Next Article in Journal
Type II Power Topp-Leone Generated Family of Distributions with Statistical Inference and Applications
Next Article in Special Issue
Image Encryption Algorithm Based on Tent Delay-Sine Cascade with Logistic Map
Previous Article in Journal
Autonomous Detection for Traffic Flow Parameters of a Vehicle-Mounted Sensing Device Based on Symmetrical Difference
Previous Article in Special Issue
New Chaotic Systems with Two Closed Curve Equilibrium Passing the Same Point: Chaotic Behavior, Bifurcations, and Synchronization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Symmetric Key Encryption Based on Rotation-Translation Equation

by
Borislav Stoyanov
* and
Gyurhan Nedzhibov
Department of Computer Informatics, Faculty of Mathematics and Informatics, Konstantin Preslavski University of Shumen, 9712 Shumen, Bulgaria
*
Author to whom correspondence should be addressed.
Symmetry 2020, 12(1), 73; https://doi.org/10.3390/sym12010073
Submission received: 12 November 2019 / Revised: 19 December 2019 / Accepted: 25 December 2019 / Published: 2 January 2020
(This article belongs to the Special Issue Symmetry in Chaotic Systems and Circuits)

Abstract

:
In this paper, an improved encryption algorithm based on numerical methods and rotation–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key. Symmetric key algorithms use the same key for both encryption and decryption. Most symmetric key encryption algorithms use either block ciphers or stream ciphers. Our goal in this work is to improve an existing encryption algorithm by using a faster convergent iterative method, providing secure convergence of the corresponding numerical scheme, and improved security by a using rotation–translation formula.

1. Introduction

Cryptography is a practice and study of techniques of hidden data transfer so that only the intended receivers can extract and read the data [1]. It is the study of mathematical methods related to different aspects of informational security such as data origin, entity authentication, data integrity and confidentiality. The source data, which is to be protected by cryptography, is called plaintext. The procedure of transforming plaintext into an unreadable form termed ciphertext is called encryption. Decryption is the reverse process, recovering the plaintext back from a ciphertext. A cryptographic system is a set of algorithms, seeded by key that encrypt given messages into ciphertext and recover them back into input data. The scheme for a secret key encryption is first proposed by Shannon [2].
There are two categories of key-based cryptographic algorithms: symmetric key (secret key) cryptography and public key (asymmetric key) cryptography. In the first category, a sender and recipient share a private key known only to both of them. The same key is used for encryption and decryption. The most commonly used symmetric algorithms are AES (Advanced Encryption Standard) [3], Cha Cha [4], Blowfish [5], and IDEA (International Data Encryption Algorithm) [6]. By contrast, for asymmetric key cryptography, two keys are used: the first one is made publicly available to senders for encrypting plaintext while the second key is kept secret and is used by the receivers for decrypting the ciphertext. The most ordinarily exploited asymmetric schemes are the Rivest–Shamir–Adleman (RSA) cryptosystem [7] and ECC (Elliptic-curve cryptography) [8]. Symmetric encryption schemes are usually faster than public key counterparts and thus are preferred for encrypting big data.
In symmetric key cryptography, either stream ciphers or block ciphers can be used. An example of stream cipher is the Vigenere Cipher. These types of ciphers encrypt the letters or digits (typically bytes) of a message one at a time, while block ciphers take a number of bits and encrypt them as a single unit. Until now, many symmetric data encryption algorithms have been proposed. Some of them use classical schemes for text encryption. In [9], an extension of a public key cryptographic scheme to support a private key cryptographic scheme which is a mix of AES and ECC is presented. Plain text encryption based on AES, Blowfish, and SALSA20 is designed and experimentally evaluated in [10].
Some of them use chaotic equations for text encryption. In Reference [11], a novel scheme for digital image encryption based on a mix of chaos theory and DNA calculation is presented. In [12], a chaos-based pseudorandom generation scheme based on a six-dimensional chaotic system is proposed. A text encryption architecture is given. Novel symmetric data encryption algorithms based on logistic chaotic formula are presented in [13,14,15]. A chaotic logistic map filtered with binary function is proposed to text encryption scheme in Reference [16]. In [17], a chaos-based encryption technique based on logistic, pinchers, and sine-circle maps is proposed. An algorithm of chaotic data encryption system by using private characteristic of electrocardiogram (ECG) signal and logistic map is designed in [18]. In [19,20], the chaotic behaviour of a Chua system is used in novel text encryption scheme designs. A novel pseudorandom bit generation scheme based on rotation equations is proposed in [21]. The technique has good statistical properties measured by test packages. A novel encryption method based on modified pulsed-coupled spiking neurons circuit is presented in Reference [22]. In [23], a modified quadratic map for numeric sensor data encryption is proposed.

