Implementation and practical problems of chaos-based cryptography revisited

Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional cryptography. Chaotic maps have been used in the design of cryptosystems becaus...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Journal of information security and applications Ročník 50; s. 102421
Hlavní autori: Teh, Je Sen, Alawida, Moatsum, Sii, You Cheng
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Elsevier Ltd 01.02.2020
Predmet:
ISSN:2214-2126
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional cryptography. Chaotic maps have been used in the design of cryptosystems because they depict desirable characteristics such as pseudorandomness, complexity, and sensitivity to parameter changes. Despite these characteristics being analogous to cryptographic requirements, the resulting chaos-based cryptosystems are usually difficult to analyze, inefficient, and have reproducibility issues. In this paper, we highlight some of the problems which deter the practical application of chaos-based cryptosystems. We show that recently published work in reputable journals still do not address these problems and remain only of academic interest. We also perform experiments to depict some of the implementation issues of digital chaos that need to be taken into consideration when designing chaos-based algorithms. We then discuss a number of possible solutions that can be explored to overcome these problems.
AbstractList Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional cryptography. Chaotic maps have been used in the design of cryptosystems because they depict desirable characteristics such as pseudorandomness, complexity, and sensitivity to parameter changes. Despite these characteristics being analogous to cryptographic requirements, the resulting chaos-based cryptosystems are usually difficult to analyze, inefficient, and have reproducibility issues. In this paper, we highlight some of the problems which deter the practical application of chaos-based cryptosystems. We show that recently published work in reputable journals still do not address these problems and remain only of academic interest. We also perform experiments to depict some of the implementation issues of digital chaos that need to be taken into consideration when designing chaos-based algorithms. We then discuss a number of possible solutions that can be explored to overcome these problems.
ArticleNumber 102421
Author Teh, Je Sen
Sii, You Cheng
Alawida, Moatsum
Author_xml – sequence: 1
  givenname: Je Sen
  orcidid: 0000-0001-5571-4148
  surname: Teh
  fullname: Teh, Je Sen
  email: jesen_teh@usm.my
– sequence: 2
  givenname: Moatsum
  orcidid: 0000-0001-8146-5843
  surname: Alawida
  fullname: Alawida, Moatsum
– sequence: 3
  givenname: You Cheng
  surname: Sii
  fullname: Sii, You Cheng
BookMark eNp9kMtqwzAQRbVIoWmaH-jKP-BUkiVjQTcl9BEa6CZ7MZZGjYxjGUkE8vd1cFddZDXDXM7APQ9kMYQBCXlidMMoq5-7TecTbDhlajpwwdmCLDlnouSM1_dknVJHKWWcKcmrJfnancYeTzhkyD4MBQy2GCOY7A300xbaKU1FcIU5QkhlCwltYeJlzOEnwni8FBHPPvmM9pHcOegTrv_mihze3w7bz3L__bHbvu5LU9V1LgVV1rZUCNE0qpKVtAosYKsosNYpLqhoZd1UUkrnWFsLZOAcuBqlQnDVivD5rYkhpYhOj9GfIF40o_oqQXf6KkFfJehZwgQ1_yDj58o5gu9voy8zilOns8eok_E4GLQ-osnaBn8L_wWcFX1o
CitedBy_id crossref_primary_10_1016_j_ins_2022_08_102
crossref_primary_10_1186_s42400_024_00319_4
crossref_primary_10_1109_ACCESS_2024_3372136
crossref_primary_10_1109_ACCESS_2022_3165565
crossref_primary_10_1109_TII_2024_3523548
crossref_primary_10_1140_epjp_s13360_023_04224_6
crossref_primary_10_1109_ACCESS_2020_3002763
crossref_primary_10_1109_ACCESS_2021_3060861
crossref_primary_10_1109_JPHOT_2020_3044222
crossref_primary_10_1145_3614433
crossref_primary_10_1155_2021_6615708
crossref_primary_10_1016_j_jestch_2020_02_007
crossref_primary_10_1155_2021_8824915
crossref_primary_10_1631_FITEE_2300755
crossref_primary_10_1108_AEAT_10_2024_0300
crossref_primary_10_1109_ACCESS_2022_3173338
crossref_primary_10_3389_fams_2022_1100839
crossref_primary_10_1088_1402_4896_ad75c5
crossref_primary_10_1007_s12652_022_04107_1
crossref_primary_10_1088_1674_1056_ac6335
crossref_primary_10_1007_s11042_024_18628_8
crossref_primary_10_1109_TIFS_2024_3390995
crossref_primary_10_1109_ACCESS_2022_3145005
crossref_primary_10_1109_ACCESS_2021_3054250
crossref_primary_10_1109_JLT_2022_3226768
crossref_primary_10_1109_ACCESS_2021_3049881
crossref_primary_10_51537_chaos_1214569
crossref_primary_10_1088_1402_4896_adb523
crossref_primary_10_1155_2020_7647421
crossref_primary_10_1109_ACCESS_2024_3407654
crossref_primary_10_51537_chaos_1250317
crossref_primary_10_1007_s00371_021_02066_w
crossref_primary_10_1109_JETCAS_2021_3077023
crossref_primary_10_1007_s11071_020_05504_x
crossref_primary_10_1109_ACCESS_2020_3012912
Cites_doi 10.1007/s00521-015-2158-7
10.1007/978-3-642-20542-2_8
10.1016/j.physleta.2006.05.038
10.1007/s11071-011-0006-6
10.1016/j.image.2019.08.014
10.1007/s10586-018-02895-w
10.1109/12.280803
10.1007/s11071-018-4426-4
10.1016/j.optlaseng.2018.11.015
10.3745/JIPS.2013.9.2.271
10.1016/j.chaos.2006.09.047
10.1007/978-3-642-20542-2_6
10.1007/s11071-019-04802-3
10.1109/ACCESS.2018.2886384
10.1007/s11071-018-4076-6
10.1007/s11071-014-1492-0
10.3390/sym10070266
10.1109/TCSI.2004.842870
10.1016/j.chaos.2016.04.007
10.1016/j.optcom.2009.09.070
10.1155/2017/9040518
10.1109/ACCESS.2018.2867111
10.1007/s13319-017-0123-1
10.1007/s11042-019-7453-3
10.1177/1077546317734712
10.4018/IJRSDA.2018040107
10.1007/s11071-019-04771-7
10.1016/j.sigpro.2018.06.008
10.1142/S0129183113501052
10.1016/j.optlaseng.2019.04.011
10.1007/s13319-017-0154-7
10.1016/j.optlaseng.2019.04.005
10.1007/s00500-018-3112-2
10.1016/j.ins.2018.12.048
10.1007/s11071-014-1816-0
10.1007/s11071-012-0628-3
10.3390/sym11070853
10.1016/j.optlastec.2019.105698
10.1016/j.sigpro.2018.09.029
10.1016/j.ins.2011.09.008
10.1007/s11042-018-6022-5
10.3390/info9070160
10.1007/s41870-018-0199-8
10.1016/j.sigpro.2018.02.028
10.1007/s11042-019-7235-y
10.1016/j.ifacol.2018.11.406
10.1142/S0218127406015507
10.1007/s11071-015-1932-5
10.1016/j.optcom.2012.07.106
10.1016/j.sigpro.2019.06.013
10.1007/s11071-013-1018-1
10.1103/PhysRevLett.95.098702
10.1260/1748-3018.4.2.167
10.1007/s11071-016-3024-6
10.1007/s11042-019-7282-4
10.1016/j.sigpro.2018.03.010
10.1007/s11277-015-2896-y
10.1016/j.ins.2015.03.050
10.1109/ACCESS.2018.2817600
10.1109/MMUL.2018.112142439
10.1109/TCSI.2006.874182
10.1016/j.optlastec.2019.02.009
10.1007/s10586-017-1062-6
10.1155/2012/767364
10.1140/epjst/e2014-02185-y
10.1007/s11071-017-3656-1
10.1016/j.optlaseng.2018.12.002
10.1016/j.cnsns.2013.08.032
10.1109/MMUL.2018.2873472
10.1007/s11042-018-7081-3
10.1007/s00521-017-2993-9
10.1016/j.physa.2006.11.002
10.1016/j.cnsns.2009.02.033
10.1016/j.eswa.2017.12.003
10.1016/j.sigpro.2017.11.005
10.1016/j.sigpro.2019.03.022
10.1016/j.camwa.2010.03.017
10.1016/j.sigpro.2019.02.016
10.1016/j.sigpro.2016.12.008
10.1109/TCE.2004.1309431
10.1186/1687-6180-2013-126
10.1007/s11042-017-4953-x
10.1140/epjp/i2017-11819-7
10.1103/PhysRevLett.90.047903
10.1016/j.sigpro.2017.07.034
10.1016/j.chaos.2017.09.025
10.1016/j.ins.2012.06.001
10.1007/s11042-018-7110-2
10.1016/j.cnsns.2012.06.019
10.1016/j.optlastec.2018.09.048
10.1109/ACCESS.2018.2871557
10.1371/journal.pone.0153870
10.1007/s11071-019-04809-w
ContentType Journal Article
Copyright 2019 Elsevier Ltd
Copyright_xml – notice: 2019 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.jisa.2019.102421
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_jisa_2019_102421
S2214212619306544
GroupedDBID --M
.~1
1~.
4.4
457
4G.
5VS
7-5
8P~
AACTN
AAEDT
AAEDW
AAFJI
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKYCK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
AOUOD
AVARZ
AXJTR
BKOJK
BLXMC
EBS
EFJIC
EFLBG
EJD
FDB
FIRID
FNPLU
FYGXN
GBLVA
GBOLZ
KOM
M41
MO0
OAUVE
P-8
P-9
PC.
