SlideShare a Scribd company logo
Chaos based
Cryptography
Presented by:
Amirul Haque Muhammad Hamid (16MCS001)
(16MCS012)
Introduction
• Chaos refers to the complex, difficult-to-predict behavior
found in nonlinear systems.
Chaos : the state of randomness or confusion
• Chaos theory: A field of study in mathematic
• Study the behavior of dynamic system with initial condition
• Sensitive dependence on initial conditions means that a very
small change in the initial state of a system can have a large
effect on its later state.
Characteristics of chaos
• They are aperiodic.
• They exhibit sensitive dependence on initial conditions and
unpredictable in the long term.
• They are governed by one or more control parameters, a
small change in which can cause the chaos to appear or
disappear.
• Their governing equations are nonlinear.
• Chaotic system will produce the same results if given the same
inputs, it is unpredictable in the sense that you can not predict
in what way the system's behavior will change for any change
in the input to that system. a random system will produce
different results when given the same inputs.
Types of system
• All systems can be basically divided into three types:
•
• 1.Deterministic systems
• These are systems for which for a given set of conditions the
result can be predicted and the output does not vary much with change in initial
conditions.
•
• 2. Stochastic systems
• These systems, which are not as reliable as deterministic
systems. Their output can be predicted only for a certain range of values.
•
• 3. Chaotic systems
• Chaotic systems are the most unpredictable of the three
systems. Moreover they are very sensitive to initial conditions and a small
change in initial conditions can bring about a great change in its output.
•
Example of Chaotic
System
• Chaos theory offers ordered models for seemingly
disorderly systems, such as:
 Weather patterns
 Turbulent Flow
 Population dynamics
 Stock Market Behavior
 Traffic Flow
 Nonlinear circuits
Bifurcation
• The logistic map shows a variety of behaviors and it has
transitions between these behaviors as we change the
parameter r. Such transitions in dynamical systems are called
bifurcations.
• Bifurcation is a scientific way to say something splits in
two—branches.
• If patterns bifurcate quickly enough, they can become
complex very fast, leading to bifurcation cascade and chaos.
Bifurcation Cont.
Lyapunov exponent
How to quantify chaos?
0
)(
ln
1
lim
d
td
tt 

d0
d(t)
The Lyapunov exponent characterizes the rate of exponential divergence of
nearby orbits
It is formally defined as:
The rate of divergence may depend on the orientation of the d0 vector
Cont..
• Lyapunov exponents are defined as the long time average
exponential rates of divergence of nearby states.
• If a system has at least one positive Lyapunov exponent, than the
system is chaotic.
• The larger the positive exponent, the more chaotic the system
becomeGives a measure for the predictability of a dynamic system
• Describes the average rate which predictability is lost
• Usually Calculate the Maximal Lyapunov Exponent
• Gives the best indication of predictability
• Positive value usually taken as an indication that the system is
chaotic
Exmaple
Information Entropy
• The information entropy is design to evaluate the
uncertainty in a random variable.
• The evaluation equation is
• The information entropy has a maximum when all signal
values have random distributions.
Chaos Based Cryptography
• Chaotic cryptology = chaotic cryptography + chaotic cryptanalysis
• Cryptography: The art of hiding messages
• Cryptanalysis: The art of decrypting or obtaining plain text
from hidden messages
Why someone choose chaos based cryptosystem over
traditional cryptosystem
• Traditional symmetric ciphers such as Advanced Encryption
Standard (AES) are designed with good confusion and diffusion
properties.
• These two properties can also be found in chaotic systems which
have desirable properties of pseudo-randomness, ergodicity, high
sensitivity to initial conditions and parameters.
• Chaotic maps have demonstrated great potential for information
security, especially image encryption, while the standard
encryption methods as the AES algorithm seem not to be suitable to
cipher such type of data.
Chaotic cryptography and standard algorithm
Similarities and differences between chaotic systems and cryptographic algorithms.
Highly secured
and
fast execution
How to design chaotic cryptosystem
Figure. A procedure for a design of a chaos-
based block-encryption algorithm.
Encryption Algorithm
The encryption process of the proposed algorithm [1]
Experimental Results of above algorithm
(a) Original image, (b-c-d) Histograms of the R, G, B components of the original image,
(e) Encrypted image, (f-g-h) Histograms of the R, G, B components of the encrypted image
Decrypting above encrypted image
(a) Encrypted image (Sailboat on lake), (b) Decrypted image by using K, (c) Decrypted image by using K1
Example 2:
Pseudo Random generator using chaotic system [2]
• Random numbers are mainly used to create
secret keys or random sequences.
• This Pseudo random number generator (PRNG) based
on chaotic maps and S-Box tables.
•
Block of the PRNG
Block diagram of the PRNG
Performance and Security Analysis
• Histogram Analysis
• Speed Analysis
Histogram of 43 000 numbers
Performance and Security Analysis
• Randomness Tests
Since the computed P-value of each test is > 0.01, then
conclude that the output sequence of our PRNG is random
Chaos Based Secure Hash
• The chaotic hash function is new trend in cryptography.
• Hashing using chaotic system needs defining the
mapping scheme for trajectory, choosing valid initial
condition and parameters
Diagram of chaotic hash function[3]
Detail construction of CBHF[3]
Application of chaos in
Cryptography
• Block cipher
• Pseudo random number generation
• Public Key algorithm
• Chaotic Communication
• Chaos in image encryption
• Chaotic Neuronal Networks
• Genetic networks
• Design of Chaotic Circuit
Summary
• Chaotic encryption not as well known as standard
encryption methods (e.g.,DES).
• Applicable to a wide range of encryption techniques –
e.g. chaotic masking.
• Potential to be as strong as other existing methods
• Potential to be easier to compute – eliminate need for file
scrambling
• Potentially less vulnerable to cryptanalysis
References
[1] R. Parvaz, M. Zarebnia, “A combination chaotic system and application in color image
encryption,” Optics and Laser Technology, Vol. 101, PP 30–41, (2018)
[1] Chanil Pak, Lilian Huang, A new color image encryption using combination of 1D chaotic
map, Signal Process.138 (2017) 129–137.
[3] Mohamed Amin, Osama S. Faragallah, Ahmed A. Abd El-Latif, “Chaos-based hash function
(CBHF) for cryptographic applications”, Chaos, Solitons and Fractals 42 (2012) 767–772.
[2] Nigel Crook and Tjeerd olde Scheper, A Novel Chaotic Neural Network Architecture
[3] Chaos and Time-Series Analysis, by J.C. Sprott, Oxford Press 2006
[4] S. M. Chang, M. C. Li and W. W. Lin, Asymptotic synchronization of modified logistic
hyper-chaotic systems and its applications. Nonlinear Analysis: Real World Applications, Vol.
10, Issue 2 (2009), pp. 869–880.
[5] Nigel Crook and Tjeerd olde Scheper, A Novel Chaotic Neural Network Architecture
[6] R. Parvaz ⇑, M. Zarebnia
THANK YOU