2. Symmetric Key Encryption Algorithms Based on Numerical Methods

One of the first published works that consider symmetric key encryption algorithm based on numerical methods is by Ghosh in [24] (see also [25,26]), where it is shown that any nonlinear function with one variable f ( z ) can be defined as a key. The encryption process then is defined as finding the solution of the equation
f ( z ) c i = 0 ,
where c i represents the numerical code of the ith symbol in the plaintext (e.g., the ASCII code). The function f ( z ) must be chosen in such a way that the corresponding formula (1) has at least one real root for any i. Then, the set of roots { z i * } represents the ciphertext. On the receiver side, each entry z i * is decoded by substituting it into f ( z ) giving rise to the plaintext character c i = f ( z i * ) (the value f ( z i * ) must be appropriately rounded to recover c i ). In [24], as a key function f ( z ) , the authors use a cubic polynomial and, for the numerical solution of equations f ( z ) c i = 0 , they use the Newton’s iterative method. We have to mention that, in solving nonlinear Equation (1), we can use different iterative methods. Analogous to this algorithm, an example of a public key cryptosystem based on numerical methods is considered in [27].
It is important to say that the main weaknesses of such algorithms can be summarized in the following:
  • Lack of rules on how to choose the function f and suitable iterative method so that the convergence of the process is always guaranteed.
  • Vulnerability to attack because in these types of algorithms the same letter is encoded with the same real number of each occurrence in the plaintext.
Our aim in the present work is to develop a new algorithm that solves the disadvantages mentioned above. In order to achieve this, the new scheme will be based on employing numerical iterative methods and rotation–translation formula.

3. On Numerical Methods and Rotation–Translation Equation

3.1. On Numerical Methods for Solving Nonlinear Equations

Although the Newton’s iterative method
z k + 1 = z k f ( z k ) f ( z k ) , k = 0 , 1 , 2 ,
is one of the most popular and commonly used methods, numerical analysis offers many iterative methods that can be used in the stage of solution of Equation (1). In general to calculate the roots of nonlinear equations (of the type (1)), we have to use approximate (iterative) methods. When studying an iterative method, two of the most important aspects to consider are:
  • the convergence speed of the iteration,
  • an interval of convergence and the rules for choosing the initial approximations.
Most of the known iterative algorithms for solving nonlinear equations are only locally convergent, i.e., before using such a method, we need to locate the unknown root at a sufficiently small interval. Even if the root sought is located at the appropriate interval, if we do not choose the initial approximation in a proper way, the process may not be convergent. Usually, iterative methods of this type require the following convergence conditions:
  • need to have an interval [ a , b ] containing a single root of f, and
  • the derivatives f and f must not have zeros in the interval [ a , b ] .
Then, the corresponding iterative process converges to the sought root for an initial approximation z 0 which is the end of the interval [ a , b ] , where f ( z 0 ) f ( z 0 ) > 0 (or f ( z 0 ) f ( z 0 ) < 0 ).
For some examples of more computationally efficient and higher order iterative methods, we refer the reader to [28].
In the encryption algorithm that we will introduce later, we will use the following iterative function
z k + 1 = z k h ( z k ) 2 3 f ( u k ) + f ( z k ) 3 f ( u k ) f ( z k ) , k = 0 , 1 , 2 ,
where h ( z k ) = f ( z k ) f ( z k ) and u k = z k 3 2 h ( z k ) . This iterative algorithm is explored by Jarrat in [29], and it is known as Jarrat’s method (see also [30]).
The reason we prefer iteration method (3) over method (2) is its faster convergence. The order of convergence of Jarrat’s method is four, while the one of Newton’s method is only two (see [30]). In addition, method (3) has higher computational efficiency, although at each step of the iteration one value of f and two values of f are calculated (while in the Newton’s method, one value of f and one value of f are calculated). Thus, if the function f is a polynomial, then calculating the value of the function f is always more complex than calculating its derivative f .

3.2. Base of Rotation–Translation Equation

In order to avoid the vulnerability to statistical attack, we include additional randomness by using the following space contraction formula based on rotation–translation equation of the form [31]
x k + 1 = a + b ( x k cos θ k y k sin θ k ) , y k + 1 = b ( x k sin θ k + y k cos θ k ) ,
where the angle of rotation is
θ k = c + d x k 2 + y k 2 .
The translation value is a = 6 , the space contraction value is b = 0.8 < 1 , and rotation values are c = a / 2 and d = a . The rotation–translation Equation (4) with initial conditions x 0 = 0.233 , y 0 = 0.67 is presented in Figure 1.

