Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data

Background: Given the vast amount of data generated daily on the Internet, numerous cryptosystems have been developed to ensure data confidentiality using symmetric, asymmetric, or hybrid encryption techniques. However, many of these systems suffer from limitations such as slow execution times and...

Full description

Saved in:
Bibliographic Details
Main Authors: Joel Kinganga, Nathanael Kasoro, Alain Musesa
Format: Article
Language:English
Published: Mustansiriyah University 2025-03-01
Series:Al-Mustansiriyah Journal of Science
Subjects:
Online Access:https://mjs.uomustansiriyah.edu.iq/index.php/MJS/article/view/1616
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850061062536167424
author Joel Kinganga
Nathanael Kasoro
Alain Musesa
author_facet Joel Kinganga
Nathanael Kasoro
Alain Musesa
author_sort Joel Kinganga
collection DOAJ
description Background: Given the vast amount of data generated daily on the Internet, numerous cryptosystems have been developed to ensure data confidentiality using symmetric, asymmetric, or hybrid encryption techniques. However, many of these systems suffer from limitations such as slow execution times and large key sizes. Objective: This paper presents a novel cryptosystem for text data encryption that integrates elliptic curve cryptography with chaotic functions to enhance data confidentiality and security. Methods: The proposed system utilizes elliptic curve points and pseudo-random numbers generated from a hybrid chaotic map (a fusion of the logistic map, sine map, and piecewise linear chaotic map) to derive short key sizes. Various analyses, including frequency histograms, correlation coefficients, and key sensitivity tests, are conducted to demonstrate the system’s robustness and reliability. Results: The analyses confirm that the fusion of chaotic functions makes the system highly sensitive to initial conditions, thus providing strong protection against unauthorized access. Conclusions: By integrating elliptic curve cryptography with chaotic functions, the proposed cryptosystem effectively addresses the limitations of existing systems, offering enhanced data confidentiality and security through the use of short key sizes and strong sensitivity to initial conditions. 
format Article
id doaj-art-19913e29ffe1488f86840cd557da2c10
institution DOAJ
issn 1814-635X
2521-3520
language English
publishDate 2025-03-01
publisher Mustansiriyah University
record_format Article
series Al-Mustansiriyah Journal of Science
spelling doaj-art-19913e29ffe1488f86840cd557da2c102025-08-20T02:50:22ZengMustansiriyah UniversityAl-Mustansiriyah Journal of Science1814-635X2521-35202025-03-0136110.23851/mjs.v36i1.1616Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text DataJoel Kinganga0https://orcid.org/0009-0008-1404-9514Nathanael Kasoro1https://orcid.org/0009-0004-2228-6617Alain Musesa2https://orcid.org/0009-0008-7583-3759Department of Mathematics, Statistics and Computer Science, Faculty of Science, University of Kinshasa, Kinshasa, Democratic Republic of the Congo.Department of Mathematics, Statistics and Computer Science, Faculty of Science, University of Kinshasa, Kinshasa, Democratic Republic of the Congo.Department of Mathematics, Statistics and Computer Science, Faculty of Science, University of Kinshasa, Kinshasa, Democratic Republic of the Congo. Background: Given the vast amount of data generated daily on the Internet, numerous cryptosystems have been developed to ensure data confidentiality using symmetric, asymmetric, or hybrid encryption techniques. However, many of these systems suffer from limitations such as slow execution times and large key sizes. Objective: This paper presents a novel cryptosystem for text data encryption that integrates elliptic curve cryptography with chaotic functions to enhance data confidentiality and security. Methods: The proposed system utilizes elliptic curve points and pseudo-random numbers generated from a hybrid chaotic map (a fusion of the logistic map, sine map, and piecewise linear chaotic map) to derive short key sizes. Various analyses, including frequency histograms, correlation coefficients, and key sensitivity tests, are conducted to demonstrate the system’s robustness and reliability. Results: The analyses confirm that the fusion of chaotic functions makes the system highly sensitive to initial conditions, thus providing strong protection against unauthorized access. Conclusions: By integrating elliptic curve cryptography with chaotic functions, the proposed cryptosystem effectively addresses the limitations of existing systems, offering enhanced data confidentiality and security through the use of short key sizes and strong sensitivity to initial conditions.  https://mjs.uomustansiriyah.edu.iq/index.php/MJS/article/view/1616Elliptic curve cryptographyChaotic functionsData encryptionHybrid cryptosystemsKey sensitivity analysis
spellingShingle Joel Kinganga
Nathanael Kasoro
Alain Musesa
Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data
Al-Mustansiriyah Journal of Science
Elliptic curve cryptography
Chaotic functions
Data encryption
Hybrid cryptosystems
Key sensitivity analysis
title Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data
title_full Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data
title_fullStr Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data
title_full_unstemmed Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data
title_short Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data
title_sort dynamics data encryption based on chaotic functions and elliptic curves application to text data
topic Elliptic curve cryptography
Chaotic functions
Data encryption
Hybrid cryptosystems
Key sensitivity analysis
url https://mjs.uomustansiriyah.edu.iq/index.php/MJS/article/view/1616
work_keys_str_mv AT joelkinganga dynamicsdataencryptionbasedonchaoticfunctionsandellipticcurvesapplicationtotextdata
AT nathanaelkasoro dynamicsdataencryptionbasedonchaoticfunctionsandellipticcurvesapplicationtotextdata
AT alainmusesa dynamicsdataencryptionbasedonchaoticfunctionsandellipticcurvesapplicationtotextdata