More Related Content

PPTX
Chaotic system and its Application in Cryptography
PDF
An Image Encryption using Chaotic Based Cryptosystem
PPTX
Image Encryption in java ppt.
PPTX
Image Security
PPTX
Confusion and Diffusion.pptx
PDF
Block Ciphers Modes of Operation
PPTX
Cryptography - Block cipher & stream cipher
PPTX
Rsa Crptosystem
Chaotic system and its Application in Cryptography
An Image Encryption using Chaotic Based Cryptosystem
Image Encryption in java ppt.
Image Security
Confusion and Diffusion.pptx
Block Ciphers Modes of Operation
Cryptography - Block cipher & stream cipher
Rsa Crptosystem

What's hot (20)

PPTX
Feistel cipher
PPTX
hill cipher
PPT
block ciphers
PDF
RSA ALGORITHM
PPT
Block Cipher and its Design Principles
PPT
Wavelet transform in image compression
PPT
Data encryption standard
PPT
DES (Data Encryption Standard) pressentation
PPTX
Secure Hash Algorithm
PPTX
Image compression in digital image processing
PPTX
Secure Hash Algorithm (SHA-512)
PPTX
Data Encryption Standard (DES)
PPTX
Transposition Cipher
PPTX
Topic1 substitution transposition-techniques
PDF
Network security - OSI Security Architecture
PPTX
Public Key Cryptosystem
PPTX
Hash Function
PPT
Symmetric Key Algorithm
PPTX
Idea(international data encryption algorithm)
Feistel cipher
hill cipher
block ciphers
RSA ALGORITHM
Block Cipher and its Design Principles
Wavelet transform in image compression
Data encryption standard
DES (Data Encryption Standard) pressentation
Secure Hash Algorithm
Image compression in digital image processing
Secure Hash Algorithm (SHA-512)
Data Encryption Standard (DES)
Transposition Cipher
Topic1 substitution transposition-techniques
Network security - OSI Security Architecture
Public Key Cryptosystem
Hash Function
Symmetric Key Algorithm
Idea(international data encryption algorithm)
Ad

Similar to Seminar on Chaos Based Cryptography (20)

