc.institutionauthor Tora, Hakan
dc.language.iso en en_US
dc.publisher Pergamon-elsevier Science Ltd en_US
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.scopus.citedbyCount 10
dc.subject Arnold 's cat map en_US
dc.subject Encryption en_US
dc.subject Random-data en_US
dc.subject Known-text attack en_US
dc.subject Interlaced chaotic transform en_US
dc.title A Novel Data Encryption Method Using an Interlaced Chaotic Transform en_US
dc.type Article en_US
dc.wos.citedbyCount 8
dspace.entity.type Publication
relation.isAuthorOfPublication 07b095f1-e384-448e-8662-cd924cb2139d
relation.isAuthorOfPublication 3b369df4-6f40-4e7f-9021-94de8b562a0d
relation.isAuthorOfPublication.latestForDiscovery 07b095f1-e384-448e-8662-cd924cb2139d
relation.isOrgUnitOfPublication d86bbe4b-0f69-4303-a6de-c7ec0c515da5
relation.isOrgUnitOfPublication 0ad0b148-c2aa-44e7-8f0a-53ab5c8406d5
relation.isOrgUnitOfPublication.latestForDiscovery d86bbe4b-0f69-4303-a6de-c7ec0c515da5

Files

Collections