4. Proposed Encryption Algorithm Based on Numerical Method and Rotation–Translation Equation

Here, we describe an encryption algorithm based on space contraction and numerical method. Any nonlinear function or polynomial f with one variable can be defined as part of a key.
We consider plaintext P with byte length of L. The initial values x 0 and y 0 from Equation (4), and an initial iteration number M 0 , are determined. The rotation–translation formula, Equation (4), is iterated for M 0 times.
The proposed algorithm based on numerical method and space contraction is given below:
  • Read the symbols from the plaintext data and get the ASCII values of the different symbols;
  • Construct a system of L nonlinear equations by subtracting the ASCII values from the function f and equate with zero;
  • Solve individually the nonlinear equations and put the results α i into an array B;
  • The loop of Equation (4) continues, and as an output, two real numbers x i and y i are generated. We take the sum of x i and y i to produce the real number d i = x i + y i , which is put into an array R.
  • Return to Step 4 until a stream of real numbers R with length L is reached.
  • We get the sum of the two arrays B and R to produce E, the output array of real numbers.
Remark 1.
In Step 2 of Encryption algorithm, it is desirable that the function or polynomial f is such that each equation of the type f ( z ) c i = 0 has at least one real root, and it is easy to determine the initial approximation, which guarantees the convergence of the iterative process.

4.1. Approaches for Choosing a Nonlinear Function

In the following, we consider two example functions that are suitable for selecting in the above algorithm.

4.1.1. Nonlinear Function

Let f ( z ) has the following form
f ( z ) = e z z 2 p ,
where p is a real parameter such that p 1 . For its first derivative,
f ( z ) = e z 2 z ,
we conclude that f ( z ) > 0 for all z R , i.e., the function f ( z ) is monotonically increasing for all z R . This and the limits
lim z f ( z ) = and lim z f ( z ) =
show that the function f ( z ) has only one real root. From the second derivative of f
f ( z ) = e z 2 ,
and because f ( z ) > 0 for z > ln 2 , it follows that the function f ( z ) is convex for z ( ln 2 , ) .
Therefore, all these properties are also valid for the functions
g i ( z ) = f ( z ) c i ,
where c i is an integer value (the corresponding ASCII code). Then, for any i, the function g i ( z ) is monotonous, convex, and has a real root in the interval ( ln 2 , ) . Indeed, it can be shown that each one function g i ( z ) has a real root in the finite interval ( ln 2 , 6 ) .

4.1.2. Polynomial Function

We consider a fifth degree monic polynomial having the following form:
f ( z ) = z 5 z 4 + z 3 p z 2 + q z ( p + 2 q ) ,
where p and q are real parameters such that p , q [ 1 , 10 ] . From the fundamental theorem of algebra, it follows that f ( z ) has at least one real root. Using the Descartes’ rules of sign, we can prove that f ( z ) has no negative real root, hence it has at least one real positive root (see Appendix A). Examining the first two derivatives of f, it can be shown that the function f ( z ) is monotonically increasing, convex and has a real root in the interval 9 8 , , for any p , q [ 1 , 10 ] . By using the bounding theorems (see Appendix A), it can be shown that f ( z ) has a real root in the finite interval 9 8 , 2 | p + 2 q | 1 / 5 .

4.2. An Example of Encryption

In order to demonstrate the proposed algorithm, we will use the following example:
The text to be encrypted: “Shumen university”.
As a key function, we use the polynomial
f ( z ) = z 5 z 4 + z 3 z 2 + z 3 ,
which is obtained by Equation (7) in the case of p = q = 1 . During the encryption process (Step 3 of the Algorithm), we have to solve in series nonlinear equations of the type
f ( z ) c i = 0 ,
where c i represents the ASCII code of the i-th character in the text, i.e., c i [ 1 , 255 ] . From the analysis of the polynomial (7) and using the bounding theorems for the roots of polynomials, we deduce that Equation (8) has a real root in the interval 9 8 , 6 for any c i [ 1 , 255 ] . Moreover, this interval is such that the iterative process (3) is convergent to the solution for any initial approximation z 0 9 8 , 6 . For this reason, we use the same initial approximation for each Equation (8) obtained during the encryption process, namely the middle point of the interval: z 0 = 6 + 9 / 8 2 3.56 .
We solve all the equations by iterative function (3) and by using the following stopping criteria
  • | f ( z k ) | ϵ , and
  • | z k z k + 1 | ϵ ,
where ϵ = 10 15 .
As a result, for all the equations, the stopping criteria are reached after three iterations. For comparison, if we use the Newton iterative method (2) instead of the Jarrats’ method for solving the corresponding equations, with the same initial approximation, we get six iterations for each equation, see Table 1.
The output array of real numbers E is in the last column of Table 1, and this is the encrypted text that the recipient receives.