PPTX
chaos based cryptography - cryptographic
PDF
Chaotic systems with pseudorandom number generate to protect the transmitted...
PPTX
Chaotic systems and their applications in data security.pptx
PDF
A New Chaotic Map for Secure Transmission
PDF
Chaos Based Image Encryption Techniques: A Review
PDF
Medical image encryption using multi chaotic maps
PDF
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
PDF
Ew4301904907
PDF
Chaos Image Encryption Methods: A Survey Study
PPTX
predre les principe de cryptage ou chiffrementa.pptx
PDF
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
PDF
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
PPTX
An Image Encryption using Chaotic Based Cryptosystem
PDF
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
PDF
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
PDF
Chaotic cryptography and multimedia security
PDF
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
PDF
03. Swarm Key Optimization for Chaos Based Image Encryption.pdf
PDF
Chaos Image Encryption using Pixel shuffling
PDF
Three Dimensional Chaotic System for Color Image Scrambling Algorithm
chaos based cryptography - cryptographic
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems and their applications in data security.pptx
A New Chaotic Map for Secure Transmission
Chaos Based Image Encryption Techniques: A Review
Medical image encryption using multi chaotic maps
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
Ew4301904907
Chaos Image Encryption Methods: A Survey Study
predre les principe de cryptage ou chiffrementa.pptx
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
An Image Encryption using Chaotic Based Cryptosystem
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
A COMPREHENSIVE SURVEY ON PERFORMANCE ANALYSIS OF CHAOTIC COLOUR IMAGE ENCRYP...
Chaotic cryptography and multimedia security
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
03. Swarm Key Optimization for Chaos Based Image Encryption.pdf
Chaos Image Encryption using Pixel shuffling
Three Dimensional Chaotic System for Color Image Scrambling Algorithm
Ad

Recently uploaded (20)

PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Understanding Forklifts - TECH EHS Solution
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
top salesforce developer skills in 2025.pdf
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Introduction to Artificial Intelligence
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Digital Strategies for Manufacturing Companies
PPTX
assetexplorer- product-overview - presentation
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
L1 - Introduction to python Backend.pptx
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
history of c programming in notes for students .pptx
PPTX
Operating system designcfffgfgggggggvggggggggg
Design an Analysis of Algorithms II-SECS-1021-03
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Odoo Companies in India – Driving Business Transformation.pdf
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Wondershare Filmora 15 Crack With Activation Key [2025
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Understanding Forklifts - TECH EHS Solution
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
top salesforce developer skills in 2025.pdf
PTS Company Brochure 2025 (1).pdf.......
Introduction to Artificial Intelligence
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Digital Strategies for Manufacturing Companies
assetexplorer- product-overview - presentation
How to Choose the Right IT Partner for Your Business in Malaysia
L1 - Introduction to python Backend.pptx
Softaken Excel to vCard Converter Software.pdf
history of c programming in notes for students .pptx
Operating system designcfffgfgggggggvggggggggg

