Search results

1 – 10 of 13
Article
Publication date: 13 October 2022

Aruna Kumari Koppaka and Vadlamani Naga Lakshmi

In the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic world, the…

Abstract

Purpose

In the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic world, the privacy of important and sensitive data needs to be safeguarded from unauthorized users to improve its security. Therefore, several key generations, encryption and decryption algorithms are developed for data privacy preservation in the cloud environment. Still, the outsourced data remains with the problems like minimum data security, time consumption and increased computational complexity. The purpose of this research study is to develop an effective cryptosystem algorithm to secure the outsourced data with minimum computational complexity.

Design/methodology/approach

A new cryptosystem algorithm is proposed in this paper to address the above-mentioned concerns. The introduced cryptosystem algorithm has combined the ElGamal algorithm and hyperchaotic sequence, which effectively encrypts the outsourced data and diminishes the computational complexity of the system.

Findings

In the resulting section, the proposed improved ElGamal cryptosystem (IEC) algorithm performance is validated using the performance metrics like encryption time, execution time, decryption time and key generation comparison time. The IEC algorithm approximately reduced 0.08–1.786 ms of encryption and decryption time compared to the existing model: secure data deletion and verification.

Originality/value

The IEC algorithm significantly enhances the data security in cloud environments by increasing the power of key pairs. In this manuscript, the conventional ElGamal algorithm is integrated with the pseudorandom sequences for a pseudorandom key generation for improving the outsourced cloud data security.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 4 January 2021

Meiting Liu, Wenxin Yu, Junnian Wang, Yu Chen and Yuyan Bian

In this paper, a nine-dimensional chaotic system is designed and applied to secure communication.

Abstract

Purpose

In this paper, a nine-dimensional chaotic system is designed and applied to secure communication.

Design/methodology/approach

Firstly, the equilibrium characteristics, dissipativity, bifurcation diagram and Lyapunov exponent spectrum are used to analyze the relevant characteristics of the proposed nine-dimensional chaotic system. In the analysis of Lyapunov exponential spectrum, when changing the linear parameters, the system shows two states, hyperchaos and chaos. For secure communication, there is a large secret key space. Secondly, C0 complexity and SEcomplexity of the system are analyzed, which shows that the system has sequences closer to random sequences.

Findings

The proposed nine-dimensional system has a large key space and more complex dynamic characteristics

Originality/value

The results show that the proposed nine-dimensional hyperchaotic system has excellent encryption capabilities and can play an important role in the field of secure communication.

Details

Circuit World, vol. 48 no. 1
Type: Research Article
ISSN: 0305-6120

Keywords

Open Access
Article
Publication date: 14 August 2020

F.J. Farsana, V.R. Devi and K. Gopakumar

This paper introduces an audio encryption algorithm based on permutation of audio samples using discrete modified Henon map followed by substitution operation with keystream…

1581

Abstract

This paper introduces an audio encryption algorithm based on permutation of audio samples using discrete modified Henon map followed by substitution operation with keystream generated from the modified Lorenz-Hyperchaotic system. In this work, the audio file is initially compressed by Fast Walsh Hadamard Transform (FWHT) for removing the residual intelligibility in the transform domain. The resulting file is then encrypted in two phases. In the first phase permutation operation is carried out using modified discrete Henon map to weaken the correlation between adjacent samples. In the second phase it utilizes modified-Lorenz hyperchaotic system for substitution operation to fill the silent periods within the speech conversation. Dynamic keystream generation mechanism is also introduced to enhance the correlation between plaintext and encrypted text. Various quality metrics analysis such as correlation, signal to noise ratio (SNR), differential attacks, spectral entropy, histogram analysis, keyspace and key sensitivity are carried out to evaluate the quality of the proposed algorithm. The simulation results and numerical analyses demonstrate that the proposed algorithm has excellent security performance and robust against various cryptographic attacks.

Details

Applied Computing and Informatics, vol. 19 no. 3/4
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 4 October 2018

Bocheng Bao, Jiaoyan Luo, Han Bao, Quan Xu, Yihua Hu and Mo Chen

The purpose of this paper is to construct a proportion-integral-type (PI-type) memristor, which is different from that of the previous memristor emulator, but the constructing…

Abstract

Purpose

The purpose of this paper is to construct a proportion-integral-type (PI-type) memristor, which is different from that of the previous memristor emulator, but the constructing memristive chaotic circuit possesses line equilibrium, leading to the emergence of the initial conditions-related dynamical behaviors.

Design/methodology/approach

This paper presents a PI-type memristor emulator-based canonical Chua’s chaotic circuit. With the established mathematical model, the stability region for the line equilibrium is derived, which mainly consists of stable and unstable regions, leading to the emergence of bi-stability because of the appearance of a memristor. Initial conditions-related dynamical behaviors are investigated by some numerically simulated methods, such as phase plane orbit, bifurcation diagram, Lyapunov exponent spectrum, basin of the attraction and 0-1 test. Additionally, PSIM circuit simulations are executed and the seized results validate complex dynamical behaviors in the proposed memristive circuit.

Findings

The system exhibits the bi-stability phenomenon and demonstrates complex initial conditions-related bifurcation behaviors with the variation of system parameters, which leads to the occurrence of the hyperchaos, chaos, quasi-periodic and period behaviors in the proposed circuit.

Originality/value

These memristor emulators are simple and easy to physically fabricate, which have been increasingly used for experimentally demonstrating some interesting and striking dynamical behaviors in the memristor-based circuits and systems.

Details

Circuit World, vol. 44 no. 4
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 20 June 2022

Quanli Deng, Chunhua Wang, Yazheng Wu and Hairong Lin

The purpose of this paper is to construct a multiwing chaotic system that has hidden attractors with multiple stable equilibrium points. Because the multiwing hidden attractors…

Abstract

Purpose

The purpose of this paper is to construct a multiwing chaotic system that has hidden attractors with multiple stable equilibrium points. Because the multiwing hidden attractors chaotic systems are safer and have more dynamic behaviors, it is necessary to construct such a system to meet the needs of developing engineering.

Design/methodology/approach

By introducing a multilevel pulse function into a three-dimensional chaotic system with two stable node–foci equilibrium points, a hidden multiwing attractor with multiple stable equilibrium points can be generated. The switching behavior of a hidden four-wing attractor is studied by phase portraits and time series. The dynamical properties of the multiwing attractor are analyzed via the Poincaré map, Lyapunov exponent spectrum and bifurcation diagram. Furthermore, the hardware experiment of the proposed four-wing hidden attractors was carried out.

Findings

Not only unstable equilibrium points can produce multiwing attractors but stable node–foci equilibrium points can also produce multiwing attractors. And this system can obtain 2N + 2-wing attractors as the stage pulse of the multilevel pulse function is N. Moreover, the hardware experiment matches the simulation results well.

Originality/value

This paper constructs a new multiwing chaotic system by enlarging the number of stable node–foci equilibrium points. In addition, it is a nonautonomous system that is more suitable for practical projects. And the hardware experiment is also given in this article which has not been seen before. So, this paper promotes the development of hidden multiwing chaotic attractors in nonautonomous systems and makes sense for applications.

Details

Circuit World, vol. 49 no. 4
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 10 November 2022

Xinxing Yin, Juan Chen, Wenxin Yu, Yuan Huang, Wenxiang Wei, Xinjie Xiang and Hao Yan

This study aims to improve the complexity of chaotic systems and the security accuracy of information encrypted transmission. Applying five-dimensional memristive Hopfield neural…

Abstract

Purpose

This study aims to improve the complexity of chaotic systems and the security accuracy of information encrypted transmission. Applying five-dimensional memristive Hopfield neural network (5D-HNN) to secure communication will greatly improve the confidentiality of signal transmission and greatly enhance the anticracking ability of the system.

Design/methodology/approach

Chaos masking: Chaos masking is the process of superimposing a message signal directly into a chaotic signal and masking the signal using the randomness of the chaotic output. Synchronous coupling: The coupled synchronization method first replicates the drive system to get the response system, and then adds the appropriate coupling term between the drive The synchronization error and the coupling term of the system will eventually converge to zero with time. The synchronization error and coupling term of the system will eventually converge to zero over time.

Findings

A 5D memristive neural network is obtained based on the original four-dimensional memristive neural network through the feedback control method. The system has five equations and contains infinite balance points. Compared with other systems, the 5D-HNN has rich dynamic behaviors, and the most unique feature is that it has multistable characteristics. First, its dissipation property, equilibrium point stability, bifurcation graph and Lyapunov exponent spectrum are analyzed to verify its chaotic state, and the system characteristics are more complex. Different dynamic characteristics can be obtained by adjusting the parameter k.

Originality/value

A new 5D memristive HNN is proposed and used in the secure communication

Details

Circuit World, vol. 50 no. 1
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 20 April 2023

Vamsi Desam and Pradeep Reddy CH

Several chaotic system-based encryption techniques have been presented in recent years to protect digital images using cryptography. The challenges of key distribution and…

Abstract

Purpose

Several chaotic system-based encryption techniques have been presented in recent years to protect digital images using cryptography. The challenges of key distribution and administration make symmetric encryption difficult. The purpose of this paper is to address these concerns, the novel hybrid partial differential elliptical Rubik’s cube algorithm is developed in this study as an asymmetric image encryption approach. This novel algorithm generates a random weighted matrix, and uses the masking method on image pixels with Rubik’s cube principle. Security analysis has been conducted, it enhances and increases the reliability of the proposed algorithm against a variety of attacks including statistical and differential attacks.

Design/methodology/approach

In this light, a differential elliptical model is designed with two phases for image encryption and decryption. A modified image is achieved by rotating and mixing intensities of rows and columns with a masking matrix derived from the key generation technique using a unique approach based on the elliptic curve and Rubik’s cube principle.

Findings

To evaluate the security level, the proposed algorithm is tested with statistical and differential attacks on a different set of test images with peak signal-to-noise ratio, unified average changed intensity and number of pixel change rate performance metrics. These results proved that the proposed image encryption method is completely reliable and enhances image security during transmission.

Originality/value

The elliptic curve–based encryption is hard to break by hackers and adding a Rubik’s cube principle makes it even more complex and nearly impossible to decode. The proposed method provides reduced key size.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 21 April 2022

Zuanbo Zhou, Wenxin Yu, Junnian Wang, Yanming Zhao and Meiting Liu

With the development of integrated circuit and communication technology, digital secure communication has become a research hotspot. This paper aims to design a five-dimensional…

Abstract

Purpose

With the development of integrated circuit and communication technology, digital secure communication has become a research hotspot. This paper aims to design a five-dimensional fractional-order chaotic secure communication circuit with sliding mode synchronous based on microcontroller (MCU).

Design/methodology/approach

First, a five-dimensional fractional-order chaotic system for encryption is constructed. The approximate numerical solution of fractional-order chaotic system is calculated by Adomian decomposition method, and the phase diagram is obtained. Then, combined with the complexity and 0–1 test algorithm, the parameters of fractional-order chaotic system for encryption are selected. In addition, a sliding mode controller based on the new reaching law is constructed, and its stability is proved. The chaotic system can be synchronized in a short time by using sliding mode control synchronization.

Findings

The electronic circuit is implemented to verify the feasibility and effectiveness of the designed scheme.

Originality/value

It is feasible to realize fractional-order chaotic secure communication using MCU, and further reducing the synchronization error is the focus of future work.

Details

Circuit World, vol. 49 no. 4
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 23 April 2018

Quan Xu, Qinling Zhang, Tao Jiang, Bocheng Bao and Mo Chen

The purpose of this paper is to develop a simple chaotic circuit. The circuit can be fabricated by less discrete electronic components, within which complex dynamical behaviors…

Abstract

Purpose

The purpose of this paper is to develop a simple chaotic circuit. The circuit can be fabricated by less discrete electronic components, within which complex dynamical behaviors can be generated.

Design/methodology/approach

A second-order non-autonomous inductor-free chaotic circuit is presented, which is obtained by introducing a sinusoidal voltage stimulus into the classical Wien-bridge oscillator. The proposed circuit only has two dynamic elements, and its nonlinearity is realized by the saturation characteristic of the operational amplifier in the classical Wien-bridge oscillator. After that, its dynamical behaviors are revealed by means of bifurcation diagram, Lyapunov exponent and phase portrait and further confirmed using the 0-1 test method. Moreover, an analog circuit using less discrete electronic components is implemented, and its experimental results are measured to verify the numerical simulations.

Findings

The equilibrium point located in a line segment varies with time evolution, which leads to the occurrence of periodic, quasi-periodic and chaotic behaviors in the proposed circuit.

Originality/value

Unlike the previously published works, the significant values of the proposed circuit with simple topology are inductor-free realization and without extra nonlinearity, which make the circuit can be used as a paradigm for academic teaching and experimental illustraction for chaos.

Details

Circuit World, vol. 44 no. 3
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 3 January 2017

Vesna Rubežić, Igor Djurović and Ervin Sejdić

The purpose of this paper is to propose a new algorithm for detection of chaos in oscillatory circuits. The algorithm is based on the wavelet transform.

110

Abstract

Purpose

The purpose of this paper is to propose a new algorithm for detection of chaos in oscillatory circuits. The algorithm is based on the wavelet transform.

Design/methodology/approach

The proposed detection is developed by using a specific measure obtained by averaging wavelet coefficients. This measure exhibits various values for chaotic and periodic states.

Findings

The proposed algorithm is applied to signals from autonomous systems such as the Chua’s oscillatory circuit, the Lorenz chaotic system and non-autonomous systems such as the Duffing oscillator. In addition, the detection is applied to sequences obtained from the logistic map. The results are compared to those obtained with a detrended fluctuation analysis and a time-frequency signal analysis based on detectors of chaotic states.

Originality/value

In this paper, a new algorithm is proposed for the detection of chaos from a single time series. The proposed technique is robust to the noise influence, having smaller calculation complexity with respect to the state-of-the-art techniques. It is suitable for real-time detection with delay that is about half of the window width.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 36 no. 1
Type: Research Article
ISSN: 0332-1649

Keywords

1 – 10 of 13