2022
DOI: 10.3390/sym14122559
|View full text |Cite
|
Sign up to set email alerts
|

Application of DNA Coding, the Lorenz Differential Equations and a Variation of the Logistic Map in a Multi-Stage Cryptosystem

Abstract: The need for information security has become urgent due to the constantly changing nature of the Internet and wireless communications, as well as the daily generation of enormous volumes of multimedia. In this paper, a 3-stage image cryptosystem is developed and proposed. A tan variation of the logistic map is utilized to carry out deoxyribonucleic acid (DNA) encoding in the first stage. For the second encryption stage, the numerical solution of the Lorenz differential equations and a linear descent algorithm … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(28 citation statements)
references
References 78 publications
0
28
0
Order By: Relevance
“…To that end, scientists and engineers have been making use of various mathematical constructs and ideas inspired by nature to design secure and robust image encryption algorithms. Recent literature shows the employment of cellular automata (CA) [20][21][22], DNA coding [8,[23][24][25], electric circuits [26,27], as well as heavy reliance on dynamical functions of chaotic behavior [6,[28][29][30][31][32]. The following paragraph highlights the utilization of various such ideas in the development of pseudo-random number generators (PRNGs) to build encryption keys and substitution boxes (S-boxes).…”
Section: Of 42mentioning
confidence: 99%
See 4 more Smart Citations
“…To that end, scientists and engineers have been making use of various mathematical constructs and ideas inspired by nature to design secure and robust image encryption algorithms. Recent literature shows the employment of cellular automata (CA) [20][21][22], DNA coding [8,[23][24][25], electric circuits [26,27], as well as heavy reliance on dynamical functions of chaotic behavior [6,[28][29][30][31][32]. The following paragraph highlights the utilization of various such ideas in the development of pseudo-random number generators (PRNGs) to build encryption keys and substitution boxes (S-boxes).…”
Section: Of 42mentioning
confidence: 99%
“…The Mersenne Twister is deployed by the researchers in [7] as one of the encryption keys in a multi-stage cryptosystem. An S-box is designed and utilized as the core stage in a 3-stage image cryptosystem in [8], where the Lorenz system is numerically solved and its solution is used to generate a PRNG, which is then employed to generate the S-box. In another multi-stage image cryptosystem, the authors of [39] employ a discretized version of the chaotic sine map to create an S-box and the hyperchaotic Lu system as a PRNG.…”
Section: Of 42mentioning
confidence: 99%
See 3 more Smart Citations