Seminar on Chaos Based Cryptography

  • 1. Chaos based Cryptography Presented by: Amirul Haque Muhammad Hamid (16MCS001) (16MCS012)
  • 2. Introduction • Chaos refers to the complex, difficult-to-predict behavior found in nonlinear systems. Chaos : the state of randomness or confusion • Chaos theory: A field of study in mathematic • Study the behavior of dynamic system with initial condition • Sensitive dependence on initial conditions means that a very small change in the initial state of a system can have a large effect on its later state.
  • 3. Characteristics of chaos • They are aperiodic. • They exhibit sensitive dependence on initial conditions and unpredictable in the long term. • They are governed by one or more control parameters, a small change in which can cause the chaos to appear or disappear. • Their governing equations are nonlinear. • Chaotic system will produce the same results if given the same inputs, it is unpredictable in the sense that you can not predict in what way the system's behavior will change for any change in the input to that system. a random system will produce different results when given the same inputs.
  • 4. Types of system • All systems can be basically divided into three types: • • 1.Deterministic systems • These are systems for which for a given set of conditions the result can be predicted and the output does not vary much with change in initial conditions. • • 2. Stochastic systems • These systems, which are not as reliable as deterministic systems. Their output can be predicted only for a certain range of values. • • 3. Chaotic systems • Chaotic systems are the most unpredictable of the three systems. Moreover they are very sensitive to initial conditions and a small change in initial conditions can bring about a great change in its output. •
  • 5. Example of Chaotic System • Chaos theory offers ordered models for seemingly disorderly systems, such as:  Weather patterns  Turbulent Flow  Population dynamics  Stock Market Behavior  Traffic Flow  Nonlinear circuits
  • 6. Bifurcation • The logistic map shows a variety of behaviors and it has transitions between these behaviors as we change the parameter r. Such transitions in dynamical systems are called bifurcations. • Bifurcation is a scientific way to say something splits in two—branches. • If patterns bifurcate quickly enough, they can become complex very fast, leading to bifurcation cascade and chaos.
  • 8. Lyapunov exponent How to quantify chaos? 0 )( ln 1 lim d td tt   d0 d(t) The Lyapunov exponent characterizes the rate of exponential divergence of nearby orbits It is formally defined as: The rate of divergence may depend on the orientation of the d0 vector
  • 9. Cont.. • Lyapunov exponents are defined as the long time average exponential rates of divergence of nearby states. • If a system has at least one positive Lyapunov exponent, than the system is chaotic. • The larger the positive exponent, the more chaotic the system becomeGives a measure for the predictability of a dynamic system • Describes the average rate which predictability is lost • Usually Calculate the Maximal Lyapunov Exponent • Gives the best indication of predictability • Positive value usually taken as an indication that the system is chaotic
  • 11. Information Entropy • The information entropy is design to evaluate the uncertainty in a random variable. • The evaluation equation is • The information entropy has a maximum when all signal values have random distributions.
  • 12. Chaos Based Cryptography • Chaotic cryptology = chaotic cryptography + chaotic cryptanalysis • Cryptography: The art of hiding messages • Cryptanalysis: The art of decrypting or obtaining plain text from hidden messages
  • 13. Why someone choose chaos based cryptosystem over traditional cryptosystem • Traditional symmetric ciphers such as Advanced Encryption Standard (AES) are designed with good confusion and diffusion properties. • These two properties can also be found in chaotic systems which have desirable properties of pseudo-randomness, ergodicity, high sensitivity to initial conditions and parameters. • Chaotic maps have demonstrated great potential for information security, especially image encryption, while the standard encryption methods as the AES algorithm seem not to be suitable to cipher such type of data.
  • 14. Chaotic cryptography and standard algorithm Similarities and differences between chaotic systems and cryptographic algorithms. Highly secured and fast execution
  • 15. How to design chaotic cryptosystem Figure. A procedure for a design of a chaos- based block-encryption algorithm.
  • 16. Encryption Algorithm The encryption process of the proposed algorithm [1]
  • 17. Experimental Results of above algorithm (a) Original image, (b-c-d) Histograms of the R, G, B components of the original image, (e) Encrypted image, (f-g-h) Histograms of the R, G, B components of the encrypted image
  • 18. Decrypting above encrypted image (a) Encrypted image (Sailboat on lake), (b) Decrypted image by using K, (c) Decrypted image by using K1
  • 19. Example 2: Pseudo Random generator using chaotic system [2] • Random numbers are mainly used to create secret keys or random sequences. • This Pseudo random number generator (PRNG) based on chaotic maps and S-Box tables. •
  • 20. Block of the PRNG Block diagram of the PRNG
  • 21. Performance and Security Analysis • Histogram Analysis • Speed Analysis Histogram of 43 000 numbers
  • 22. Performance and Security Analysis • Randomness Tests Since the computed P-value of each test is > 0.01, then conclude that the output sequence of our PRNG is random
  • 23. Chaos Based Secure Hash • The chaotic hash function is new trend in cryptography. • Hashing using chaotic system needs defining the mapping scheme for trajectory, choosing valid initial condition and parameters Diagram of chaotic hash function[3]
  • 25. Application of chaos in Cryptography • Block cipher • Pseudo random number generation • Public Key algorithm • Chaotic Communication • Chaos in image encryption • Chaotic Neuronal Networks • Genetic networks • Design of Chaotic Circuit
  • 26. Summary • Chaotic encryption not as well known as standard encryption methods (e.g.,DES). • Applicable to a wide range of encryption techniques – e.g. chaotic masking. • Potential to be as strong as other existing methods • Potential to be easier to compute – eliminate need for file scrambling • Potentially less vulnerable to cryptanalysis
  • 27. References [1] R. Parvaz, M. Zarebnia, “A combination chaotic system and application in color image encryption,” Optics and Laser Technology, Vol. 101, PP 30–41, (2018) [1] Chanil Pak, Lilian Huang, A new color image encryption using combination of 1D chaotic map, Signal Process.138 (2017) 129–137. [3] Mohamed Amin, Osama S. Faragallah, Ahmed A. Abd El-Latif, “Chaos-based hash function (CBHF) for cryptographic applications”, Chaos, Solitons and Fractals 42 (2012) 767–772. [2] Nigel Crook and Tjeerd olde Scheper, A Novel Chaotic Neural Network Architecture [3] Chaos and Time-Series Analysis, by J.C. Sprott, Oxford Press 2006 [4] S. M. Chang, M. C. Li and W. W. Lin, Asymptotic synchronization of modified logistic hyper-chaotic systems and its applications. Nonlinear Analysis: Real World Applications, Vol. 10, Issue 2 (2009), pp. 869–880. [5] Nigel Crook and Tjeerd olde Scheper, A Novel Chaotic Neural Network Architecture [6] R. Parvaz ⇑, M. Zarebnia