4.3. Brute-Force Attack Analysis

The set of all initial values constitutes the key size. The key size of the novel encryption algorithm has the following initial key values x 0 , y 0 , M 0 and at least three real coefficients a i of the polynomial f (for monic polynomial f of degree n 3 ). The two seeds x 0 and y 0 are constructed by randomly choosing two floating-point values that belonging to the intervals [ 0.5 , 7 ] and [ 0.8 , 2 ] , respectively. The novel encryption algorithm does not propose weak keys. As stated in the IEEE Standard for floating-point arithmetic [32], the computational precision of the 64-bit floating point variable is about 10 15 2 49 . The key size of the novel encryption is ( 2 49 ) 5 + 2 32 > 2 248 , which is sufficient enough to defeat brute-force attack [33]. The key space is comparable to state-of-the-art chaos-based encryption algorithms; for example, [10,13,16].

4.4. Statistical Test Analysis of the Proposed Encryption

In an attempt to evaluate randomness of the improved encryption algorithm, we used NIST [34], ENT [35], and PractRand [36] statistical test applications. The output numbers e i from array E are converted to bytes as follows: s i = m o d ( a b s ( i n t e g e r ( e i × 10 15 ) ) ) , 256 ) , where i n t e g e r ( e ) calculates the integer part of e, truncating the value at the decimal point, a b s ( e ) calculates the absolute value of e, and m o d ( e , w ) calculates the reminder after division. The bytes s i are produced. Using the improved encryption, 10 3 sequences of 125,000 bytes are produced.
The NIST suite software (version sts-2.1.2) includes 15 statistical tests: monobit, block frequency, cumulative sums forward and reverse, runs, longest run of ones, rank, Fourier, non-overlapping templates, overlapping templates, universal, approximate entropy, serial one and two, linear complexity, random excursion, and random excursion variant.
The output results of the first 13 tests are in Table 2. The minimum hit rate for each statistical test with the excluding of the random excursion variant test is approximately 980 for a sample size of 1000 byte stings. The minimum hit rate for the random excursion variant test is approximately 600 for a sample size of 614 byte strings. The random excursion test outputs 8 p-values which are tabulated in Table 3. The random excursion variant test calculates 18 randomness probability numbers: p-values, and they are in Table 4.
The improved encryption algorithm passed successfully all the NIST tests.
The ENT application includes six tests to bit or byte sequences. We tested a stream of 125,000,000 bytes (1,000,000,000 bits) of the improved encryption and tabulated the output results in Table 5. The novel encryption passed successfully all the ENT tests.
The third suite is PractRand. We tested our improved encryption algorithm for strings up to 1 GB (bytes) in length, passing all statistical tests successfully as shown in Table 6.
The different statistical tests clearly show the high quality of the proposed algorithm. Table 7 summarizes some of the computed values of our proposed scheme with other algorithms. The performance test of the novel scheme is based on the average response time with data size of 1 MB. The execution is done on mobile Dell Inspiron computer i7-3630QM (2.4 GHz, 8GB RAM).
Based on the good test outputs, we can infer that the novel text encryption based on numerical method and rotation–translation formula has satisfying statistical characteristics and provides a reasonable level of security.

5. Conclusions

We have presented an improved encryption algorithm based on numerical method and rotation–translation formula. The new method uses a faster convergent iterative algorithm and adds additional randomness by using the space contraction equation. Two exemplary ways of constructing nonlinear functions or polynomials with corresponding properties are described. In the examples considered, we demonstrate how to determine the interval containing the desired root and in which the iterative method is guaranteed to be convergent. Our security analysis shows that the improved encryption scheme can be successfully used for information security.

Author Contributions

B.S. and G.N. wrote and edited the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

The paper is partially supported by the National Scientific Program “Information and Communication Technologies for a Single Digital Market in Science, Education and Security (ICTinSES)”, financed by the Ministry of Education and Science, Bulgaria for Borislav Stoyanov.

Acknowledgments

The authors are grateful to the reviewer’s valuable comments that significantly improved the scientific paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A.

Appendix A.1. Real Roots Counting of Polynomials

Consider a monic polynomial of degree n
f ( x ) = x n + a n 1 x n 1 + + a 1 x + a 0 .
From the fundamental theorem of algebra, it follows that f has n real or complex roots, counting multiplicities. If the coefficients a 0 , a 1 , , a n 1 are all real, then the complex roots occur in conjugate pairs.
Using the following Descartes’ rules of sign, we can count the number of real positive zeros of f.
Descartes’ rules
Let p be the number of variations in the sign of the coefficients a n , a n 1 , , a 0 (where a n = 1 and the zero coefficients are ignored). Let m be the number of real positive zeros of f. Then,
  • m p ;
  • p m is an even integer.
A negative zero of f ( x ) , if exists, is a positive zero of f ( x ) .

Appendix A.2. Bounds of Real Roots of Polynomials

The first result in the theory of the location of polynomial zeros is due to Gauss, which is improved by Cauchy in [39], where he proves the following theorem.
Theorem A1 (Cauchy).
Let
f ( x ) = a n x n + a n 1 x n 1 + + a 1 x + a 0
be a polynomial with complex coefficients, where n 1 and a n 0 . Then, all the zeros of f ( x ) lie inside the circle of radius
r = 1 + max 0 k n 1 a k a n
about the origin.
Another bound given by Lagrange is:
Let
f ( x ) = a n x n + a n 1 x n 1 + + a 1 x + a 0
be a polynomial with complex coefficients, where n 1 and a n 0 . Then, all the zeros of f ( x ) lie inside the circle of radius
r = 2 max a n 1 a n , a n 2 a n 1 / 2 , , a 0 a n 1 / n
about the origin.
The next theorem is about bounding positive real roots of polynomials with real coefficients due to Cauchy.
Theorem A2 (Cauchy).
Let
f ( x ) = a n x n + a n 1 x n 1 + + a 1 x + a 0
be a polynomial with real coefficients, where n 1 and a n > 0 and which has s > 0 strictly negative coefficients. Then, every positive real root of f ( x ) is no larger than r:
r = max s a n 1 a n 1 / i : 1 i n a n d a n i < 0 .
More recent and sharper results are obtained by Joyal, Labelle, and Rahman [40] by proving.
Theorem A3.
If M = max 0 i < n 1 | a i | , then all the zeros of the monic polynomial
f ( x ) = x n + a n 1 x n 1 + + a 1 x + a 0
are contained in the disc
| x | 1 2 1 + | a n 1 | + ( 1 | a n 1 | ) 2 + 4 M .

References

  1. Stallings, W. Cryptography and Network Security: Principles and Practice; Pearson: Upper Saddle River, NJ, USA, 2017. [Google Scholar]
  2. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  3. Daemen, J.; Rijmen, V. The Rijndael block cipher: AES proposal. In Proceedings of the First, Candidate Conference (AeS1), Rome, Italy, 22–23 March 1999; pp. 343–348. [Google Scholar]
  4. Bernstein, D.J. ChaCha, a variant of Salsa20. In Proceedings of the Workshop Record of SASC, Lausanne, Switzerland, 13–14 February 2008; Volume 8, pp. 3–5. [Google Scholar]
  5. Schneier, B. Description of a new variable-length key, 64-bit block cipher (Blowfish). In Fast Software Encryption; Anderson, R., Ed.; Springer: Berlin/Heidelberg, Germany, 1994; pp. 191–204. [Google Scholar]
  6. Lai, X.; Massey, J.L. A Proposal for a New Block Encryption Standard. In Advances in Cryptology—EUROCRYPT ’90; Damgård, I.B., Ed.; Springer: Berlin/Heidelberg, Germany, 1991; pp. 389–404. [Google Scholar]
  7. Rivest, R.L.; Shamir, A.; Adleman, L.M. Cryptographic Communications System and Method. U.S. Patent 4,405,829, 20 September 1983. [Google Scholar]
  8. Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
  9. Mathur, N.; Bansode, R. AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection. Procedia Comput. Sci. 2016, 79, 1036–1043. [Google Scholar] [CrossRef] [Green Version]
  10. Panda, M.; Nag, A. Plain Text Encryption Using AES, DES and SALSA20 by Java Based Bouncy Castle API on Windows and Linux. In Proceedings of the 2015 Second International Conference on Advances in Computing and Communication Engineering, Rohtak, India, 1–2 May 2015; pp. 541–548. [Google Scholar] [CrossRef]
  11. Babaei, M. A novel text and image encryption method based on chaos theory and DNA computing. Natural Comput. 2013, 12, 101–107. [Google Scholar] [CrossRef]
  12. Min, L.; Lan, X.; Hao, L.; Yang, X. A 6 Dimensional Chaotic Generalized Synchronization System and Design of Pseudorandom Number Generator with Application in Image Encryption. In Proceedings of the 2014 Tenth International Conference on Computational Intelligence and Security, Yunnan, China, 15–16 November 2014; pp. 356–362. [Google Scholar] [CrossRef]
  13. Murillo-Escobar, M.; Abundiz-Pérez, F.; Cruz-Hernández, C.; López-Gutiérrez, R. A novel symmetric text encryption algorithm based on logistic map. In Proceedings of the International Conference on Communications, Signal Processing and Computers, Guilin, China, 5–8 August 2014; Volume 32, pp. 49–53. [Google Scholar]
  14. Murillo-Escobar, M.; Cruz-Hernández, C.; Cardoza-Avendaño, L.; Méndez-Ramírez, R. A novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dyn. 2017, 87, 407–425. [Google Scholar] [CrossRef]
  15. Volos, C.K.; Kyprianidis, I.; Stouboulos, I. Text Encryption Scheme Realized with a Chaotic Pseudo-Random Bit Generator. J. Eng. Sci. Technol. Rev. 2013, 6, 9–14. [Google Scholar] [CrossRef]
  16. Wang, X.Y.; Gu, S.X. New chaotic encryption algorithm based on chaotic sequence and plain text. IET Inf. Secur. 2014, 8, 213–216. [Google Scholar] [CrossRef]
  17. Akgül, A.; Kaçar, S.; Aricıoğlu, B.; Pehlivan, I. Text encryption by using one-dimensional chaos generators and nonlinear equations. In Proceedings of the 2013 IEEE 8th International Conference on Electrical and Electronics Engineering (ELECO), Bursa, Turkey, 28–30 November 2013; pp. 320–323. [Google Scholar]
  18. Chen, C.; Lin, C. Text encryption using ECG signals with chaotic Logistic map. In Proceedings of the 2010 5th IEEE Conference on Industrial Electronics and Applications, Taichung, Taiwan, 15–17 June 2010; pp. 1741–1746. [Google Scholar] [CrossRef]
  19. Volos, C.K.; Andreatos, A.S. Secure text encryption based on hardware chaotic noise generator. J. Appl. Math. Bioinform. 2015, 5, 15–35. [Google Scholar]
  20. Giakoumis, A.; Volos, C.K.; Munoz-Pacheco, J.M.; del Carmen Gomez-Pavon, L.; Stouboulos, I.N.; Kyprianidis, I.M. Text encryption device based on a chaotic random bit generator. In Proceedings of the 2018 IEEE 9th Latin American Symposium on Circuits Systems (LASCAS), Puerto Vallarta, Mexico, 25–28 February 2018; pp. 1–5. [Google Scholar] [CrossRef]
  21. Stoyanov, B.; Kordov, K. Image Encryption Using Chebyshev Map and Rotation Equation. Entropy 2015, 17, 2117–2139. [Google Scholar] [CrossRef]
  22. Ge, R.; Yang, G.; Wu, J.; Chen, Y.; Coatrieux, G.; Luo, L. A Novel Chaos-Based Symmetric Image Encryption Using Bit-Pair Level Process. IEEE Access 2019, 7, 99470–99480. [Google Scholar] [CrossRef]
  23. Nesa, N.; Ghosh, T.; Banerjee, I. Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map. J. Inf. Secur. Appl. 2019, 47, 320–328. [Google Scholar] [CrossRef]
  24. Ghosh, A.; Saha, A. A Numerical Method Based Encryption Algorithm With Steganography. Comput. Sci. Inf. Technol. 2013, 3, 149–157. [Google Scholar] [CrossRef]
  25. Othman, H.; Hassoun, Y.; Owayjan, M. Entropy model for symmetric key cryptography algorithms based on numerical methods. In Proceedings of the 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR), Beirut, Lebanon, 8–9 October 2015; pp. 1–2. [Google Scholar] [CrossRef]
  26. Hassoun, Y.; Othman, H. Symmetric Key Cryptography Algorithms Based on Numerical Methods. In Proceedings of the NumAn 2014 Conference, Crete, Greece, 22–27 June 2014; pp. 151–155. [Google Scholar]
  27. AL-Siaq, I.R. Public Key Cryptosystem Based on Numerical Methods. Glob. J. Pure Appl. Math. 2017, 13, 3105–3112. [Google Scholar]
  28. Traub, J.F. Iterative Methods for the Solution of Equations; Prentice-Hall Series in Automatic Computation; Prentice-Hall: Englewood Cliffs, NJ, USA, 1982. [Google Scholar]
  29. Jarrat, P. Some fourth order multipoint iterative methods for solving equations. Math. Comput. 1966, 20, 434–437. [Google Scholar] [CrossRef]
  30. Nedzhibov, G.H.; Hasanov, V.I.; Petkov, M.G. On some families of multi-point iterative methods for solving nonlinear equations. Numer. Algorithms 2006, 42, 127–136. [Google Scholar] [CrossRef]
  31. Skiadas, C.H.; Skiadas, C. Chaotic Modelling and Simulation: Analysis of Chaotic Models, Attractors and Forms; Chapman and Hall/CRC: London, UK, 2008. [Google Scholar]
  32. IEEE Standard for Floating-Point Arithmetic; IEEE Std 754-2008; IEEE Computer Society: New York, NY, USA, 2008; pp. 1–70. [CrossRef]
  33. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef] [Green Version]
  34. Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, A.; et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application. In NIST Special Publication 800-22: Revision 1a, Lawrence E. Bassham III; NIST: Gaithersburg, MD, USA, 2010. [Google Scholar]
  35. Walker, J. ENT: A Pseudorandom Number Sequence Test Program; Fourmilab: Switzerland, 2008. [Google Scholar]
  36. Doty-Humphrey, C. PractRand: C++ Library of Pseudo-Random Number Generators And Statistical Tests for RNGs. 2014. Available online: http://pracrand.sourceforge.net/ (accessed on 17 December 2019).
  37. Abubaker, S.; Wu, K. DAFA—A Lightweight DES Augmented Finite Automaton Cryptosystem. In Security and Privacy in Communication Networks; Keromytis, A.D., Di Pietro, R., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 1–18. [Google Scholar]
  38. Mushtaq, M.F.; Jamel, S.; Disina, A.H.; Pindar, Z.A.; Shakir, N.S.A.; Deris, M.M. A Survey on the cryptographic encryption algorithms. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 333–344. [Google Scholar]
  39. Cauchy, A. Exercises de Mathematiques; IV Annee de Bure Freres: Paris, France, 1829. [Google Scholar]
  40. Joyal, G.L.; Rahman, Q.I. On the Location of Zeros of Polynomials. Can. Math. Bull. 1967, 10, 53–63. [Google Scholar] [CrossRef]
Figure 1. Space contraction.
Figure 1. Space contraction.
Symmetry 12 00073 g001
Table 1. Number of iterations for Jarrats’method (JM) and Newton method (NM), and generated arrays.
Table 1. Number of iterations for Jarrats’method (JM) and Newton method (NM), and generated arrays.
LetterASCIINMJMArray BArray RArray E
(Char)CodeIterationsIterationsReached Root ( α i ) d i e i = α i + d i
S83632.5969386151692141.137614183191953.73455279836116
h104632.7075945147580993.832468130522736.54006264528082
u117632.7675508807883452.589869079463705.35741996025204
m109632.7313167483158444.915110427837877.64642717615371
e101632.6929278575032792.092007150870534.78493500837380
n110632.7359581595083977.5294863485186810.2654445080271
94632.6573272406303540.107822880920752.76515012155110
U85632.6083658565838765.702927784558358.31129364114222
n110632.7359581595083971.307966682432194.04392484194058
i105632.7124095613690167.3816294830728910.0940390444419
v118632.7719418124963920.134783457990642.90672527048704
e101632.6929278575032795.238138051784747.93106590928801
r114632.7541983974844801.661577199386214.41577559687069
s115632.7586796320394767.4085752296563610.1672548616958
i105632.7124095613690160.169543032100372.88195259346938
t116632.7631303050770926.323014547384809.08614485246189
y121632.7849411209096020.818748873737203.60368999464681
Table 2. NIST test suite results.
Table 2. NIST test suite results.
NIST Testp-ValueSuccess Rate
Monobit0.556460992/1000
Block frequency0.010093981/1000
Cumulative sums forward0.399442993/1000
Cumulative sums reverse0.299736993/1000
Runs0.605916986/1000
Longest run of ones0.605916988/1000
Rank0.830808988/1000
Fourier0.200115980/1000
Non overlapping templates0.498222990/1000
Overlapping templates0.859637992/1000
Universal0.653773988/1000
Approximate entropy0.693142988/1000
Serial one0.894918990/1000
Serial two0.282626986/1000
Linear complexity0.051942995/1000
Table 3. NIST Random excursion test results.
Table 3. NIST Random excursion test results.
Statep-ValueSuccess Rate
−40.696617610/614
−30.746463606/614
−20.211467610/614
−10.501472606/614
+10.933509607/614
+20.584363605/614
+30.873629610/614
+40.672912608/614
Table 4. NIST Random excursion variant test results.
Table 4. NIST Random excursion variant test results.
Statep-ValueSuccess Rate
−90.283657608/614
−80.444875607/614
−70.699986609/614
−60.775401607/614
−50.876173610/614
−40.921867607/614
−30.135745607/614
−20.036332610/614
−10.574229612/614
+10.345203609/614
+20.366645607/614
+30.517714610/614
+40.024235612/614
+50.990938612/614
+60.447934610/614
+70.232430609/614
+80.193732611/614
+90.659297611/614
Table 5. ENT test results.
Table 5. ENT test results.
ENT TestInput of BitsInput of Bytes
Entropy1.0000007.999999
Optimum compressionReduce size by 0%Reduce size by 0%
χ 2 square0.16, exceed 68.56 %242.28, exceed 70.66%
Arithmetic mean value0.5000127.5055
Monte Carlo for π 3.141226994 (error 0.01%)3.141226994 (error 0.01%)
Serial correlation−0.0000020.000180
Table 6. PractRand test results.
Table 6. PractRand test results.
Test NameRawProcessedEvaluation
BCFN(2,13):!R = +0.0“pass”normal
BCFN(2+0,13−0)R = −0.7p = 0.608normal
BCFN(2 + 1,13 − 0)R = +2.3p = 0.172normal
BCFN(2 + 2,13 − 1)R = −0.1p = 0.504normal
BCFN(2 + 3,13 − 1)R = −2.2p = 0.812normal
BCFN(2 + 4,13 − 2)R = −4.4p = 0.968normal
BCFN(2 + 5,13 − 3)R = −1.1p = 0.669normal
BCFN(2 + 6,13 − 3)R = −4.1p = 0.960normal
BCFN(2 + 7,13 − 4)R = +4.8p = 0.032normal
BCFN(2 + 8,13 − 5)R = +3.3p = 0.093normal
BCFN(2 + 9,13 − 5)R = −0.3p = 0.524normal
BCFN(2 + 10,13 − 6)R = −4.3p = 0.981normal
BCFN(2 + 11,13 − 6)R = −0.9p = 0.614normal
BCFN(2 + 12,13 − 7)R = +1.6p = 0.219normal
BCFN(2 + 13,13 − 8)R = −2.7p = 0.914normal
DC6-9x1Bytes-1R = −1.0p = 0.795normal
Gap-16:!R = +0.0“pass”normal
Gap-16:AR = +0.0p = 0.614normal
Gap-16:BR = −3.2p = 0.987normal
(Low1/8)BCFN(2,13):!R = +0.0“pass”normal
(Low1/8)BCFN(2+0,13 − 1)R = −1.7p = 0.754normal
(Low1/8)BCFN(2+1,13 − 2)R = +1.0p = 0.336normal
(Low1/8)BCFN(2+2,13 − 3)R = +1.7p = 0.243normal
(Low1/8)BCFN(2+3,13 − 3)R = −0.7p = 0.605normal
(Low1/8)BCFN(2+4,13 − 4)R = +2.7p = 0.138normal
(Low1/8)BCFN(2+5,13 − 5)R = −0.3p = 0.528normal
(Low1/8)BCFN(2+6,13 − 5)R = −0.9p = 0.626normal
(Low1/8)BCFN(2+7,13 − 6)R = −2.3p = 0.838normal
(Low1/8)BCFN(2+8,13 − 6)R = −2.4p = 0.853normal
(Low1/8)BCFN(2+9,13 − 7)R = +1.6p = 0.223normal
(Low1/8)BCFN(2+10,13 − 8)R = +3.1p = 0.096normal
(Low1/8)DC6-9x1Bytes-1R = −0.5p = 0.730normal
(Low1/8)Gap-16:!R = +0.0“pass”normal
(Low1/8)Gap-16:AR = −0.1p = 0.675normal
(Low1/8)Gap-16:BR = −1.7p = 0.888normal
Table 7. Comparison of our improved symmetric key encryption with other algorithms.
Table 7. Comparison of our improved symmetric key encryption with other algorithms.
AlgorithmKey SizeCorrelationEntropyArithmetic MeanPerformance Evaluation
Proposed 2 248 −0.0000027.999999127.50550.105
[14] Murillo-Escobar 2 128 −0.0021007.994500--
[21] Stoyanov 2015 2 100 0.0000017.999998127.49820.19
[37,38] AES-128 2 128 −0.0021007.954880127.52810.12

Share and Cite

MDPI and ACS Style

Stoyanov, B.; Nedzhibov, G. Symmetric Key Encryption Based on Rotation-Translation Equation. Symmetry 2020, 12, 73. https://doi.org/10.3390/sym12010073

AMA Style

Stoyanov B, Nedzhibov G. Symmetric Key Encryption Based on Rotation-Translation Equation. Symmetry. 2020; 12(1):73. https://doi.org/10.3390/sym12010073

Chicago/Turabian Style

Stoyanov, Borislav, and Gyurhan Nedzhibov. 2020. "Symmetric Key Encryption Based on Rotation-Translation Equation" Symmetry 12, no. 1: 73. https://doi.org/10.3390/sym12010073

APA Style

Stoyanov, B., & Nedzhibov, G. (2020). Symmetric Key Encryption Based on Rotation-Translation Equation. Symmetry, 12(1), 73. https://doi.org/10.3390/sym12010073

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop