Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data
Background: Given the vast amount of data generated daily on the Internet, numerous cryptosystems have been developed to ensure data confidentiality using symmetric, asymmetric, or hybrid encryption techniques. However, many of these systems suffer from limitations such as slow execution times and...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Mustansiriyah University
2025-03-01
|
| Series: | Al-Mustansiriyah Journal of Science |
| Subjects: | |
| Online Access: | https://mjs.uomustansiriyah.edu.iq/index.php/MJS/article/view/1616 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850061062536167424 |
|---|---|
| author | Joel Kinganga Nathanael Kasoro Alain Musesa |
| author_facet | Joel Kinganga Nathanael Kasoro Alain Musesa |
| author_sort | Joel Kinganga |
| collection | DOAJ |
| description |
Background: Given the vast amount of data generated daily on the Internet, numerous cryptosystems have been developed to ensure data confidentiality using symmetric, asymmetric, or hybrid encryption techniques. However, many of these systems suffer from limitations such as slow execution times and large key sizes. Objective: This paper presents a novel cryptosystem for text data encryption that integrates elliptic curve cryptography with chaotic functions to enhance data confidentiality and security. Methods: The proposed system utilizes elliptic curve points and pseudo-random numbers generated from a hybrid chaotic map (a fusion of the logistic map, sine map, and piecewise linear chaotic map) to derive short key sizes. Various analyses, including frequency histograms, correlation coefficients, and key sensitivity tests, are conducted to demonstrate the system’s robustness and reliability. Results: The analyses confirm that the fusion of chaotic functions makes the system highly sensitive to initial conditions, thus providing strong protection against unauthorized access. Conclusions: By integrating elliptic curve cryptography with chaotic functions, the proposed cryptosystem effectively addresses the limitations of existing systems, offering enhanced data confidentiality and security through the use of short key sizes and strong sensitivity to initial conditions.
|
| format | Article |
| id | doaj-art-19913e29ffe1488f86840cd557da2c10 |
| institution | DOAJ |
| issn | 1814-635X 2521-3520 |
| language | English |
| publishDate | 2025-03-01 |
| publisher | Mustansiriyah University |
| record_format | Article |
| series | Al-Mustansiriyah Journal of Science |
| spelling | doaj-art-19913e29ffe1488f86840cd557da2c102025-08-20T02:50:22ZengMustansiriyah UniversityAl-Mustansiriyah Journal of Science1814-635X2521-35202025-03-0136110.23851/mjs.v36i1.1616Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text DataJoel Kinganga0https://orcid.org/0009-0008-1404-9514Nathanael Kasoro1https://orcid.org/0009-0004-2228-6617Alain Musesa2https://orcid.org/0009-0008-7583-3759Department of Mathematics, Statistics and Computer Science, Faculty of Science, University of Kinshasa, Kinshasa, Democratic Republic of the Congo.Department of Mathematics, Statistics and Computer Science, Faculty of Science, University of Kinshasa, Kinshasa, Democratic Republic of the Congo.Department of Mathematics, Statistics and Computer Science, Faculty of Science, University of Kinshasa, Kinshasa, Democratic Republic of the Congo. Background: Given the vast amount of data generated daily on the Internet, numerous cryptosystems have been developed to ensure data confidentiality using symmetric, asymmetric, or hybrid encryption techniques. However, many of these systems suffer from limitations such as slow execution times and large key sizes. Objective: This paper presents a novel cryptosystem for text data encryption that integrates elliptic curve cryptography with chaotic functions to enhance data confidentiality and security. Methods: The proposed system utilizes elliptic curve points and pseudo-random numbers generated from a hybrid chaotic map (a fusion of the logistic map, sine map, and piecewise linear chaotic map) to derive short key sizes. Various analyses, including frequency histograms, correlation coefficients, and key sensitivity tests, are conducted to demonstrate the system’s robustness and reliability. Results: The analyses confirm that the fusion of chaotic functions makes the system highly sensitive to initial conditions, thus providing strong protection against unauthorized access. Conclusions: By integrating elliptic curve cryptography with chaotic functions, the proposed cryptosystem effectively addresses the limitations of existing systems, offering enhanced data confidentiality and security through the use of short key sizes and strong sensitivity to initial conditions. https://mjs.uomustansiriyah.edu.iq/index.php/MJS/article/view/1616Elliptic curve cryptographyChaotic functionsData encryptionHybrid cryptosystemsKey sensitivity analysis |
| spellingShingle | Joel Kinganga Nathanael Kasoro Alain Musesa Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data Al-Mustansiriyah Journal of Science Elliptic curve cryptography Chaotic functions Data encryption Hybrid cryptosystems Key sensitivity analysis |
| title | Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data |
| title_full | Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data |
| title_fullStr | Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data |
| title_full_unstemmed | Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data |
| title_short | Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data |
| title_sort | dynamics data encryption based on chaotic functions and elliptic curves application to text data |
| topic | Elliptic curve cryptography Chaotic functions Data encryption Hybrid cryptosystems Key sensitivity analysis |
| url | https://mjs.uomustansiriyah.edu.iq/index.php/MJS/article/view/1616 |
| work_keys_str_mv | AT joelkinganga dynamicsdataencryptionbasedonchaoticfunctionsandellipticcurvesapplicationtotextdata AT nathanaelkasoro dynamicsdataencryptionbasedonchaoticfunctionsandellipticcurvesapplicationtotextdata AT alainmusesa dynamicsdataencryptionbasedonchaoticfunctionsandellipticcurvesapplicationtotextdata |