PRBVW
RIG
ROL
SPC
SPCBC
SSB
SSO
SSV
SSZ
T5K
~G-
AATTM
AAXKI
AAYWO
AAYXX
ACLOT
ACVFH
ADCNI
AEIPS
AEUPX
AFJKZ
AFPUW
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
ID FETCH-LOGICAL-c366t-409ddb04448893535d9adaeb90a1bf92404b5683555ff1b64e1affaf6e59eaf3
ISICitedReferencesCount 73
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000505033600010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2214-2126
IngestDate Tue Nov 18 22:32:05 EST 2025
Wed Nov 05 21:01:19 EST 2025
Fri Feb 23 02:48:28 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Cryptanalysis
Image encryption
Cryptography
Security
Chaos theory
Authentication
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c366t-409ddb04448893535d9adaeb90a1bf92404b5683555ff1b64e1affaf6e59eaf3
ORCID 0000-0001-8146-5843
0000-0001-5571-4148
ParticipantIDs crossref_primary_10_1016_j_jisa_2019_102421
crossref_citationtrail_10_1016_j_jisa_2019_102421
elsevier_sciencedirect_doi_10_1016_j_jisa_2019_102421
PublicationCentury 2000
PublicationDate February 2020
2020-02-00
PublicationDateYYYYMMDD 2020-02-01
PublicationDate_xml – month: 02
  year: 2020
  text: February 2020
PublicationDecade 2020
PublicationTitle Journal of information security and applications
PublicationYear 2020
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Chai, Gan, Yuan, Chen, Liu (bib0023) 2017; 31
Alvarez, Amigó, Arroyo, Li (bib0122) 2011
Solak, Rhouma, Belghith (bib0047) 2010; 283
Aoki, Ichikawa, Kanda, Matsui, Moriai, Nakajima, Tokita (bib0121) 2001
zkaynak, zer, Yavuz (bib0048) 2012; 285
Li, Lu, Xiang, Zhang, Ren (bib0053) 2019; 96
Lu, Li, Zhang, Yang (bib0111) 2016; 11
Khedr WI. A new efficient and configurable image encryption structure for secure transmission. Multimed Tools Appl. doi
Bertoni, Daemen, Peeters, Assche (bib0100) 2008
Wang, Xiao, Chen, Huang (bib0051) 2018; 144
François, Grosges, Barchiesi, Erra (bib0084) 2014; 19
Vidal, Baptista, Mancini (bib0070) 2014; 223
Lee, Phan, Yap, Goi (bib0059) 2018; 92
Akhavan, Samsudin, Akhshani (bib0095) 2013
Liu, Tang, Liu, Zhang, Ma (bib0020) 2018; 97
Alvarez, Li (bib0034) 2009; 14
Alawida, Teh, Samsudin, Alshoura (bib0045) 2019; 164
Yu W, Liu Y, Gong L, Tian M, Tu L. Double-image encryption based on spatiotemporal chaos and DNA operations. Multimed Tools Appl. doi
Wang, Zhao, Wang (bib0010) 2019; 115
Teh, Samsudin (bib0060) 2017; 2017
Essaid, Akharraz, Saaidi, Mouhib (bib0005) 2019; 47
Hosseinzadeh, Zarebnia, Parvaz (bib0009) 2019; 120
Verma, Nizam, Ahmad (bib0043) 2013; 9
García-Martínez, Campos-Cantón (bib0083) 2014; 25
Kanso, Yahyaoui, Almulla (bib0090) 2012; 186
Kyrtsou, Labys (bib0001) 2007; 377
Chain, Kuo (bib0106) 2013; 74
.
Ahmad, Solami, Wang, Doja, Beg, Alzaidi (bib0057) 2018; 10
Ahmad, Doja, Beg (bib0082) 2018
Ahmad, Alam, Ansari, Lambić, AlSharari (bib0058) 2018; 34
Ahmad M, Khurana S, Singh S, AlSharari HD. A simple secure hash function scheme using multiple chaotic maps. 3D Research 8(2). doi
Ahmad, Ahmad (bib0050) 2014; 12
Li, Peng, Li, Zhu (bib0021) 2018; 94
Chai, Fu, Gan, Lu, Chen (bib0063) 2019; 155
Liu, Xia, Wang (bib0079) 2017; 24
Li, Lin, Lu, Hao (bib0052) 2018; 25
Masuda, Jakimoski, Aihara, Kocarev (bib0037) 2006; 53
Gong, Li, Shi (bib0110) 2012; 70
Ye, Wong (bib0026) 2012; 71
Bahrami, Naderi (bib0027) 2012; 2012
Li, Lu, Wen, Ren, Zhang (bib0055) 2018; 6
Long, Tan (bib0029) 2010
Ahmad M, Doja M, Beg MS. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. J King Saud Univ-ComputInf Sci.
Li, Xiao, Deng (bib0093) 2012; 214
Alzaidi, Ahmad, Doja, Solami, Beg (bib0108) 2018; 6
Satish, Jayakar, Tobin, Madhavi, Murali (bib0032) 2004; 50
Sharafi, Fotouhi-Ghazvini, Shirali, Ghassemian (bib0116) 2019; 7
Alawida M, Samsudin A, Teh JS. Enhancing unimodal digital chaotic maps through hybridisation. Nonlinear Dyn doi
Wu, Liao, Yang (bib0065) 2018; 153
Soleymani S.H., Taherinia A.H., Mohajerzadeh A.H.. WACA: A new blind robust watermarking method based on arnold cat map and amplified pseudo-noise strings with weak correlation. Multimed Tools Appl doi
Howell (bib0033) 1990; 3
Hua, Jin, Xu, Huang (bib0038) 2018; 149
Clark, Weng (bib0088) 1994; 43
Xu, Sun, Cao, Zhu (bib0115) 2019; 121
Norouzi, Mirzakuchaki (bib0025) 2014; 78
Bahi, Guyeux (bib0089) 2010; 4
Sheludko (bib0069) 2018; 51
Zhang (bib0075) 2008; 37
Zhang Y. Test and verification of AES used for image encryption. 3D Research 9(1). doi
Solís-Sánchez, Barrantes (bib0078) 2018; 9
Lambić, Nikolić (bib0086) 2017; 90
Kandar, Chaudhuri, Bhattacharjee, Dhara (bib0041) 2019; 44
Zhang, Wang, Zhou (bib0101) 2016
Meshram, Li, Meshram (bib0107) 2018; 23
Li, Li, Liu (bib0097) 2016; 28
Luo, Yu, Lai, Liu (bib0046) 2019; 78
Ahmad M, Singh S, Khurana S. Cryptographic one-way hash function generation using twelve-terms 4d nonlinear system. Int J Inf Technol doi
Shannon (bib0036) 1945
zrk, Kılıç (bib0085) 2015; 80
Xiong Z, Wu Y, Ye C, Zhang X, Xu F. Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl doi
Luo, Lin, Liu, Wei, Cao, Zhou (bib0008) 2019; 161
Bertoni, Daemen, Peeters, Assche (bib0099) 2013
Tenny, Tsimring (bib0077) 2005; 52
Xie, Hu, Wu (bib0112) 2014; 79
Ahmad, Ahmad (bib0109) 2018; 5
Çavuşoğlu, Akgl, Zengin, Pehlivan (bib0080) 2017; 104
Hu, Liu, Gong, Guo, Yuan (bib0064) 2017; 134
Lin Z, Guyeux C, Yu S, Wang Q, Cai S. On the use of chaotic iterations to design keyed hash function. Cluster Comput doi
Li, Fan, Xiang, Li, Zhang (bib0054) 2018; 25
Submission (bib0118) 2018
Artiles, Chaves, Pimentel (bib0040) 2019; 79
Tenny R, Tsimring LS, Larson L, Abarbanel HDI. Using distributed nonlinear dynamics for public key encryption. Phys Rev Lett 90(4). doi
Nesa, Ghosh, Banerjee (bib0004) 2019; 47
Huang, Cai, Xiong, Xiao (bib0042) 2019; 115
Hu, Liu, Gong, Ouyang (bib0024) 2016; 87
Wang, Zhao, Feng, Ye, Zhang (bib0044) 2019; 122
Patro, Acharya (bib0039) 2018; 40
Valli, Ganesan (bib0104) 2017; 132
Chai, Fu, Gan, Lu, Chen (bib0003) 2019; 155
Chenaghlu, Jamali, Khasmakhi (bib0094) 2016; 87
Zhu, Sun (bib0049) 2018; 6
Journal. Citation reports. 2019.
Fog (bib0123) 2018
Broumandnia (bib0006) 2019; 47
Pizolato, Romero, Neto (bib0002) 2008; 55
Mirzaei, Yaghoobi, Irani (bib0028) 2011; 67
Elkholy, Hennawy, Elkouny, Zahran (bib0103) 2016
Alawida, Samsudin, Teh, Alkhawaldeh (bib0011) 2019; 160
Li, Chen, Álvarez (bib0068) 2006; 16
Halagali, Desai (bib0066) 2018
Liu, Wang (bib0030) 2010; 59
Hamza (bib0022) 2017; 35
Wang, Pei, Zou, Cheung, He (bib0074) 2006; 360
Kanso, Ghebleh (bib0091) 2013; 18
Ahmed H, Kalash H, Allah O. An efficient chaos-based feedback stream cipher (ecbfsc) for image encryption and decryption. Informatica.
Jallouli, Assad, Chetto, Lozi (bib0071) 2017; 77
Daemen, Rijmen (bib0120) 2002
MySEAL (bib0119) 2018
Wang, Tan (bib0081) 2018
Wu, Wang, Wang, Kan, Kurths (bib0061) 2018; 148
Altaf, Ahmad, Khan, Uddin, Yang (bib0067) 2018; 77
Hua, Zhou, Huang (bib0012) 2019; 480
Ding, Liu, Zhang, Ding (bib0007) 2019; 11
CAESAR (bib0117) 2014
Zhu (bib0113) 2015; 85
Flores-Vergara A, García-Guerrero EE, Inzunza-González E, López-Bonilla OR, Rodríguez-Orozco E, Cárdenas-Valdez JR, Tlelo-Cuautle E. Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic. Nonlinear Dyn doi
Islam (bib0114) 2015; 312
Li, Wang, Zuo (bib0013) 2019; 115
Sivakumar, Li (bib0014) 2019; 111
Su, Lian, Zhang, Jiang (bib0105) 2011
Chen, Zhu, Zhang, Zhang, Yang (bib0062) 2018; 142
Çavuşoğlu U, Kaçar S. A novel parallel image encryption algorithm based on chaos. Cluster Comput. doi
Bose R. Novel public key encryption technique based on multiple chaotic systems. Phys Rev Lett 95(9). doi
zrk (10.1016/j.jisa.2019.102421_bib0085) 2015; 80
Huang (10.1016/j.jisa.2019.102421_bib0042) 2019; 115
Hua (10.1016/j.jisa.2019.102421_bib0012) 2019; 480
Daemen (10.1016/j.jisa.2019.102421_bib0120) 2002
Submission (10.1016/j.jisa.2019.102421_bib0118) 2018
Valli (10.1016/j.jisa.2019.102421_bib0104) 2017; 132
Hu (10.1016/j.jisa.2019.102421_bib0024) 2016; 87
Ding (10.1016/j.jisa.2019.102421_bib0007) 2019; 11
Alawida (10.1016/j.jisa.2019.102421_bib0011) 2019; 160
Sharafi (10.1016/j.jisa.2019.102421_bib0116) 2019; 7
Xu (10.1016/j.jisa.2019.102421_bib0115) 2019; 121
Xie (10.1016/j.jisa.2019.102421_bib0112) 2014; 79
Bahrami (10.1016/j.jisa.2019.102421_bib0027) 2012; 2012
Ahmad (10.1016/j.jisa.2019.102421_bib0050) 2014; 12
Li (10.1016/j.jisa.2019.102421_bib0013) 2019; 115
Teh (10.1016/j.jisa.2019.102421_bib0060) 2017; 2017
10.1016/j.jisa.2019.102421_bib0017
10.1016/j.jisa.2019.102421_bib0016
Wang (10.1016/j.jisa.2019.102421_bib0081) 2018
10.1016/j.jisa.2019.102421_bib0019
10.1016/j.jisa.2019.102421_bib0018
Clark (10.1016/j.jisa.2019.102421_bib0088) 1994; 43
10.1016/j.jisa.2019.102421_bib0015
Chain (10.1016/j.jisa.2019.102421_bib0106) 2013; 74
CAESAR (10.1016/j.jisa.2019.102421_sbref0101) 2014
10.1016/j.jisa.2019.102421_bib0096
10.1016/j.jisa.2019.102421_bib0098
Sheludko (10.1016/j.jisa.2019.102421_bib0069) 2018; 51
Zhang (10.1016/j.jisa.2019.102421_bib0101) 2016
Sivakumar (10.1016/j.jisa.2019.102421_bib0014) 2019; 111
Bertoni (10.1016/j.jisa.2019.102421_sbref0084) 2013
Hamza (10.1016/j.jisa.2019.102421_bib0022) 2017; 35
Lu (10.1016/j.jisa.2019.102421_bib0111) 2016; 11
Essaid (10.1016/j.jisa.2019.102421_bib0005) 2019; 47
Alawida (10.1016/j.jisa.2019.102421_bib0045) 2019; 164
Jallouli (10.1016/j.jisa.2019.102421_bib0071) 2017; 77
Liu (10.1016/j.jisa.2019.102421_bib0020) 2018; 97
Elkholy (10.1016/j.jisa.2019.102421_bib0103) 2016
Tenny (10.1016/j.jisa.2019.102421_bib0077) 2005; 52
Bahi (10.1016/j.jisa.2019.102421_bib0089) 2010; 4
MySEAL (10.1016/j.jisa.2019.102421_sbref0103) 2018
Liu (10.1016/j.jisa.2019.102421_bib0030) 2010; 59
Wang (10.1016/j.jisa.2019.102421_bib0051) 2018; 144
Chenaghlu (10.1016/j.jisa.2019.102421_bib0094) 2016; 87
Wu (10.1016/j.jisa.2019.102421_bib0061) 2018; 148
Kanso (10.1016/j.jisa.2019.102421_bib0091) 2013; 18
Kanso (10.1016/j.jisa.2019.102421_bib0090) 2012; 186
Kyrtsou (10.1016/j.jisa.2019.102421_bib0001) 2007; 377
Nesa (10.1016/j.jisa.2019.102421_bib0004) 2019; 47
10.1016/j.jisa.2019.102421_bib0035
10.1016/j.jisa.2019.102421_bib0031
Zhang (10.1016/j.jisa.2019.102421_bib0075) 2008; 37
Wang (10.1016/j.jisa.2019.102421_bib0010) 2019; 115
Vidal (10.1016/j.jisa.2019.102421_bib0070) 2014; 223
Chai (10.1016/j.jisa.2019.102421_bib0023) 2017; 31
Zhu (10.1016/j.jisa.2019.102421_bib0049) 2018; 6
Li (10.1016/j.jisa.2019.102421_bib0055) 2018; 6
Patro (10.1016/j.jisa.2019.102421_bib0039) 2018; 40
Li (10.1016/j.jisa.2019.102421_bib0021) 2018; 94
zkaynak (10.1016/j.jisa.2019.102421_bib0048) 2012; 285
François (10.1016/j.jisa.2019.102421_bib0084) 2014; 19
Pizolato (10.1016/j.jisa.2019.102421_bib0002) 2008; 55
Li (10.1016/j.jisa.2019.102421_bib0052) 2018; 25
Ahmad (10.1016/j.jisa.2019.102421_bib0082) 2018
10.1016/j.jisa.2019.102421_bib0102
Gong (10.1016/j.jisa.2019.102421_bib0110) 2012; 70
Howell (10.1016/j.jisa.2019.102421_bib0033) 1990; 3
Hua (10.1016/j.jisa.2019.102421_bib0038) 2018; 149
Mirzaei (10.1016/j.jisa.2019.102421_bib0028) 2011; 67
Meshram (10.1016/j.jisa.2019.102421_bib0107) 2018; 23
Li (10.1016/j.jisa.2019.102421_bib0068) 2006; 16
10.1016/j.jisa.2019.102421_bib0073
10.1016/j.jisa.2019.102421_bib0072
Luo (10.1016/j.jisa.2019.102421_bib0008) 2019; 161
Artiles (10.1016/j.jisa.2019.102421_bib0040) 2019; 79
Lambić (10.1016/j.jisa.2019.102421_bib0086) 2017; 90
Islam (10.1016/j.jisa.2019.102421_bib0114) 2015; 312
Halagali (10.1016/j.jisa.2019.102421_bib0066) 2018
Li (10.1016/j.jisa.2019.102421_bib0093) 2012; 214
10.1016/j.jisa.2019.102421_bib0056
Li (10.1016/j.jisa.2019.102421_bib0097) 2016; 28
Zhu (10.1016/j.jisa.2019.102421_bib0113) 2015; 85
Shannon (10.1016/j.jisa.2019.102421_bib0036) 1945
Çavuşoğlu (10.1016/j.jisa.2019.102421_bib0080) 2017; 104
Alvarez (10.1016/j.jisa.2019.102421_bib0122) 2011
Broumandnia (10.1016/j.jisa.2019.102421_bib0006) 2019; 47
Long (10.1016/j.jisa.2019.102421_bib0029) 2010
Su (10.1016/j.jisa.2019.102421_bib0105) 2011
Fog (10.1016/j.jisa.2019.102421_bib0123) 2018
Li (10.1016/j.jisa.2019.102421_bib0054) 2018; 25
Altaf (10.1016/j.jisa.2019.102421_bib0067) 2018; 77
Hu (10.1016/j.jisa.2019.102421_bib0064) 2017; 134
Lee (10.1016/j.jisa.2019.102421_bib0059) 2018; 92
Wang (10.1016/j.jisa.2019.102421_bib0074) 2006; 360
Ahmad (10.1016/j.jisa.2019.102421_bib0109) 2018; 5
Luo (10.1016/j.jisa.2019.102421_bib0046) 2019; 78
Bertoni (10.1016/j.jisa.2019.102421_bib0100) 2008
Norouzi (10.1016/j.jisa.2019.102421_bib0025) 2014; 78
Satish (10.1016/j.jisa.2019.102421_bib0032) 2004; 50
10.1016/j.jisa.2019.102421_bib0087
10.1016/j.jisa.2019.102421_bib0092
Kandar (10.1016/j.jisa.2019.102421_bib0041) 2019; 44
Ahmad (10.1016/j.jisa.2019.102421_bib0058) 2018; 34
Li (10.1016/j.jisa.2019.102421_bib0053) 2019; 96
Ye (10.1016/j.jisa.2019.102421_bib0026) 2012; 71
Solís-Sánchez (10.1016/j.jisa.2019.102421_bib0078) 2018; 9
García-Martínez (10.1016/j.jisa.2019.102421_bib0083) 2014; 25
Wang (10.1016/j.jisa.2019.102421_bib0044) 2019; 122
Alzaidi (10.1016/j.jisa.2019.102421_bib0108) 2018; 6
Verma (10.1016/j.jisa.2019.102421_bib0043) 2013; 9
Masuda (10.1016/j.jisa.2019.102421_bib0037) 2006; 53
Chai (10.1016/j.jisa.2019.102421_bib0063) 2019; 155
10.1016/j.jisa.2019.102421_bib0076
Chai (10.1016/j.jisa.2019.102421_bib0003) 2019; 155
Chen (10.1016/j.jisa.2019.102421_bib0062) 2018; 142
Wu (10.1016/j.jisa.2019.102421_bib0065) 2018; 153
Solak (10.1016/j.jisa.2019.102421_bib0047) 2010; 283
Hosseinzadeh (10.1016/j.jisa.2019.102421_bib0009) 2019; 120
Liu (10.1016/j.jisa.2019.102421_bib0079) 2017; 24
Akhavan (10.1016/j.jisa.2019.102421_bib0095) 2013
Alvarez (10.1016/j.jisa.2019.102421_bib0034) 2009; 14
Ahmad (10.1016/j.jisa.2019.102421_bib0057) 2018; 10
Aoki (10.1016/j.jisa.2019.102421_sbref0105) 2001
References_xml – volume: 47
  start-page: 320
  year: 2019
  end-page: 328
  ident: bib0004
  article-title: Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map
  publication-title: J Inf Secur Appl
– year: 1945
  ident: bib0036
  article-title: A mathematical theory of cryptography
  publication-title: Tech rep, Bell Telephone Labs
– volume: 80
  start-page: 1147
  year: 2015
  end-page: 1157
  ident: bib0085
  article-title: A novel method for producing pseudo random numbers from differential equation-based chaotic systems
  publication-title: Nonlinear Dyn
– volume: 121
  start-page: 203
  year: 2019
  end-page: 214
  ident: bib0115
  article-title: A fast image encryption algorithm based on compressive sensing and hyperchaotic map
  publication-title: Opt Lasers Eng
– volume: 74
  start-page: 1003
  year: 2013
  end-page: 1012
  ident: bib0106
  article-title: A new digital signature scheme based on chaotic maps
  publication-title: Nonlinear Dyn
– volume: 90
  start-page: 223
  year: 2017
  end-page: 232
  ident: bib0086
  article-title: Pseudo-random number generator based on discrete-space chaotic map
  publication-title: Nonlinear Dyn
– volume: 85
  start-page: 2141
  year: 2015
  end-page: 2156
  ident: bib0113
  article-title: Cryptanalysis and improvement of a mobile dynamic ID authenticated key agreement scheme based on chaotic maps
  publication-title: Wirel Pers Commun
– year: 2014
  ident: bib0117
  article-title: Competition for authenticated encryption: Security
  publication-title: Applicab Robustness
– volume: 78
  start-page: 22023
  year: 2019
  end-page: 22043
  ident: bib0046
  article-title: A novel chaotic image encryption algorithm based on improved baker map and logistic map
  publication-title: Multimed Tools Appl
– volume: 122
  start-page: 225
  year: 2019
  end-page: 238
  ident: bib0044
  article-title: High-sensitivity image encryption algorithm with random diffusion based on dynamic-coupled map lattices
  publication-title: Opt Lasers Eng
– volume: 11
  start-page: 853
  year: 2019
  ident: bib0007
  article-title: A new lightweight stream cipher based on chaos
  publication-title: Symmetry (Basel)
– volume: 9
  start-page: 271
  year: 2013
  end-page: 286
  ident: bib0043
  article-title: Modified multi-chaotic systems that are based on pixel shuffle for image encryption
  publication-title: J Inf Process Syst
– volume: 160
  start-page: 45
  year: 2019
  end-page: 58
  ident: bib0011
  article-title: A new hybrid digital chaotic system with applications in image encryption
  publication-title: Signal Process
– year: 2018
  ident: bib0066
  article-title: Implementation of chaos based cryptography in kasumi block cipher
  publication-title: 2018 International Conference on Communication and Signal Processing (ICCSP)
– year: 2013
  ident: bib0099
  article-title: Keccak, in: Advances in Cryptology EUROCRYPT 2013
– reference: Zhang Y. Test and verification of AES used for image encryption. 3D Research 9(1). doi:
– volume: 71
  start-page: 259
  year: 2012
  end-page: 267
  ident: bib0026
  article-title: An image encryption scheme based on time-delay and hyperchaotic system
  publication-title: J Nonlinear Dyn
– volume: 5
  start-page: 131
  year: 2018
  end-page: 147
  ident: bib0109
  article-title: Random search based efficient chaotic substitution box design for image encryption
  publication-title: Int J Rough Sets Data Anal (IJRSDA)
– volume: 87
  start-page: 216
  year: 2016
  end-page: 225
  ident: bib0094
  article-title: A novel keyed parallel hashing scheme based on a new chaotic system
  publication-title: Chaos Solitons Fractals
– volume: 18
  start-page: 109
  year: 2013
  end-page: 123
  ident: bib0091
  article-title: A fast and efficient chaos-based keyed hash function
  publication-title: Commun Nonlinear Sci Numer Simul
– reference: Alawida M, Samsudin A, Teh JS. Enhancing unimodal digital chaotic maps through hybridisation. Nonlinear Dyn doi:
– volume: 79
  start-page: 2345
  year: 2014
  end-page: 2358
  ident: bib0112
  article-title: Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server’s public key and smart card
  publication-title: Nonlinear Dyn
– reference: Khedr WI. A new efficient and configurable image encryption structure for secure transmission. Multimed Tools Appl. doi:
– volume: 6
  start-page: 47102
  year: 2018
  end-page: 47111
  ident: bib0055
  article-title: Cryptanalyzing a color image encryption scheme based on hybrid hyper-chaotic system and cellular automata
  publication-title: IEEE Access
– volume: 104
  start-page: 655
  year: 2017
  end-page: 667
  ident: bib0080
  article-title: The design and implementation of hybrid RSA algorithm using a novel chaos based RNG, chaos
  publication-title: Solitons Fractals
– volume: 6
  start-page: 55405
  year: 2018
  end-page: 55418
  ident: bib0108
  article-title: A new 1d chaotic map and
  publication-title: IEEE Access
– volume: 161
  start-page: 227
  year: 2019
  end-page: 247
  ident: bib0008
  article-title: A robust image encryption algorithm based on chua’s circuit and compressive sensing
  publication-title: Signal Process
– volume: 44
  start-page: 117
  year: 2019
  end-page: 129
  ident: bib0041
  article-title: Image encryption using sequence generated by cyclic group
  publication-title: J Inf Secur Appl
– year: 2018
  ident: bib0081
  article-title: Modified RSA encryption algorithm based on chaos and its application in voice encryption system
  publication-title: 2018 14th International Conference on Computational Intelligence and Security (CIS)
– start-page: 181
  year: 2008
  end-page: 197
  ident: bib0100
  article-title: On the indifferentiability of the sponge construction
  publication-title: Advances in Cryptology EUROCRYPT 2008
– volume: 92
  start-page: 575
  year: 2018
  end-page: 593
  ident: bib0059
  article-title: SPRING: A novel parallel chaos-based image encryption scheme
  publication-title: Nonlinear Dyn
– volume: 312
  start-page: 104
  year: 2015
  end-page: 130
  ident: bib0114
  article-title: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
  publication-title: Inf Sci
– volume: 11
  start-page: e0153870
  year: 2016
  ident: bib0111
  article-title: An extended chaotic maps-based three-party password-authenticated key agreement with user anonymity
  publication-title: PLOS ONE
– volume: 3
  start-page: 81
  year: 1990
  end-page: 83
  ident: bib0033
  article-title: An introduction to chaotic dynamical systems. 2nd edition, by robert l. devaney
  publication-title: J Appl Math StochastAnal
– volume: 10
  start-page: 266
  year: 2018
  ident: bib0057
  article-title: Cryptanalysis of an image encryption algorithm based on combined chaos for a ban system, and improved scheme using sha-512 and hyperchaos
  publication-title: Symmetry
– reference: Xiong Z, Wu Y, Ye C, Zhang X, Xu F. Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl doi:
– start-page: 257
  year: 2011
  end-page: 295
  ident: bib0122
  article-title: Lessons learnt from the cryptanalysis of chaos-based ciphers
  publication-title: Studies in Computational Intelligence
– volume: 16
  start-page: 1557
  year: 2006
  end-page: 1568
  ident: bib0068
  article-title: Return-map cryptanalysis revisisted
  publication-title: Int J Bifurcation Chaos
– volume: 28
  start-page: 1405
  year: 2016
  end-page: 1415
  ident: bib0097
  article-title: A fast and efficient hash function based on generalized chaotic mapping with variable parameters
  publication-title: Neural Comput Appl
– volume: 155
  start-page: 44
  year: 2019
  end-page: 62
  ident: bib0003
  article-title: A color image cryptosystem based on dynamic DNA encryption and chaos
  publication-title: Signal Process
– year: 2013
  ident: bib0095
  article-title: A novel parallel hash function based on 3d chaotic map
  publication-title: EURASIP J Adv Signal Process
– volume: 70
  start-page: 2401
  year: 2012
  end-page: 2406
  ident: bib0110
  article-title: A secure chaotic maps-based key agreement protocol without using smart cards
  publication-title: Nonlinear Dyn
– reference: Lin Z, Guyeux C, Yu S, Wang Q, Cai S. On the use of chaotic iterations to design keyed hash function. Cluster Comput doi:
– volume: 94
  start-page: 1319
  year: 2018
  end-page: 1333
  ident: bib0021
  article-title: A novel plaintext-related image encryption scheme using hyper-chaotic system
  publication-title: Nonlinear Dyn
– volume: 9
  start-page: 160
  year: 2018
  ident: bib0078
  article-title: Using the logistic coupled map for public key cryptography under a distributed dynamics encryption scheme
  publication-title: Information
– volume: 285
  start-page: 4946
  year: 2012
  end-page: 4948
  ident: bib0048
  article-title: Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences
  publication-title: Opt Commun
– volume: 25
  start-page: 1350105
  year: 2014
  ident: bib0083
  article-title: Pseudo-random bit generator based on lag time series
  publication-title: International Journal of Modern Physics C
– volume: 53
  start-page: 1341
  year: 2006
  end-page: 1352
  ident: bib0037
  article-title: Chaotic block ciphers: from theory to practical algorithms
  publication-title: IEEE Trans Circuits Syst I Regul Pap
– volume: 115
  start-page: 42
  year: 2019
  end-page: 57
  ident: bib0010
  article-title: A new image encryption algorithm with nonlinear-diffusion based on multiple coupled map lattices
  publication-title: Opt Laser Technol
– volume: 59
  start-page: 3320
  year: 2010
  end-page: 3327
  ident: bib0030
  article-title: Color image encryption based on one-time keys and robust chaotic maps
  publication-title: Comput Math Appl
– year: 2016
  ident: bib0101
  article-title: Image watermarking scheme based on arnold transform and DWT-DCT-SVD
  publication-title: 2016 IEEE 13th International Conference on Signal Processing (ICSP)
– year: 2010
  ident: bib0029
  article-title: A chaos-based data encryption algorithm for image/video
  publication-title: 2010 Second International Conference on Multimedia and Information Technology
– volume: 35
  start-page: 119
  year: 2017
  end-page: 127
  ident: bib0022
  article-title: A novel pseudo random sequence generator for image-cryptographic applications
  publication-title: J Inf Secur Appl
– reference: Ahmed H, Kalash H, Allah O. An efficient chaos-based feedback stream cipher (ecbfsc) for image encryption and decryption. Informatica.
– volume: 2017
  start-page: 1
  year: 2017
  end-page: 15
  ident: bib0060
  article-title: A chaos-based authenticated cipher with associated data
  publication-title: Secur Commun Netw
– year: 2001
  ident: bib0121
  article-title: Camellia: A 128-bit block cipher suitable for multiple platforms design andAnalysis
  publication-title: Selected Areas in Cryptography
– reference: Ahmad M, Singh S, Khurana S. Cryptographic one-way hash function generation using twelve-terms 4d nonlinear system. Int J Inf Technol doi:
– reference: Ahmad M, Khurana S, Singh S, AlSharari HD. A simple secure hash function scheme using multiple chaotic maps. 3D Research 8(2). doi:
– volume: 96
  start-page: 31
  year: 2019
  end-page: 47
  ident: bib0053
  article-title: Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion
  publication-title: Nonlinear Dyn
– volume: 79
  start-page: 24
  year: 2019
  end-page: 31
  ident: bib0040
  article-title: Image encryption using block cipher and chaotic sequences
  publication-title: Signal Process Image Commun
– volume: 25
  start-page: 46
  year: 2018
  end-page: 56
  ident: bib0052
  publication-title: IEEE MultiMedia
– volume: 6
  start-page: 18759
  year: 2018
  end-page: 18770
  ident: bib0049
  article-title: Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps
  publication-title: IEEE Access
– year: 2016
  ident: bib0103
  article-title: Using hyper chaos in secure video transmission
  publication-title: 2016 28th International Conference on Microelectronics (ICM)
– volume: 51
  start-page: 337
  year: 2018
  end-page: 342
  ident: bib0069
  article-title: Parameter estimation for one-dimensional chaotic systems by guaranteed algorithm and particle swarm optimization
  publication-title: IFAC-PapersOnLine
– volume: 12
  start-page: 113
  year: 2014
  end-page: 128
  ident: bib0050
  article-title: Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys
  publication-title: Int J Commun NetwDistrib Syst
– volume: 7
  start-page: 8737
  year: 2019
  end-page: 8753
  ident: bib0116
  article-title: A low power cryptography solution based on chaos theory in wireless sensor nodes
  publication-title: IEEE Access
– volume: 78
  start-page: 995
  year: 2014
  end-page: 1015
  ident: bib0025
  article-title: A fast color image encryption algorithm based on hyper-chaotic systems
  publication-title: Nonlinear Dyn
– volume: 4
  start-page: 167
  year: 2010
  end-page: 181
  ident: bib0089
  article-title: Hash functions using chaotic iterations
  publication-title: J Alg Comput Technol
– start-page: 205
  year: 2011
  end-page: 226
  ident: bib0105
  article-title: Chaos-based video encryption algorithms
  publication-title: Studies in Computational Intelligence
– volume: 34
  start-page: 1323
  year: 2018
  end-page: 1332
  ident: bib0058
  article-title: Cryptanalysis of an image encryption algorithm based on pwlcm and inertial delayed neural network
  publication-title: J Intell Fuzzy Syst
– volume: 360
  start-page: 259
  year: 2006
  end-page: 262
  ident: bib0074
  article-title: Security of public key encryption technique based on multiple chaotic systems
  publication-title: Phys Lett A
– volume: 155
  start-page: 44
  year: 2019
  end-page: 62
  ident: bib0063
  article-title: A color image cryptosystem based on dynamic dna encryption and chaos
  publication-title: Signal Process
– volume: 148
  start-page: 272
  year: 2018
  end-page: 287
  ident: bib0061
  article-title: Color image dna encryption using nca map-based cml and one-time keys
  publication-title: Signal Process
– volume: 24
  start-page: 4797
  year: 2017
  end-page: 4824
  ident: bib0079
  article-title: Fractional two-dimensional discrete chaotic map and its applications to the information security with elliptic-curve public key cryptography
  publication-title: J Vib Control
– volume: 55
  start-page: 1108
  year: 2008
  end-page: 1115
  ident: bib0002
  article-title: Chaotic communication based on the particle-in-a-box electronic circuit
  publication-title: IEEE Trans Circuits Syst I: Regular Papers
– volume: 132
  year: 2017
  ident: bib0104
  article-title: Chaos based video encryption using maps and ikeda time delay system
  publication-title: Eur Phys J Plus
– volume: 134
  start-page: 234
  year: 2017
  end-page: 243
  ident: bib0064
  article-title: Chaotic image cryptosystem using dna deletion and dna insertion
  publication-title: Signal Process
– volume: 2012
  start-page: 1
  year: 2012
  end-page: 8
  ident: bib0027
  article-title: Image encryption using a lightweight stream encryption algorithm
  publication-title: Adv Multimed
– volume: 223
  start-page: 1601
  year: 2014
  end-page: 1610
  ident: bib0070
  article-title: A fast and light stream cipher for smartphones
  publication-title: Eur Phys J Special Top
– reference: Yu W, Liu Y, Gong L, Tian M, Tu L. Double-image encryption based on spatiotemporal chaos and DNA operations. Multimed Tools Appl. doi:
– volume: 214
  start-page: 56
  year: 2012
  end-page: 75
  ident: bib0093
  article-title: Keyed hash function based on a dynamic lookup table of functions
  publication-title: Inf Sci
– year: 2018
  ident: bib0118
  article-title: Requirements and evaluation criteria for the lightweight cryptography standardization process
  publication-title: Tech Rep, National Institute of Standards and Technology (NIST)
– year: 2018
  ident: bib0123
  article-title: List of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs
  publication-title: Tech rep, Technical University of Denmark
– volume: 14
  start-page: 3743
  year: 2009
  end-page: 3749
  ident: bib0034
  article-title: Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption
  publication-title: Commun Nonlinear Sci Numer Simul
– volume: 31
  start-page: 219
  year: 2017
  end-page: 237
  ident: bib0023
  article-title: A novel image encryption scheme based on DNA sequence operations and chaotic systems
  publication-title: Neural Comput Appl
– volume: 77
  start-page: 27981
  year: 2018
  end-page: 27995
  ident: bib0067
  article-title: Computationally efficient selective video encryption with chaos based block cipher
  publication-title: Multimed Tools Appl
– year: 2002
  ident: bib0120
  article-title: The design of rijndael
– reference: Journal. Citation reports. 2019.
– volume: 115
  start-page: 7
  year: 2019
  end-page: 20
  ident: bib0042
  article-title: On symmetric color image encryption system with permutation-diffusion simultaneous operation
  publication-title: Opt Lasers Eng
– volume: 164
  start-page: 249
  year: 2019
  end-page: 266
  ident: bib0045
  article-title: An image encryption scheme based on hybridizing digital chaos and finite state machine
  publication-title: Signal Process
– reference: Ahmad M, Doja M, Beg MS. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. J King Saud Univ-ComputInf Sci.
– volume: 77
  start-page: 13391
  year: 2017
  end-page: 13417
  ident: bib0071
  article-title: Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques
  publication-title: Multimed Tools Appl
– volume: 47
  start-page: 173
  year: 2019
  end-page: 187
  ident: bib0005
  article-title: Image encryption scheme based on a new secure variant of hill cipher and 1d chaotic maps
  publication-title: J Inf Secur Appl
– volume: 43
  start-page: 560
  year: 1994
  end-page: 568
  ident: bib0088
  article-title: Maximal and near-maximal shift register sequences: efficient event counters and easy discrete logarithms
  publication-title: IEEE Trans Comput
– volume: 97
  start-page: 95
  year: 2018
  end-page: 105
  ident: bib0020
  article-title: Secure and robust digital image watermarking scheme using logistic and RSA encryption
  publication-title: Expert Syst Appl
– volume: 283
  start-page: 232
  year: 2010
  end-page: 236
  ident: bib0047
  article-title: Cryptanalysis of a multi-chaotic systems based image cryptosystem
  publication-title: Opt Commun
– year: 2018
  ident: bib0119
  article-title: Project: Submission and evaluation criteria version 2.0 [2018]
  publication-title: Tech rep, CyberSecurity Malaysia
– volume: 25
  start-page: 92
  year: 2018
  end-page: 101
  ident: bib0054
  article-title: Cryptanalysis and improvement of a chaotic image encryption by first-order time-delay system
  publication-title: IEEE MultiMedia
– volume: 52
  start-page: 672
  year: 2005
  end-page: 679
  ident: bib0077
  article-title: Additive mixing modulation for public key encryption based on distributed dynamics
  publication-title: IEEE Trans Circuits Syst I: Regular Papers
– volume: 149
  start-page: 148
  year: 2018
  end-page: 161
  ident: bib0038
  article-title: 2D logistic-sine-coupling map for image encryption
  publication-title: Signal Process
– reference: Bose R. Novel public key encryption technique based on multiple chaotic systems. Phys Rev Lett 95(9). doi:
– reference: Tenny R, Tsimring LS, Larson L, Abarbanel HDI. Using distributed nonlinear dynamics for public key encryption. Phys Rev Lett 90(4). doi:
– volume: 50
  start-page: 587
  year: 2004
  end-page: 590
  ident: bib0032
  article-title: Chaos based spread spectrum image steganography
  publication-title: IEEE Trans Consumer Electron
– reference: Flores-Vergara A, García-Guerrero EE, Inzunza-González E, López-Bonilla OR, Rodríguez-Orozco E, Cárdenas-Valdez JR, Tlelo-Cuautle E. Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic. Nonlinear Dyn doi:
– volume: 186
  start-page: 249
  year: 2012
  end-page: 264
  ident: bib0090
  article-title: Keyed hash function based on a chaotic map
  publication-title: Inf Sci
– volume: 153
  start-page: 11
  year: 2018
  end-page: 23
  ident: bib0065
  article-title: Image encryption using 2d hénon-sine map and dna approach
  publication-title: Signal Process
– volume: 37
  start-page: 669
  year: 2008
  end-page: 674
  ident: bib0075
  article-title: Cryptanalysis of the public key encryption based on multiple chaotic systems
  publication-title: Chaos Solitons Fractals
– volume: 87
  start-page: 51
  year: 2016
  end-page: 66
  ident: bib0024
  article-title: An image encryption scheme combining chaos with cycle operation for DNA sequences
  publication-title: Nonlinear Dyn
– volume: 120
  start-page: 105698
  year: 2019
  ident: bib0009
  article-title: Hybrid image encryption algorithm based on 3d chaotic system and choquet fuzzy integral
  publication-title: Opt Laser Technol
– reference: Çavuşoğlu U, Kaçar S. A novel parallel image encryption algorithm based on chaos. Cluster Comput. doi:
– volume: 115
  start-page: 197
  year: 2019
  end-page: 207
  ident: bib0013
  article-title: Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms
  publication-title: Opt Lasers Eng
– reference: Soleymani S.H., Taherinia A.H., Mohajerzadeh A.H.. WACA: A new blind robust watermarking method based on arnold cat map and amplified pseudo-noise strings with weak correlation. Multimed Tools Appl doi:
– volume: 23
  start-page: 747
  year: 2018
  end-page: 753
  ident: bib0107
  article-title: An efficient online/offline ID-based short signature procedure using extended chaotic maps
  publication-title: Soft Comput
– reference: .
– volume: 67
  start-page: 557
  year: 2011
  end-page: 566
  ident: bib0028
  article-title: A new image encryption method: parallel sub-image encryption with hyper chaos
  publication-title: Nonlinear Dyn
– volume: 144
  start-page: 444
  year: 2018
  end-page: 452
  ident: bib0051
  article-title: Cryptanalysis and enhancements of image encryption using combination of the 1d chaotic map
  publication-title: Signal Process
– start-page: 543
  year: 2018
  end-page: 553
  ident: bib0082
  article-title: A new chaotic map based secure and efficient pseudo-random bit sequence generation
  publication-title: International Symposium on Security in Computing and Communication
– volume: 377
  start-page: 227
  year: 2007
  end-page: 229
  ident: bib0001
  article-title: Detecting positive feedback in multivariate time series: the case of metal prices and US inflation
  publication-title: Physica A
– volume: 142
  start-page: 340
  year: 2018
  end-page: 353
  ident: bib0062
  article-title: Exploiting self-adaptive permutation–diffusion and dna random encoding for secure and efficient image encryption
  publication-title: Signal Process
– volume: 19
  start-page: 887
  year: 2014
  end-page: 895
  ident: bib0084
  article-title: Pseudo-random number generator based on mixing of three chaotic maps
  publication-title: Commun Nonlinear Sci Numer Simul
– volume: 480
  start-page: 403
  year: 2019
  end-page: 419
  ident: bib0012
  article-title: Cosine-transform-based chaotic system for image encryption
  publication-title: Inf Sci
– volume: 40
  start-page: 111
  year: 2018
  end-page: 133
  ident: bib0039
  article-title: Secure multi-level permutation operation based multiple colour image encryption
  publication-title: J Inf Secur Appl
– volume: 111
  start-page: 196
  year: 2019
  end-page: 204
  ident: bib0014
  article-title: A secure image encryption method using scan pattern and random key stream derived from laser chaos
  publication-title: Opt Laser Technol
– volume: 47
  start-page: 188
  year: 2019
  end-page: 198
  ident: bib0006
  article-title: Designing digital image encryption using 2d and 3d reversible modular chaotic maps
  publication-title: J Inf Secur Appl
– volume: 28
  start-page: 1405
  issue: 6
  year: 2016
  ident: 10.1016/j.jisa.2019.102421_bib0097
  article-title: A fast and efficient hash function based on generalized chaotic mapping with variable parameters
  publication-title: Neural Comput Appl
  doi: 10.1007/s00521-015-2158-7
– year: 2001
  ident: 10.1016/j.jisa.2019.102421_sbref0105
  article-title: Camellia: A 128-bit block cipher suitable for multiple platforms design andAnalysis
– start-page: 257
  year: 2011
  ident: 10.1016/j.jisa.2019.102421_bib0122
  article-title: Lessons learnt from the cryptanalysis of chaos-based ciphers
  doi: 10.1007/978-3-642-20542-2_8
– volume: 360
  start-page: 259
  issue: 2
  year: 2006
  ident: 10.1016/j.jisa.2019.102421_bib0074
  article-title: Security of public key encryption technique based on multiple chaotic systems
  publication-title: Phys Lett A
  doi: 10.1016/j.physleta.2006.05.038
– volume: 67
  start-page: 557
  issue: 1
  year: 2011
  ident: 10.1016/j.jisa.2019.102421_bib0028
  article-title: A new image encryption method: parallel sub-image encryption with hyper chaos
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-011-0006-6
– volume: 79
  start-page: 24
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0040
  article-title: Image encryption using block cipher and chaotic sequences
  publication-title: Signal Process Image Commun
  doi: 10.1016/j.image.2019.08.014
– volume: 44
  start-page: 117
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0041
  article-title: Image encryption using sequence generated by cyclic group
  publication-title: J Inf Secur Appl
– ident: 10.1016/j.jisa.2019.102421_bib0016
  doi: 10.1007/s10586-018-02895-w
– volume: 43
  start-page: 560
  issue: 5
  year: 1994
  ident: 10.1016/j.jisa.2019.102421_bib0088
  article-title: Maximal and near-maximal shift register sequences: efficient event counters and easy discrete logarithms
  publication-title: IEEE Trans Comput
  doi: 10.1109/12.280803
– volume: 94
  start-page: 1319
  issue: 2
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0021
  article-title: A novel plaintext-related image encryption scheme using hyper-chaotic system
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-018-4426-4
– volume: 115
  start-page: 7
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0042
  article-title: On symmetric color image encryption system with permutation-diffusion simultaneous operation
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2018.11.015
– volume: 9
  start-page: 271
  issue: 2
  year: 2013
  ident: 10.1016/j.jisa.2019.102421_bib0043
  article-title: Modified multi-chaotic systems that are based on pixel shuffle for image encryption
  publication-title: J Inf Process Syst
  doi: 10.3745/JIPS.2013.9.2.271
– ident: 10.1016/j.jisa.2019.102421_bib0031
– volume: 37
  start-page: 669
  issue: 3
  year: 2008
  ident: 10.1016/j.jisa.2019.102421_bib0075
  article-title: Cryptanalysis of the public key encryption based on multiple chaotic systems
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2006.09.047
– start-page: 205
  year: 2011
  ident: 10.1016/j.jisa.2019.102421_bib0105
  article-title: Chaos-based video encryption algorithms
  doi: 10.1007/978-3-642-20542-2_6
– year: 2018
  ident: 10.1016/j.jisa.2019.102421_sbref0103
  article-title: Project: Submission and evaluation criteria version 2.0 [2018]
  publication-title: Tech rep, CyberSecurity Malaysia
– ident: 10.1016/j.jisa.2019.102421_bib0072
  doi: 10.1007/s11071-019-04802-3
– volume: 47
  start-page: 320
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0004
  article-title: Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map
  publication-title: J Inf Secur Appl
– volume: 3
  start-page: 81
  issue: 1
  year: 1990
  ident: 10.1016/j.jisa.2019.102421_bib0033
  article-title: An introduction to chaotic dynamical systems. 2nd edition, by robert l. devaney
  publication-title: J Appl Math StochastAnal
– volume: 7
  start-page: 8737
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0116
  article-title: A low power cryptography solution based on chaos theory in wireless sensor nodes
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2886384
– volume: 92
  start-page: 575
  issue: 2
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0059
  article-title: SPRING: A novel parallel chaos-based image encryption scheme
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-018-4076-6
– volume: 35
  start-page: 119
  year: 2017
  ident: 10.1016/j.jisa.2019.102421_bib0022
  article-title: A novel pseudo random sequence generator for image-cryptographic applications
  publication-title: J Inf Secur Appl
– volume: 78
  start-page: 995
  issue: 2
  year: 2014
  ident: 10.1016/j.jisa.2019.102421_bib0025
  article-title: A fast color image encryption algorithm based on hyper-chaotic systems
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-014-1492-0
– volume: 10
  start-page: 266
  issue: 7
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0057
  article-title: Cryptanalysis of an image encryption algorithm based on combined chaos for a ban system, and improved scheme using sha-512 and hyperchaos
  publication-title: Symmetry
  doi: 10.3390/sym10070266
– volume: 52
  start-page: 672
  issue: 3
  year: 2005
  ident: 10.1016/j.jisa.2019.102421_bib0077
  article-title: Additive mixing modulation for public key encryption based on distributed dynamics
  publication-title: IEEE Trans Circuits Syst I: Regular Papers
  doi: 10.1109/TCSI.2004.842870
– volume: 87
  start-page: 216
  year: 2016
  ident: 10.1016/j.jisa.2019.102421_bib0094
  article-title: A novel keyed parallel hashing scheme based on a new chaotic system
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2016.04.007
– volume: 283
  start-page: 232
  issue: 2
  year: 2010
  ident: 10.1016/j.jisa.2019.102421_bib0047
  article-title: Cryptanalysis of a multi-chaotic systems based image cryptosystem
  publication-title: Opt Commun
  doi: 10.1016/j.optcom.2009.09.070
– volume: 2017
  start-page: 1
  year: 2017
  ident: 10.1016/j.jisa.2019.102421_bib0060
  article-title: A chaos-based authenticated cipher with associated data
  publication-title: Secur Commun Netw
  doi: 10.1155/2017/9040518
– year: 2013
  ident: 10.1016/j.jisa.2019.102421_sbref0084
– volume: 6
  start-page: 47102
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0055
  article-title: Cryptanalyzing a color image encryption scheme based on hybrid hyper-chaotic system and cellular automata
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2867111
– start-page: 181
  year: 2008
  ident: 10.1016/j.jisa.2019.102421_bib0100
  article-title: On the indifferentiability of the sponge construction
– ident: 10.1016/j.jisa.2019.102421_bib0096
  doi: 10.1007/s13319-017-0123-1
– start-page: 543
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0082
  article-title: A new chaotic map based secure and efficient pseudo-random bit sequence generation
– volume: 78
  start-page: 22023
  issue: 15
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0046
  article-title: A novel chaotic image encryption algorithm based on improved baker map and logistic map
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-019-7453-3
– volume: 24
  start-page: 4797
  issue: 20
  year: 2017
  ident: 10.1016/j.jisa.2019.102421_bib0079
  article-title: Fractional two-dimensional discrete chaotic map and its applications to the information security with elliptic-curve public key cryptography
  publication-title: J Vib Control
  doi: 10.1177/1077546317734712
– ident: 10.1016/j.jisa.2019.102421_bib0056
– volume: 5
  start-page: 131
  issue: 2
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0109
  article-title: Random search based efficient chaotic substitution box design for image encryption
  publication-title: Int J Rough Sets Data Anal (IJRSDA)
  doi: 10.4018/IJRSDA.2018040107
– volume: 96
  start-page: 31
  issue: 1
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0053
  article-title: Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-019-04771-7
– volume: 153
  start-page: 11
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0065
  article-title: Image encryption using 2d hénon-sine map and dna approach
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2018.06.008
– volume: 25
  start-page: 1350105
  issue: 04
  year: 2014
  ident: 10.1016/j.jisa.2019.102421_bib0083
  article-title: Pseudo-random bit generator based on lag time series
  publication-title: International Journal of Modern Physics C
  doi: 10.1142/S0129183113501052
– volume: 121
  start-page: 203
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0115
  article-title: A fast image encryption algorithm based on compressive sensing and hyperchaotic map
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2019.04.011
– ident: 10.1016/j.jisa.2019.102421_bib0019
  doi: 10.1007/s13319-017-0154-7
– volume: 122
  start-page: 225
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0044
  article-title: High-sensitivity image encryption algorithm with random diffusion based on dynamic-coupled map lattices
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2019.04.005
– year: 2014
  ident: 10.1016/j.jisa.2019.102421_sbref0101
  article-title: Competition for authenticated encryption: Security
  publication-title: Applicab Robustness
– year: 2016
  ident: 10.1016/j.jisa.2019.102421_bib0103
  article-title: Using hyper chaos in secure video transmission
– volume: 23
  start-page: 747
  issue: 3
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0107
  article-title: An efficient online/offline ID-based short signature procedure using extended chaotic maps
  publication-title: Soft Comput
  doi: 10.1007/s00500-018-3112-2
– volume: 480
  start-page: 403
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0012
  article-title: Cosine-transform-based chaotic system for image encryption
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2018.12.048
– volume: 79
  start-page: 2345
  issue: 4
  year: 2014
  ident: 10.1016/j.jisa.2019.102421_bib0112
  article-title: Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server’s public key and smart card
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-014-1816-0
– volume: 70
  start-page: 2401
  issue: 4
  year: 2012
  ident: 10.1016/j.jisa.2019.102421_bib0110
  article-title: A secure chaotic maps-based key agreement protocol without using smart cards
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-012-0628-3
– volume: 11
  start-page: 853
  issue: 7
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0007
  article-title: A new lightweight stream cipher based on chaos
  publication-title: Symmetry (Basel)
  doi: 10.3390/sym11070853
– volume: 120
  start-page: 105698
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0009
  article-title: Hybrid image encryption algorithm based on 3d chaotic system and choquet fuzzy integral
  publication-title: Opt Laser Technol
  doi: 10.1016/j.optlastec.2019.105698
– volume: 155
  start-page: 44
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0003
  article-title: A color image cryptosystem based on dynamic DNA encryption and chaos
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2018.09.029
– volume: 186
  start-page: 249
  issue: 1
  year: 2012
  ident: 10.1016/j.jisa.2019.102421_bib0090
  article-title: Keyed hash function based on a chaotic map
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2011.09.008
– volume: 77
  start-page: 27981
  issue: 21
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0067
  article-title: Computationally efficient selective video encryption with chaos based block cipher
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-018-6022-5
– volume: 9
  start-page: 160
  issue: 7
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0078
  article-title: Using the logistic coupled map for public key cryptography under a distributed dynamics encryption scheme
  publication-title: Information
  doi: 10.3390/info9070160
– ident: 10.1016/j.jisa.2019.102421_bib0092
  doi: 10.1007/s41870-018-0199-8
– volume: 148
  start-page: 272
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0061
  article-title: Color image dna encryption using nca map-based cml and one-time keys
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2018.02.028
– ident: 10.1016/j.jisa.2019.102421_bib0018
  doi: 10.1007/s11042-019-7235-y
– volume: 51
  start-page: 337
  issue: 32
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0069
  article-title: Parameter estimation for one-dimensional chaotic systems by guaranteed algorithm and particle swarm optimization
  publication-title: IFAC-PapersOnLine
  doi: 10.1016/j.ifacol.2018.11.406
– volume: 16
  start-page: 1557
  issue: 5
  year: 2006
  ident: 10.1016/j.jisa.2019.102421_bib0068
  article-title: Return-map cryptanalysis revisisted
  publication-title: Int J Bifurcation Chaos
  doi: 10.1142/S0218127406015507
– volume: 34
  start-page: 1323
  issue: 3
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0058
  article-title: Cryptanalysis of an image encryption algorithm based on pwlcm and inertial delayed neural network
  publication-title: J Intell Fuzzy Syst
– volume: 80
  start-page: 1147
  issue: 3
  year: 2015
  ident: 10.1016/j.jisa.2019.102421_bib0085
  article-title: A novel method for producing pseudo random numbers from differential equation-based chaotic systems
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-015-1932-5
– volume: 285
  start-page: 4946
  issue: 24
  year: 2012
  ident: 10.1016/j.jisa.2019.102421_bib0048
  article-title: Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences
  publication-title: Opt Commun
  doi: 10.1016/j.optcom.2012.07.106
– volume: 164
  start-page: 249
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0045
  article-title: An image encryption scheme based on hybridizing digital chaos and finite state machine
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2019.06.013
– volume: 74
  start-page: 1003
  issue: 4
  year: 2013
  ident: 10.1016/j.jisa.2019.102421_bib0106
  article-title: A new digital signature scheme based on chaotic maps
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-013-1018-1
– ident: 10.1016/j.jisa.2019.102421_bib0073
  doi: 10.1103/PhysRevLett.95.098702
– volume: 4
  start-page: 167
  issue: 2
  year: 2010
  ident: 10.1016/j.jisa.2019.102421_bib0089
  article-title: Hash functions using chaotic iterations
  publication-title: J Alg Comput Technol
  doi: 10.1260/1748-3018.4.2.167
– volume: 87
  start-page: 51
  issue: 1
  year: 2016
  ident: 10.1016/j.jisa.2019.102421_bib0024
  article-title: An image encryption scheme combining chaos with cycle operation for DNA sequences
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-016-3024-6
– ident: 10.1016/j.jisa.2019.102421_bib0035
– ident: 10.1016/j.jisa.2019.102421_bib0102
  doi: 10.1007/s11042-019-7282-4
– year: 2002
  ident: 10.1016/j.jisa.2019.102421_bib0120
– volume: 149
  start-page: 148
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0038
  article-title: 2D logistic-sine-coupling map for image encryption
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2018.03.010
– volume: 47
  start-page: 188
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0006
  article-title: Designing digital image encryption using 2d and 3d reversible modular chaotic maps
  publication-title: J Inf Secur Appl
– volume: 85
  start-page: 2141
  issue: 4
  year: 2015
  ident: 10.1016/j.jisa.2019.102421_bib0113
  article-title: Cryptanalysis and improvement of a mobile dynamic ID authenticated key agreement scheme based on chaotic maps
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-015-2896-y
– volume: 312
  start-page: 104
  year: 2015
  ident: 10.1016/j.jisa.2019.102421_bib0114
  article-title: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2015.03.050
– year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0066
  article-title: Implementation of chaos based cryptography in kasumi block cipher
– volume: 6
  start-page: 18759
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0049
  article-title: Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2817600
– volume: 25
  start-page: 92
  issue: 3
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0054
  article-title: Cryptanalysis and improvement of a chaotic image encryption by first-order time-delay system
  publication-title: IEEE MultiMedia
  doi: 10.1109/MMUL.2018.112142439
– volume: 53
  start-page: 1341
  issue: 6
  year: 2006
  ident: 10.1016/j.jisa.2019.102421_bib0037
  article-title: Chaotic block ciphers: from theory to practical algorithms
  publication-title: IEEE Trans Circuits Syst I Regul Pap
  doi: 10.1109/TCSI.2006.874182
– volume: 115
  start-page: 42
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0010
  article-title: A new image encryption algorithm with nonlinear-diffusion based on multiple coupled map lattices
  publication-title: Opt Laser Technol
  doi: 10.1016/j.optlastec.2019.02.009
– ident: 10.1016/j.jisa.2019.102421_bib0098
  doi: 10.1007/s10586-017-1062-6
– year: 2016
  ident: 10.1016/j.jisa.2019.102421_bib0101
  article-title: Image watermarking scheme based on arnold transform and DWT-DCT-SVD
– year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0123
  article-title: List of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs
  publication-title: Tech rep, Technical University of Denmark
– volume: 2012
  start-page: 1
  year: 2012
  ident: 10.1016/j.jisa.2019.102421_bib0027
  article-title: Image encryption using a lightweight stream encryption algorithm
  publication-title: Adv Multimed
  doi: 10.1155/2012/767364
– volume: 47
  start-page: 173
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0005
  article-title: Image encryption scheme based on a new secure variant of hill cipher and 1d chaotic maps
  publication-title: J Inf Secur Appl
– volume: 55
  start-page: 1108
  issue: 4
  year: 2008
  ident: 10.1016/j.jisa.2019.102421_bib0002
  article-title: Chaotic communication based on the particle-in-a-box electronic circuit
  publication-title: IEEE Trans Circuits Syst I: Regular Papers
– volume: 223
  start-page: 1601
  issue: 8
  year: 2014
  ident: 10.1016/j.jisa.2019.102421_bib0070
  article-title: A fast and light stream cipher for smartphones
  publication-title: Eur Phys J Special Top
  doi: 10.1140/epjst/e2014-02185-y
– volume: 90
  start-page: 223
  issue: 1
  year: 2017
  ident: 10.1016/j.jisa.2019.102421_bib0086
  article-title: Pseudo-random number generator based on discrete-space chaotic map
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-017-3656-1
– volume: 40
  start-page: 111
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0039
  article-title: Secure multi-level permutation operation based multiple colour image encryption
  publication-title: J Inf Secur Appl
– volume: 115
  start-page: 197
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0013
  article-title: Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms
  publication-title: Opt Lasers Eng
  doi: 10.1016/j.optlaseng.2018.12.002
– volume: 19
  start-page: 887
  issue: 4
  year: 2014
  ident: 10.1016/j.jisa.2019.102421_bib0084
  article-title: Pseudo-random number generator based on mixing of three chaotic maps
  publication-title: Commun Nonlinear Sci Numer Simul
  doi: 10.1016/j.cnsns.2013.08.032
– volume: 25
  start-page: 46
  issue: 4
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0052
  publication-title: IEEE MultiMedia
  doi: 10.1109/MMUL.2018.2873472
– ident: 10.1016/j.jisa.2019.102421_bib0015
  doi: 10.1007/s11042-018-7081-3
– year: 2010
  ident: 10.1016/j.jisa.2019.102421_bib0029
  article-title: A chaos-based data encryption algorithm for image/video
– volume: 71
  start-page: 259
  issue: 1–2
  year: 2012
  ident: 10.1016/j.jisa.2019.102421_bib0026
  article-title: An image encryption scheme based on time-delay and hyperchaotic system
  publication-title: J Nonlinear Dyn
– volume: 31
  start-page: 219
  issue: 1
  year: 2017
  ident: 10.1016/j.jisa.2019.102421_bib0023
  article-title: A novel image encryption scheme based on DNA sequence operations and chaotic systems
  publication-title: Neural Comput Appl
  doi: 10.1007/s00521-017-2993-9
– year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0118
  article-title: Requirements and evaluation criteria for the lightweight cryptography standardization process
  publication-title: Tech Rep, National Institute of Standards and Technology (NIST)
– volume: 377
  start-page: 227
  issue: 1
  year: 2007
  ident: 10.1016/j.jisa.2019.102421_bib0001
  article-title: Detecting positive feedback in multivariate time series: the case of metal prices and US inflation
  publication-title: Physica A
  doi: 10.1016/j.physa.2006.11.002
– volume: 14
  start-page: 3743
  issue: 11
  year: 2009
  ident: 10.1016/j.jisa.2019.102421_bib0034
  article-title: Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption
  publication-title: Commun Nonlinear Sci Numer Simul
  doi: 10.1016/j.cnsns.2009.02.033
– volume: 97
  start-page: 95
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0020
  article-title: Secure and robust digital image watermarking scheme using logistic and RSA encryption
  publication-title: Expert Syst Appl
  doi: 10.1016/j.eswa.2017.12.003
– volume: 144
  start-page: 444
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0051
  article-title: Cryptanalysis and enhancements of image encryption using combination of the 1d chaotic map
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2017.11.005
– volume: 161
  start-page: 227
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0008
  article-title: A robust image encryption algorithm based on chua’s circuit and compressive sensing
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2019.03.022
– volume: 59
  start-page: 3320
  issue: 10
  year: 2010
  ident: 10.1016/j.jisa.2019.102421_bib0030
  article-title: Color image encryption based on one-time keys and robust chaotic maps
  publication-title: Comput Math Appl
  doi: 10.1016/j.camwa.2010.03.017
– volume: 160
  start-page: 45
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0011
  article-title: A new hybrid digital chaotic system with applications in image encryption
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2019.02.016
– volume: 134
  start-page: 234
  year: 2017
  ident: 10.1016/j.jisa.2019.102421_bib0064
  article-title: Chaotic image cryptosystem using dna deletion and dna insertion
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2016.12.008
– volume: 12
  start-page: 113
  issue: 1
  year: 2014
  ident: 10.1016/j.jisa.2019.102421_bib0050
  article-title: Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys
  publication-title: Int J Commun NetwDistrib Syst
– volume: 50
  start-page: 587
  issue: 2
  year: 2004
  ident: 10.1016/j.jisa.2019.102421_bib0032
  article-title: Chaos based spread spectrum image steganography
  publication-title: IEEE Trans Consumer Electron
  doi: 10.1109/TCE.2004.1309431
– issue: 1
  year: 2013
  ident: 10.1016/j.jisa.2019.102421_bib0095
  article-title: A novel parallel hash function based on 3d chaotic map
  publication-title: EURASIP J Adv Signal Process
  doi: 10.1186/1687-6180-2013-126
– volume: 77
  start-page: 13391
  issue: 11
  year: 2017
  ident: 10.1016/j.jisa.2019.102421_bib0071
  article-title: Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-017-4953-x
– volume: 132
  issue: 12
  year: 2017
  ident: 10.1016/j.jisa.2019.102421_bib0104
  article-title: Chaos based video encryption using maps and ikeda time delay system
  publication-title: Eur Phys J Plus
  doi: 10.1140/epjp/i2017-11819-7
– year: 1945
  ident: 10.1016/j.jisa.2019.102421_bib0036
  article-title: A mathematical theory of cryptography
  publication-title: Tech rep, Bell Telephone Labs
– ident: 10.1016/j.jisa.2019.102421_bib0076
  doi: 10.1103/PhysRevLett.90.047903
– volume: 142
  start-page: 340
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0062
  article-title: Exploiting self-adaptive permutation–diffusion and dna random encoding for secure and efficient image encryption
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2017.07.034
– volume: 104
  start-page: 655
  year: 2017
  ident: 10.1016/j.jisa.2019.102421_bib0080
  article-title: The design and implementation of hybrid RSA algorithm using a novel chaos based RNG, chaos
  publication-title: Solitons Fractals
  doi: 10.1016/j.chaos.2017.09.025
– volume: 214
  start-page: 56
  year: 2012
  ident: 10.1016/j.jisa.2019.102421_bib0093
  article-title: Keyed hash function based on a dynamic lookup table of functions
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2012.06.001
– ident: 10.1016/j.jisa.2019.102421_bib0017
  doi: 10.1007/s11042-018-7110-2
– volume: 155
  start-page: 44
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0063
  article-title: A color image cryptosystem based on dynamic dna encryption and chaos
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2018.09.029
– year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0081
  article-title: Modified RSA encryption algorithm based on chaos and its application in voice encryption system
– volume: 18
  start-page: 109
  issue: 1
  year: 2013
  ident: 10.1016/j.jisa.2019.102421_bib0091
  article-title: A fast and efficient chaos-based keyed hash function
  publication-title: Commun Nonlinear Sci Numer Simul
  doi: 10.1016/j.cnsns.2012.06.019
– volume: 111
  start-page: 196
  year: 2019
  ident: 10.1016/j.jisa.2019.102421_bib0014
  article-title: A secure image encryption method using scan pattern and random key stream derived from laser chaos
  publication-title: Opt Laser Technol
  doi: 10.1016/j.optlastec.2018.09.048
– volume: 6
  start-page: 55405
  year: 2018
  ident: 10.1016/j.jisa.2019.102421_bib0108
  article-title: A new 1d chaotic map and β-hill climbing for generating substitution-boxes
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2871557
– volume: 11
  start-page: e0153870
  issue: 4
  year: 2016
  ident: 10.1016/j.jisa.2019.102421_bib0111
  article-title: An extended chaotic maps-based three-party password-authenticated key agreement with user anonymity
  publication-title: PLOS ONE
  doi: 10.1371/journal.pone.0153870
– ident: 10.1016/j.jisa.2019.102421_bib0087
  doi: 10.1007/s11071-019-04809-w
SSID ssj0001219523
Score 2.4406598
Snippet Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 102421
SubjectTerms Authentication
Chaos theory
Cryptanalysis
Cryptography
Image encryption
Security
Title Implementation and practical problems of chaos-based cryptography revisited
URI https://dx.doi.org/10.1016/j.jisa.2019.102421
Volume 50
WOSCitedRecordID wos000505033600010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: ScienceDirect
  issn: 2214-2126
  databaseCode: AIEXJ
  dateStart: 20130701
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0001219523
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lj9MwELagy4ELLC_tA5AP3CqjOo2d-FitFsEiVkj00Ftkx7baakmrJsDy7xk_4s3uohUgcYmiqHaqmU_jz87MNwi9mRjJgSZkxKqpJhDwLBGwEpLCCiVFyRXV0jebKM7Py8VCfI7trVrfTqBomvLyUmz_q6vhGTjblc7-hbvTpPAA7sHpcAW3w_WPHO_1fr_GkqImCgH4UihXdBX6x_j8jXopNy1xy5ge17uf2y6qV_tyljaVPd1mrlFs1U_fxv53QfR18DU8HQmYZciigbCUgDi7kD9W2vPWTxvZtVEPwp30rHx6AQSh8cnSxGU1nkrAFnRyLcMjlctc5SZBRMsymhNYK_kw_Abd2VuRPBwqrN-u3Td9YCnCiUzkoZr6hkL2FzevmxbIqKuVze-jvaxgohyhvdmH08XZ4NCNCuZb_qW_EgupQs7fzZf9nqwMCMh8Hz2K9sez4PEn6J5pnqLHfVcOHIP0M_TxOgAwOAYnAOAeAHhj8QAAeAgAnADwHM3fnc5P3pPYMoPUU847Art1rZXTACyBiLIp00JqaZSYSKos7LUnuWIcWDdj1lLFc0OltdJyw4SRdvoCjZpNYw4QZsD7tKKZ5rbMhVJCFFIKpgwVtaaqOES0N01VRzl519XkourzBteVM2flzFkFcx6icRqzDWIqd_6a9RavIh0MNK8CjNwx7ugfxx2jh1dIfolG3e6beYUe1N-7Vbt7HaH0C2Xbh-A
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Implementation+and+practical+problems+of+chaos-based+cryptography+revisited&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Teh%2C+Je+Sen&rft.au=Alawida%2C+Moatsum&rft.au=Sii%2C+You+Cheng&rft.date=2020-02-01&rft.pub=Elsevier+Ltd&rft.issn=2214-2126&rft.volume=50&rft_id=info:doi/10.1016%2Fj.jisa.2019.102421&rft.externalDocID=S2214212619306544
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon