Algebraic structures are highly effective in designing symmetric key cryptosystems; however, if the key space is not sufficiently large, such systems become vulnerable to brute-force attacks. To address this challenge, our research focuses on enlarging the key space in symmetric key schemes by integrating the non-chain ring with a four-dimensional chaotic system. While chaotic maps offer significant potential for data processing, relying solely on them does not fully leverage their operational advantages. Therefore, it is essential to incorporate algebraic structures that enhance the complexity of the scheme. In the proposed technique, four-dimensional chaotic sequences are employed for image pixel permutation, diffusion, and exclusive-or operations. The scheme is further strengthened against chosen and known plaintext attacks by incorporating pixel values during the exclusive-or operation, where images are XORed with hashed images and keys generated from chaotic sequences. The effectiveness of the technique, its resilience to various forms of attack, and its feasibility for practical implementation are demonstrated through extensive testing and a comprehensive security analysis.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11735708PMC
http://dx.doi.org/10.1007/s11571-025-10217-1DOI Listing

Publication Analysis

Top Keywords

four-dimensional chaotic
12
non-chain ring
8
ring four-dimensional
8
algebraic structures
8
symmetric key
8
key space
8
chaotic sequences
8
chaotic
5
effective encryption
4
encryption approach
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!