DOI QR코드

DOI QR Code

New chaotic map development and its application in encrypted color image

  • Received : 2021.03.01
  • Accepted : 2021.06.15
  • Published : 2021.06.30

Abstract

This paper traces the process of constructing a new one-dimensional chaotic map, and will provide a simple application in color image encryption. The use of Sarkovskii's theorem will make it possible to determine the existence of chaos and restrict all conditions to ensure the existence of this new sequence. In addition, the sensitivity to initial conditions will be proved by Lyapunov's index value. Similarly, the performance of this new chaotic map will be illustrated graphically and compared with other chaotic maps most commonly used in cryptography. Finally, a humble color image encryption application will show the power of this new chaotic map.

Keywords

I. INTRODUCTION

Chaos is a phenomenon very close to randomness, which occupies an important position in cryptography, but determinism and dynamics distinguish it from randomness. In the past three decades, chaos has swept through most sciences (mathematics, physics, biology). It is defined by a nonlinear equation that is very sensitive to initial conditions. The expansion of chaos theory is closely related to the development of computer science and new mathematical advances (modeling, simulation, etc.). Like all new theories, chaos theory is still the subject of many controversies. Various forms of disputes have caused disputes over legal opinions and interpretations. Will science be able to explain it more and more, or is it impossible to understand the world by accident? In fact, for scientists, this is a matter of defining the complexity of the phenomenon they are studying. Chaos as understood by scientists does not mean that there is no order. In fact, this is related to unpredictability, because the final state is very sensitive to the initial state, so long-term evolution cannot be predicted. We believe that the difference between chaos and randomness is the most important point for understanding chaos. Indeed, there is always a tendency to believe that a phenomenon is unpredictable due to the large number of parameters involved. In his description, this prompted us to give a probabilistic method, which by definition can satisfy a certain degree of freedom completely satisfactorily. Randomness. As far as chaos is concerned, this is actually not the case, and the behavior of the chaotic system seems to be random. But in reality, this behavior is described in a deterministic way by fully deterministic nonlinear equations, that is, in particular using mathematics that allow accurate and deterministic methods. To explain with a famous advertisement, a person can write: "Looks like an opportunity, tastes like an opportunity, but not accidental. With the passage of time, people have made several attempts to build a chaotic graph and realized the password. The large number of chaotic graphs used in learning [1]. Other technologies use chaotic maps to construct hash functions [2]. On the other hand, other technologies use chaotic cards in symmetric encryption systems [3]. There are also some the technology combines several chaotic maps to improve performance. Their systems [4], [5], [6] were in the absence of any deterministic formula for generating random numbers, tables of such numbers appeared.

\(\begin{gathered} \hline \text { Abreviation } \\ \hline I=[0 \quad 1] \\ f: \text { continuous function over } I \\ f^{k}(x)=\underbrace{\text { fofof ....... of }(x)}_{k \text { instances }} \\ G_{n}=\mathbb{Z} / n \mathbb{Z}^{\text {Ring }} \\ \hline \end{gathered}\)

Pseudo-random number generator

Finding that they were unable to master random numbers, researchers quickly turned to the generation of pseudo random numbers defined by mathematical relationships that produce the same sequence under the same conditions. Among all these technologies, we mentioned the most important ones.

1.1. Von Neumann Generator

In 1946 Von Neumann proposed the following pseudo random number generator

1. Take an integer (𝑥0) of n digits

2. Calculate (𝑥1=𝑥0)

3. Take the (𝑛) middle digits

4. Restart

1.2. Linear congruence generator

The linear congruential generator was introduced by Lehmer, and is still popular in today's methods for generating pseudorandom numbers quickly. The sequence of random numbers (𝑥𝑛)is created as follows:

   \(\begin{gathered} \hline \text { Linear congruence generator } \\ \hline x_{0} \in \mathbb{Z} / n \mathbb{Z}\\ x_{n+1}=\left(a x_{n}+c\right) \bmod n \\ \hline \end{gathered}\)       (1)

In order to be able to choose a seed 𝑥0 without constraints between 0 𝑎𝑛𝑑 𝑛−1, it is necessary to try to maximize the generator period. However, it turns out that the values of a and c are known, which makes it possible to obtain a maximum period (𝑒𝑞𝑢𝑎𝑙 𝑡𝑜 𝑛). the period of a linear congruential generator is maximum if and only if:

1. 𝑖𝑓 𝑐≠0 𝑡ℎ𝑒𝑛 c is prime with n.

𝑁𝑎𝑚𝑒𝑙𝑦, 𝑖𝑡 𝑚𝑒𝑎𝑛𝑠 𝑃𝑔𝑐𝑑(𝑐, 𝑛)=1.

2. For each prime number 𝑝 𝑑𝑖𝑣𝑖𝑑𝑖𝑛𝑔 𝑛,

(𝑎−1) 𝑖𝑠 𝑎 𝑚𝑢𝑙𝑡𝑖𝑝𝑙𝑒 𝑜𝑓 𝑝.

3. (𝑎−1)𝑖𝑠 𝑎 𝑚𝑢𝑙𝑡𝑖𝑝𝑙𝑒 𝑜𝑓 4 𝑖𝑓 𝑛 𝑖𝑠 𝑜𝑛𝑒

1.3. Selected popular chaotic maps

Functions that generate chaotic sequences can be divided into two categories: one-dimensional sequences and multidimensional sequences. Chaotic functions are rare in the literature, and there are only a dozen functions used in cryptography.

1.4. One-dimensional chaotic map

1.4.1 Logistic recurrence

Logistic recursion [7] is a simple example of nonlinear sequence. It is defined by a simple relation managed by a second order polynomial described by the following recurrence relation.

\(\begin{array}{lll} \hline \text { Logistic recurrence } \\ \hline \begin{aligned} \left.\mathrm{u}_{0} \in\right] 0,51\left[\begin{array}{cc} , \mu \in[3,75 & 4 \end{array}\right] \\ \mathrm{u}_{\mathrm{n}+1}=\mu \mathrm{u}_{\mathrm{n}}\left(1-\mathrm{u}_{\mathrm{n}}\right) \end{aligned} \\ \hline \end{array}\)       (2)

1.4.2. The Skew Tent Map

The Skew tent map [8] will be redefined as the equation below

\(\begin{array}{lll} \hline \text {The skew tent map } \\ \hline \begin{aligned} \begin{aligned} &\left.v_{0} \in\right] 0 \quad 1[\quad p \in] 0,5 \quad 1[ \\ &v_{n+1}= \begin{cases}\frac{v_{n}}{p} & \text { if } 0 \prec v_{n} \prec p \\ \frac{1-v_{n}}{1-p} & \text { if } p \prec v_{n<1}\end{cases} \end{aligned} \end{aligned} \\ \hline \end{array}\)      (3)

1.4.3. PWLCM Map

It is a real linear sequence [9] by pieces defined by the equation below

\(\begin{gathered} \hline \quad \text { PWLCM } \\ \hline w_{n}=f\left(w_{n-1}\right) \\ =\left\{\begin{array}{cc} \frac{w_{n-1}}{d} & \text { if } 0 \leq w_{n-1} \leq d \\ \frac{w_{n-1}-d}{0.5-d} & \text { if } d \leq w_{n-1} \leq 0.5 \\ f\left(1-w_{n-1}\right) & \text { else } \end{array}\right. \\ \hline \end{gathered}\)       (4)

The simplicity and robustness of this card encourages researchers to use it in cryptography.

II. RECOMMENDED KNOWLEDGE

Before revealing the structure of this new map, it is necessary to define some basic properties. Let (𝑓) be a continuous function over the interval( 𝐼) and defined by the equation.

\(\begin{array}{lll} \hline & \text { continuous function } \\ \hline f: & I \rightarrow I \\ x & \rightarrow f(x) \\ \hline \end{array}\)          (5)

We are going to give some definitions to clarify all the points of the article.

2.1. Trajectory

Let (𝑥) be an element of ( 𝐼), we call the trajectory of x the set of iterates of (𝑥) by the function (𝑓). This set is defined by

\(\begin{gathered} \hline {\text { Trajectory }} \\ \hline \Gamma_{x}=\left\{x, f(x), f^{2}(x), \ldots \ldots . f^{k}(x), \ldots\right\} \\ \hline \end{gathered}\)         (6)

2.2. Periodicity

We say that 𝑥∈𝐼 is periodic if there is an integer (𝑟) such that

\(\begin{gathered} \hline {\text { Periodicity }} \\ \hline \exists r \in \mathbb{N} ; f^{r}(x)=x\\ \hline \end{gathered}\)          (7)

In that case we'll have

\(\begin{gathered} \hline \Gamma_{x}=\left\{x, f(x), f^{2}(x), \ldots \ldots . f^{k}(x), \ldots, f^{r-1}(x)\right\} \\ \hline \end{gathered}\)         (8)

2.3. Period

The (𝑙) period of an element 𝑥∈𝐼 is the smallest integer r such that

\(\begin{gathered} \hline {\text { Period }} \\ \hline l=\underbrace{\operatorname{Min}}_{r \in \mathbb{N}} f^{r}(x)=x\\ \hline \end{gathered}\)        (9)

We notice that if (𝑙) is the period of element (𝑥) then

2.4. Transitive topology

Let (𝑓) be a continuous function on I. We say that (𝑓) is topologically transitive if:

\(\begin{gathered} \hline {\text { Transitive topology }} \\ \hline\begin{aligned} \forall(U, V) \text { Ouverts } & \subset I ; \exists(x, p) \in U x \mathbb{N} / f^{p}(x) \\ & \in V \end{aligned}\\ \hline \end{gathered}\)        (10)

2.5. Density

It is said that ( 𝑓) is dense in (𝐼 ) if:

\(\begin{gathered} \hline {\text { Density }} \\ \hline\begin{aligned} \forall(x, y) \in I x I ; \exists(\alpha, p) \in I x \mathbb{N} / f^{p}(\alpha) \in\left[\begin{array}{ll} x & y \end{array}\right] \end{aligned}\\ \hline \end{gathered}\)        (11)

2.6. Initial Condition Sensitivity

It is said that ( 𝑓) is sensible to the initial conditions if

\(\begin{gathered} \hline {\text { Initial condition sensitivity }} \\ \hline\begin{aligned} \begin{aligned} &\exists \rho>0, \forall x \in I, \forall \mu>0, \exists(y, p) \\ &\in I x \mathbb{N}\left\{\begin{array}{c} |x-y|<\mu \\ \text { Then } \\ \left|f^{p}(x)-f^{p}(y)\right|>\rho \end{array}\right. \end{aligned} \end{aligned}\\ \hline {\text{In other words,}}\\ \hline \begin{aligned} \begin{aligned} \text { For } \rho \in I \text { and } \rho^{*}=\rho+\epsilon: \in \sim 10^{-32} \text { then } \Gamma_{\rho \neq} \Gamma_{\rho+\epsilon} \end{aligned} \end{aligned}\\ \hline \end{gathered}\)         (12)

2.7. Fixed points nature

2.7.1. Definition

(𝑥) 𝑖𝑠 a fixed-point if

\(\begin{aligned} &\hline {\text { Fixed point }} \\ &\hline(f(x)=x) \\ &\hline \end{aligned}\)         (13)

here are two types of fixed points

2.7.2. Attractive fixed point

(𝑥) is an attractive fixed point if and only if

\(\begin{gathered} \hline{\text { Attractive fixed point }} \\ \hline \exists\left(\alpha_{n}=f^{n}\left(\alpha_{0}\right)\right) \text { that } \lim \left(\alpha_{n}\right)=x \\ \hline \end{gathered}\)         (14)

2.7.3. repulsive fixed point

(𝑥) is a repulsive fixed point if it is not attractive.

2.7.4. Property

If function (𝑓) is derivable then

\(\begin{gathered} \hline \text { Property } \\ \hline\left|f^{\prime}(x)\right|>1 \text { then } x \text { attractive fixed point } \\ \left|f^{\prime}(x)\right|<1 \text { then } x \text { repulsive fixed point } \\ \left|f^{\prime}(x)\right|=1 \text { then ambiguity } \\ \hline \end{gathered}\)         (15)

III. NEW CHAOTIC FUNCTION DESIGN

3.1. Chaotic function

3.1.1. Definition

(𝑓) is a chaotic function if and only if:

the set of periodic points is dense in (𝐼)

1. f is transitive topologically

2. f shows sensitivity to initial conditions

3. Let (𝑓) be a continuous function over the interval I and defined by the equation

\(\begin{gathered} \hline \text { Chaotic function design } \\ \hline\left\{\begin{aligned} f: & I \rightarrow I \\ \text { Let } &(p>0\\ f(x)=&\left\{\begin{aligned} p^{2} x & \text { if } 0 \leq x \leq \frac{1}{1+p} \\ p-p x & \text { if } \frac{1}{1+p} \leq x \leq 1 \end{aligned}\right. \end{aligned}\right.\\ \hline \end{gathered}\)       (16)

3.2. Graphic representation of the function (𝒇)

The function (𝑓) defined by the equation can be represented by the following figure

Fig. 1. Basic function graph.

3.3. Existence domain of function f

For the sequence (𝑥𝑛) to exist it is necessary that 𝑓(𝐼)⊂𝐼. So, it is necessary that

\(\begin{gathered} \hline {\text { Existence domain }} \\ \hline\begin{aligned} \begin{aligned} &\exists \rho>0, \forall x \in I, \forall \mu>0, \exists(y, p) \\ &\in I x \mathbb{N}\left\{\begin{array}{c} |x-y|<\mu \\ \text { Then } \\ \left|f^{p}(x)-f^{p}(y)\right|>\rho \end{array}\right. \end{aligned} \end{aligned}\\ \hline \begin{aligned} \text { Let's put } \varphi=& \frac{1+\sqrt{5}}{2} \\ &(\text { Gold }-\text { Number }) \end{aligned}\\ \hline \begin{aligned} \begin{aligned} \text { So } \quad p \in\left[\begin{array}{ll} 0 & \varphi \end{array}\right] \end{aligned} \end{aligned}\\ \hline \end{gathered}\)        (17)

3.4. Derived from f

The function (𝑓) is continuously derivable and its derivative is given by the expression

\(\begin{gathered} \hline \text {Derived from f } \\ \hline\left\{\begin{aligned} f^{\prime}(x)=p^{2} \quad \text { if } \quad 0 \leq x \leq \frac{1}{1+p} \\ f^{\prime}(x)=-p \quad \text { if } \quad \frac{1}{1+p} \leq x \leq 1 \end{aligned}\right.\\ \hline \end{gathered}\)       (18)

3.5. (𝒇) fixed points

The two stationary po

\(\begin{array}{ll} \hline {\text { (f)fixed point }} \\ \hline\left\{\begin{array}{c} \alpha=0 \\ \beta=\frac{p}{1+p} \end{array}\right. \\ \hline \end{array}\)         (19)

3.5.1. Fixed points nature

We have

\(\begin{array}{ll} \hline {\text { Fixed point nature }} \\ \hline \left\{\begin{array}{c} \left|f^{\prime}(\alpha)\right|=p^{2} \\ \left|f^{\prime}(\beta)\right|= \begin{cases}p^{2} & \text { if } 0 \leq \beta \leq \frac{1}{1+p} \\ p & \text { if } \frac{1}{1+p} \leq \beta \leq 1\end{cases} \end{array}\right. \\ \hline \text{So} \\ \hline \left\{\begin{array}{l} \text { if } p<1 \text { then } \alpha \text { is attractive fixed point } \\ \text { if } p>1 \text { then } \alpha \text { is repulsive fixed point } \end{array}\right.\\ \hline \end{array}\)       (20)

Therefore, Preliminary positioning of control parameters (𝑝)

\(\begin{gathered} \hline p \in\left[\begin{array}{ll} 1 & \varphi \end{array}\right]\\ \hline \end{gathered}\)        (21)

3.6. Chaotic sequence building

The sequence (𝑥𝑛) is defined by the following expression

\(\begin{array}{ll} \hline {\text {Chaotic sequence building }} \\ \hline \left\{\begin{array}{c} x_{0} \in\left[\begin{array}{ll} 0 & 1 \end{array}\right] \quad p \in[1 \quad \varphi] \\ f\left(x_{n}\right)=x_{n+1} \begin{cases}p^{2} x_{n} & \text { if } \quad 0 \leq x_{n} \leq \frac{1}{1+p} \\ p-p x_{n} & \text { if } \frac{1}{1+p} \leq x_{n} \leq 1\end{cases} \end{array}\right. \\ \hline \end{array}\)       (22)

3.7. Initial Condition Sensitivities

To measure the sensitivity to the initial conditions of the sequence (𝑥𝑛) defined by function (𝑓) , we have to calculate the Lyapunov exponent

\(\begin{array}{ll} \hline {\text {Lyapunov exponent}} \\ \hline \lambda=\lim _{n \rightarrow \infty}\left(\frac{1}{n}\right) \sum_{k=0}^{n} \log _{2}\left|f^{\prime}\left(x_{k}\right)\right| \\ \hline \end{array}\)        (23)

In our case, we notice that

\(\begin{array}{ll} \hline \begin{gathered} \lambda \gg \lim _{n \rightarrow \infty}\left(\frac{1}{n}\right) \sum_{k=0}^{n} \log _{2}\left|f^{\prime}\left(x_{k}\right)\right|=\lim _{n \rightarrow \infty}\left(\frac{1}{n}\right) \sum_{k=0}^{n} \frac{3}{2} \log _{2}(p) \\ \approx \frac{3}{2} \log _{2}(p)>0 \end{gathered} \\ \hline \end{array}\)        (24)

We can conclude from the value of the Lyapunov exponent that the sequence (𝑥𝑛) defined by the function (𝑓) is sensitive to the initial conditions. This value is higher than the value of the logistics diagram, indicating that it is highly sensitive to initial conditions and control parameters.

Fig. 2. Lyapunov exponent variation with p.

The logarithmic scale plot shows that the distance between two very close initial conditions varies according to an exponential law.

3.8. Sarkovskii's Theorem

Order of Sarkovkii

\(\begin{array}{ll} \hline {\text {Sarkovskii's Theorem}} \\ \hline \left\{\begin{array}{c} 3>5>7>9>11>\cdots \cdots \\ 3 * 2>5 * 2>7 * 2>9 * 2>\cdots \cdots \\ 3 * 2^{2}>5 * 2^{2}>7 * 2^{2}>9 * 2^{2}>\cdots \\ \vdots \\ \vdots \\ 3 * 2^{n}>5 * 2^{n}>7 * 2^{n}>9 * 2^{n}>\cdots \\ \vdots \end{array}\right. \\ \hline \end{array}\)       (25)

All-natural integers are represented in this Sarkovkii order.

The first line represents odd numbers

The row line (𝑛) represents the numbers 2𝑛−1(2𝑘+1)

3.8.1. Theorem

Let 𝑓: 𝐼 → 𝐼 continue. Suppose that (𝑓 ) has a periodic point of period ( 𝑘). If (𝑘≻ ℓ) according to Sarkovskii's order, then f also has a periodic point of period (ℓ).

3.8.2. Corollary (Lie & York)

If (𝑓) admits an item from period 3, then it admits an item of any order. As a result, the function has a chaotic appearance.

Search for

3.8.3. period point 3

Let

\(\begin{array}{ll} \hline {\text {Period point 3}} \\ \hline \text { Let } x^{*}=\frac{p}{1+p^{5}} \in I. \\ \hline \end{array}\)       (26)

Let's demonstrate that (𝑥) is a point of period 3 Let's prove that

\(\begin{array}{ll} \hline \begin{aligned} \frac{p}{1+p^{5}}<\frac{1}{1+p} \Rightarrow & p^{5}-p^{2}-p+1 \\ &>0 \quad \text { for } \quad p \in\left[\begin{array}{ll} 1 & \varphi \end{array}\right] \end{aligned} \\ \hline \end{array}\)       (27)

Let's put

\(\begin{array}{ll} \hline f(p)=p^{5}-p^{2}-p+1 \\ \hline \end{array}\)        (28)

Therefore

\(\begin{array}{ll} \hline \left\{\begin{array}{c} f^{\prime}(p)=5 p^{4}-2 p-1 \\ f^{\prime \prime}(p)=20 p^{3}-2 \text { So } f^{(3)}(p)=60 p^{3}>0 \end{array}\right.\\ \hline \end{array}\)       (29)

The following table gives the variations of the functions

Fig. 3. Location of the period 3 point.

So

\(\begin{array}{ll} \hline \forall p \in\left[\begin{array}{ll} 1 & \varphi \end{array}\right] \frac{p}{1+p^{5}}<\frac{1}{1+p}\\ \hline \end{array}\)

Therefore:

\(\begin{array}{ll} \hline \left\{\begin{array}{c} f\left(x^{*}\right)=\frac{p^{3}}{1+p^{5}} \\ \text { Let's compare } \frac{p^{3}}{1+p^{5}} \text { and } \frac{1}{1+p} \end{array}\right.\\ \hline \end{array}\)         (30)

Let's look at the sign of the function (𝑓) defined by

\(\begin{array}{ll} \hline f(p)=p^{5}-p^{4}-p^{3}+1\\ \hline \end{array}\)        (31)

According to a rough calculation we have

\(\begin{array}{ll} \hline\text { For } \left.p \in\left[\begin{array}{ll} 1,47 & \varphi \end{array}\right] \quad f^{\prime} p\right)>0 \\ \hline \left\{\begin{array}{c} \text { For } p \in\left[\begin{array}{ll} 1,47 & \varphi \end{array}\right] \text { We have } \\ f\left(x^{*}\right)=\frac{p^{3}}{1+p^{5}} \\ f^{(2)}\left(x^{*}\right)=\frac{p^{5}}{1+p^{5}}>\frac{1}{(1+p)} \\ f^{(3)}\left(x^{*}\right)=p-p \frac{p^{5}}{1+p^{5}}=\frac{p}{1+p^{5}}=x^{*} \end{array}\right. \\ \hline \end{array}\)       (32)

\(x^{\star}=\begin{gathered} p \\ 1+p^{5} \end{gathered}\) is a periodic point of period 3, therefore (𝑓) is a chaotic function according to Sarkovskii's corollary. This period point 3 is illustrated by the following figure

Fig. 4. Period point 3.

3.9. Initial sequence values

3.9.1. Period doubling

We know that the only fixed points are

\(\begin{array}{ll} \hline\text {Period doubling} \\ \hline \left\{\begin{array}{l} \alpha=0 \\ \beta=\frac{p}{1+p} \end{array}\right. \\ \hline \end{array}\)       (33)

searches for points (𝑥0) for which there is a k such that

\(\begin{array}{ll} \hline f^{k}(x_{0})=\beta\\ \hline \end{array}\)

If there is such a point (𝑥𝑛 ) then the sequence (𝑥𝑛 ) is stationary.

For (𝑘=1), we have 

\(\begin{array}{ll} \hline \left\{\begin{array}{c} f\left(x_{0}\right)=\beta=\frac{p}{1+p} \\ \quad \text { So } \\ x_{0}=\frac{1}{p(1+p)} \end{array}\right.\\ \hline \end{array}\)       (34)

For (𝑘=2), we have 

\(\begin{array}{ll} \hline \left\{\begin{array}{c} f^{2}\left(x_{0}\right)=\beta=\frac{p}{1+p} \\ \text{So}\\ x_{0}=\frac{1}{p^{3}(1+p)} \end{array}\right.\\ \hline \end{array}\)       (35)

By recurrence, we obtain

For (𝑘=𝑛), we have

\(\begin{array}{ll} \hline \left\{\begin{array}{lI} f^{n}\left(x_{0}\right)=\beta=\frac{p}{1+p} \\ \text{So}\\ x_{0}=\frac{1}{p^{2 n-1}(1+p)} \end{array}\right.\\ \hline \end{array}\)       (36)

If there is (𝑛) such that the initial condition \(x_{0}=\frac{1}{p^{2 n-1}(1+p)}\) , then the sequence would be stationary from the 𝑛 𝑖𝑡𝑒𝑟𝑎𝑡𝑖𝑜𝑛 onwards. Then the sequence is no longer chaotic.

We construct a sequence (𝑦𝑛 ) defined by:

\(\begin{array}{ll} \hline \left\{\begin{array}{c} n \geq 1 \\ \text { We have } \\ y_{n}=\frac{1}{p^{2 n-1}(1+p)} \sim \frac{1}{p^{2 n}} \end{array}\right.\\ \hline \end{array}\)       (37)

(𝑦𝑛 ) is a decreasing sequence minus 0, converging donations, and we have the following equation;

\(\begin{array}{ll} \hline \text { For } p>1 \text { we have } \lim _{n \rightarrow \infty}\left(y_{n}\right)=0.\\ \hline \end{array}\)       (38)

Finally

\(\begin{array}{ll} \hline \left\{\begin{array}{c} x_{0}>\frac{1}{(1+p)} \quad p \in[1,47 \quad \varphi] \\ f\left(x_{n}\right)=x_{n+1}\left\{\begin{array}{cl} p^{2} x_{n} & \text { if } 0 \leq x_{n} \leq \frac{1}{1+p} \\ p-p x_{n} & \text { if } \frac{1}{1+p} \leq x_{n} \leq 1 \end{array}\right. \end{array}\right.\\ \hline \end{array}\)       (39)

This is illustrated by the following curve

The sequence (𝑥𝑛 ) defines is a chaotic sequence under the specified conditions.

We are looking for an element \(x_{0}>\frac{1}{(1+p)}\) such as

\(\begin{array}{ll} \hline \begin{gathered} \exists k \in \mathbb{N} \text { such as } f\left(x_{0}\right)=x_{k}=\frac{1}{p^{2 k-1}(1+p)} \\ <\frac{1}{(1+p)} \end{gathered}\\ \hline \end{array}\)       (40)

Fig. 5. Initial value.

If such a point exists then two situations present themselves

\(\begin{array}{ll} \hline x_{0}>\frac{p}{(1+p)} \quad \text { or } x_{0} \in\left[\begin{array}{cc} \frac{1}{(1+p)} & \frac{p}{(1+p)} \end{array}\right]\\ \hline \end{array}\)       (41)

Situation 1

\(\begin{array}{ll} \hline \begin{aligned} \text { if }x_{0} \in\left[\frac{1}{(1+p)}\right.&\left.\frac{p}{(1+p)}\right] \text { then } f\left(x_{0}\right) \\ &>\frac{p}{(1+p)} \end{aligned}\\ \hline \end{array}\)        (42)

Situation 2

\(\begin{array}{ll} \hline \text { if } x_{0}>\frac{p}{(1+p)} \text { then } f\left(x_{0}\right)<\frac{p}{(1+p)}\\ \hline \end{array}\)       (43)

So

\(\begin{array}{ll} \hline \left\{\begin{array}{c} p-p x_{0}=\frac{1}{p^{2 k-1}(1+p)} \\ S o \\ x_{0}=\frac{p^{2 k-1}(1+p)-1}{p^{2 k-1}(1+p)}<\frac{1}{(1+p)} \end{array}\right.\\ \hline \end{array}\)       (44)

In this case the sequence would be stationary from iteration (𝑘)

\(\begin{array}{ll} \hline f^{k}\left(x_{0}\right)=\frac{p}{1+p}\\ \hline \end{array}\)       (45)

Moreover, we have,

\(\begin{array}{ll} \hline \forall k \in \mathbb{N}: \frac{p^{2 k-1}(1+p)-1}{p^{2 k-1}(1+p)}>\frac{p}{1+p}\\ \hline \end{array}\)       (46)

Finally

\(\begin{array}{ll} \hline \left\{\begin{array} { l } { x _ { 0 } \in [ \begin{array} { l l } { \frac { 1 } { ( 1 + p ) } } & { \frac { p } { ( 1 + p ) } ] } & { p \in [ 1 , 4 7 } \end{array} \quad \varphi ] } \\ { f ( x _ { n } ) = x _ { n + 1 } \left\{\begin{array}{lll} p^{2} x_{n} & \text { if } & 0 \leq x_{n} \leq \frac{1}{1+p} \\ p-p x_{n} & \text { if } & \frac{1}{1+p} \leq x_{n} \leq 1 \end{array}\right.} \end{array} \right.\\ \hline \end{array}\)       (47)

This sequence is chaotic.

3.10. Feigenbaum's Constants - Renormalization –

In 1975 the physicist Feigenbaum noticed that the general pattern of the logistic sequence was repeated at each bifurcation to within a factor of scale. He then used a process of renormalization. This involves enlarging smaller and smaller parts of the graph and comparing these magnifications to the original pattern. When the enlarged pattern reproduces the first pattern, it is called self- simulation. As it grows to infinity, the general structure repeats itself. If globally, the duplications are not the same, they keep the same ratios

Fig. 6. Feigenbaum's Renormalization.

The first constant intervening horizontally

\(\begin{array}{ll} \hline \frac{L_{1}}{L_{2}} \approx \frac{L_{2}}{L_{3}} \approx 4,57\\ \hline \end{array}\)

The second constant occurring vertically

\(\begin{array}{ll} \hline \frac{d_{1}}{d_{2}} \approx \frac{d_{2}}{d_{3}} \approx 2,5.\\ \hline \end{array}\)

3.10.1. Universality

The same sequence, but defined by another function (f) defines single hump type has the same properties

Fig. 7. Universality.

3.11. Some simulations

\(\left\{\begin{array}{c} x_{0}=0,45 \\ p=1,5 \end{array}\right.\)

Fig. 8. Trajectory of x.

The trajectory seems to be random

3.11.1. Deviation

For two very close values of the initial conditions attached to the same control parameter (p) we see the deviation of the trajectories, this is due to the strong sensitivity to the initial conditions provided by the value of the Lyapunov exponent.

Fig. 9. Sensitivity.

We have noticed that small disturbances under initial conditions will greatly deviate from the trajectory.

The sensitivity to initial conditions of a chaotic map measures its robustness against abrupt attacks. Our map is one-dimensional, a comparison with the most used maps is given by the following table.

Table 1. Lyapunov exponent.

IV. CRYPTOGRAPHY APPLICATION

We will introduce the improvement of Hill's classic method using the new chaotic map as the private key to illustrate the performance of our new chaotic map. After reading the original image and switching to the vector, a chaotic vector of the same size is generated from the new map (𝑖𝑛 𝑡ℎ𝑒 𝑠𝑖𝑚𝑢𝑙𝑎𝑡𝑖𝑜𝑛, 𝑤𝑒 𝑡𝑎𝑘𝑒 𝑝 = 1.54, 𝑥0 = 0.623).

4.1. Our algorithm

1. Subdivision of the image vector into blocks of three pixels, as well as the chaotic vector.

2. Calculation of the initialization vector

3. Modification of the priming block

4. Application of Hill's improved method.

5. Application of dissemination

6. Reconstruction of the encrypted image

7. The encryption process is as follows

Fig. 10. Encryption process.

The encryption function is defined by

\(\begin{array}{ll} \hline\text {Encryption process} \\ \hline \left\{\begin{array}{c} B_{1}=I V \oplus B_{1} \\ \Psi\left(B_{1}\right)=B_{1}^{\prime}=H B_{1} \oplus T V 1 \\ \text { for } i=2 \text { to } \mathrm{nm} \\ B_{i}=B_{i-1} \oplus B_{i} \\ \Psi\left(B_{1}\right)=B_{1}^{\prime}=H B_{1} \oplus T V i \\ \text { Next } i \end{array}\right. \\ \hline \end{array}\)       Alg 1

The use of vector (𝑇𝑣𝑖) aims to overcome the linearity problem of classical systems.

Construct the encryption key matrix from the new chaotic map by the following expression.

\(\begin{array}{ll} \hline H=\left(\begin{array}{lll} a & b & c \\ 0 & d & e \\ 0 & 0 & q \end{array}\right) \\ With \ a, d, q \epsilon(\mathbb{Z} / 256 \mathbb{Z})^{*}\ and \ b, c, e\ {\mathbb{Z} / 256 \mathbb{Z}} \\ \hline \end{array}\)

After the simulation is complete, we get

Table 2. Encrypted image histogram.

All images tested by our algorithm generate encrypted images with uniform and flattened histograms of pixel distribution. These histograms give an entropy value very close to the maximum value (8). This ensures a strong protection of our new technology against any entropy attack. The calculation of the entropy value is given by the table below

Table 3. Calculated entropy.

The use of the encryption mode provides strong protection for our system against differential attacks. The table below illustrates the different values of the differential statistical constants.

Table 4. Differential parameters.

4.1.1. Avalanche effect

Our algorithm uses a strong link between encrypted pixels and pixels with clear policies. As a result, as data propagates through the structure of the algorithm, gradual changes become increasingly important. The avalanche effect is the number of bits that have been changed if a single bit in the original image is changed. The mathematical expression of this avalanche effect is given by

\(A E=\left(\frac{\sum_{i} \text { bit change }}{\sum_{i} \text { bit total }}\right) * 100\)       (48)

Table 5. Avalanche effect.

The high sensitivity of our new chaotic map makes our algorithm immune to brute force attacks. This sensitivity is illustrated by the following figure

Fig. 11. Key sensitivity.

A rapid comparison between our example using a chaotic map with an enhanced Vigenere and other techniques. This minimal comparison, illustrated in the following table, highlights the complexity of our system, devoted by the new chaotic map.

Table 6. Comparison of our scheme with other methods.

V. CONCLUSION

Faced with various difficulties in constructing random numbers, researchers are committed to using generators that follow simple mathematical formulas to create pseudo random numbers. With the passage of time, chaos theory suddenly appeared, and due to the need to use passwords with such numbers to create private encryption attack. Using logarithms and discrete exponents and translation vectors to overcome linear problems will increase the complexity of our method.

CONFLICT OF INTEREST

I am the alone author of this article, and therefore no conflict.

To finalize this document, I did not receive any assistance funds from any organization. This document does not contain any studies or experiments on animals.

Ethical approval: This article does not contain any studies with animals performed by any of the authors.

(Or) Ethical approval: This article does not contain any studies with human participants or animals performed by any of the author.

Acknowledgement

This article is not subsidized by any public or private organization. It is a personal work.

References

  1. Gunyaz Ablay, "Chaotic Map Construction from Common Nonlinearities and Microcontroller Implementations," International Journal of Bifurcation and Chaos, vol. 26, no. 7. 2016.
  2. Kwok-Wo Wong, Xiao feng Liao, Yong Wang, Degang Yang, "One-way hash function construction based on chaotic map network," Chaos, Solitons & Fractals, vol. 41, no. 5, pp. 2566-2574, 2009. https://doi.org/10.1016/j.chaos.2008.09.056
  3. Yantao Li, Shao jiang Deng, and Di Xiao "A novel Hash algorithm construction based on chaotic neural network," Neural Computing and Applications, vol. 20, pp. 133-141, 2011. https://doi.org/10.1007/s00521-010-0432-2
  4. Nicolas Bierne, John, Welch , Etienne Loire , Francois Bonhomme, and Patrice david, "The coupling hypothesis: why genome scans may fail to map local adaptation genes," Molecular Ecology, vol. 20, no. 11, pp. 2044-2072, 2011. https://doi.org/10.1111/j.1365-294X.2011.05080.x
  5. Jacques Patarin, "Security of Random Feistel Schemes with 5 or More Rounds," in Proceeding of Annual International Cryptology Conference, pp 106-122, 2004.
  6. Sahar Mazloom, Amir Masud, and Eftekhari-Moghadam, "Color image encryption based on Coupled Nonlinear Chaotic Map," Chaos, Solitons & Fractals, vol. 42, no. 3, pp. 1745-1754. 2009. https://doi.org/10.1016/j.chaos.2009.03.084
  7. Xiao Feng, Xiaolin Tian, and Shaowe iXia, "An Improved Image Scrambling Algorithm Based On Magic Cube Rotation and Chaotic Sequences," in Proceeding of IEEE the 4-th International Congress on Image and Signal Processing, pp.1021-1024, 2011
  8. Hraoui S., Gmira F., Jarar A. O., Satori. K., Saaidi A., "Benchmarking AES and chaos based logistic map for image encryption," in Proceeding of International Conference on Computer Systems and Applications (AICCSA), pp. 1-4, 2013.
  9. A. Jarjar, "Improvement of hill's classical method in image cryptography," International Journal of Statistics and Applied Mathematics, vol. 2, no. 3, Part A, 2017.
  10. A. N. Pisarchik, N. J. Flores-Carmona, and M. Carpio-Valadez, "Encryption and decryption of images with chaotic map lattices," AIP Chaos, vol. 16, 033118 (2006) https://doi.org/10.1063/1.2242052
  11. Noshadian S., Ebrahimzade A., and Kazemitabar S. J., "Breaking a chaotic image encryption algorithm," Multimedia Tools and Applications, vol. 79, no. 35, pp. 25635-25655, 2020. https://doi.org/10.1007/s11042-020-09233-6
  12. Niu Y., Zhou Z., and Zhang X., "An image encryption approach based on chaotic maps and genetic operations," Multimedia Tools and Applications, vol. 79, no. 35, pp. 25613-25633, 2020. https://doi.org/10.1007/s11042-020-09237-2
  13. Ghazvini M., Mirzadi M., and Parvar N., "A modified method for image encryption based on chaotic map and genetic algorithm," Multimedia Tools and Applications, vol. 79, no. 37, pp. 26927-26950, 2020. https://doi.org/10.1007/s11042-020-09058-3