1. Introduction
Dynamical systems with chaotic behavior describe many physical phenomena. Their particular application is cryptography based on the chaos theory, which uses these types of recurrences to keep data secure [
1,
2,
3]. This is possible due to the properties of chaotic maps, such as random-like behavior and sensitivity to changing initial conditions and, at the same time, the deterministic method of obtaining successive states. In chaotic cryptography, the values of the initial conditions and parameters are treated as secret keys.
The vast majority of scientific publications in the area of using chaos in cryptography focus on defining new algorithms that will be used to keep data secure based on the selected chaotic system. Many of these algorithms turn out to be ineffective or even dangerous [
4,
5,
6,
7,
8,
9]. On the other hand, sparse works have focused on dynamical systems, which are a significant part of the encryption process. Of course, new systems appear in the works mentioned above; however, they are often treated as additions to the algorithms.
Chaotic cryptography requires a dynamical system that is appropriate from its point of view. Such a system should be characterized, among others, by a large range of values of initial conditions and parameters for which chaos can be observed. In addition, the distribution of the iterated variable of such systems should be flat to make it impossible to perform statistical analysis.
In the professional literature, multi-dimensional chaotic dynamical systems, such as the Lorentz system [
10,
11], Henon map [
12], discrete memristor hyperchaotic maps [
13], two-dimensional sine logistic modulation map [
14], or memristive Rulkov neuron model [
15], have been used in chaotic cryptography. The use of such mappings increases the number of calculations to obtain the next state of the system, which results directly from their complicated structure [
16]. For this reason, one-dimensional mappings of the following form are often used for encryption:
where
is a given function.
Chaotic cryptography uses only chaotic systems. Therefore, it is necessary to determine whether the given system meets this condition. One of the measures determining whether the mapping of the form (
1) generates chaotic orbits is the Lyapunov exponent defined by the formula
The value of the Lyapunov exponent determines whether the obtained orbit is stable (
) or whether the trajectories starting from close initial conditions diverge after some time (
). It should be emphasized that condition
is only a necessary condition for chaos to occur. Another valuable feature of dynamical systems is the so-called invariant density, which from a practical point of view is the distribution of the iterated variable, which can be obtained by solving the Frobenius–Perron [
17,
18] equation. Both the Lyapunov exponent value and the invariant density are normally obtained numerically.
Examples of systems (
1) that are commonly used in recent years in chaotic cryptography are the logistic map [
1,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29], (skew or asymmetric) tent map [
19,
21,
25,
27,
30,
31,
32], or sinus map [
19,
25,
28,
33]. However, from a cryptographic point of view, the mentioned mappings have properties not entirely suitable for use in such applications [
34]. This is evidenced by, for example, the logistic map, which is the most frequently used dynamic system in the professional literature. For this reason, this article presents a new dynamical system characterized by chaotic behavior. Its properties are much better than in the case of the mappings mentioned above. In addition, this article analyzes, among other things, the Lyapunov exponent and the potential applications for data encryption of the presented system.
The main contributions and novelty of this article are (i) the development of a new dynamic system that can be used in chaotic cryptography, (ii) the presentation of a new image encryption algorithm, and (iii) the development of a simple S-box algorithm which is part of the encryption process.
This article is structured in the following order—the first part, the Introduction, outlines the topics. In
Section 2, some mappings often used in cryptography are shown.
Section 3, which is the Model section, shows the M-map equation.
Section 4 presents the analysis, which shows inter alia, fixed points, bifurcations, Lyapunov exponent, and the invariant density. Then, in
Section 5, a new image encryption algorithm with its analysis is shown. The last sections include the Conclusion and References.
2. One-Dimensional Mapping Used in Cryptography
In chaotic cryptography, one-dimensional mappings are particularly popular. The most frequently used dynamic systems of this type are presented below.
The logistic map is given by the following formula [
1,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29]:
where
. It is characterized, among others, by chaotic behavior for the value of the parameter
except for the so-called periodic windows. More about its analysis and possible modifications can be found, among others, in [
35,
36].
Equally often, in scientific publications on chaotic cryptography, the asymmetric tent map is used, which is given by the following formula [
19,
21,
25,
27,
30,
31,
32]:
where
. This mapping for each value of the
p parameter has a chaotic solution with a positive Lyapunov exponent.
Another mapping that is used in chaotic cryptography is the sine map, which can be defined by the following equation [
19,
25,
28,
33]:
where
. This system has very similar features to the logistic map.
The above list can be enriched with other one-dimensional dynamical systems, such as a Gauss map [
37,
38]. However, their values are not specified in the
interval; therefore, they are not taken into account in the comparative analysis in this article.
6. Conclusions
The article proposes a new dynamical system for cryptography applications based on the chaos theory. To confirm its usefulness, the analysis of fixed points, bifurcation, Lyapunov exponent, and invariant density was performed. The analysis shows that the so-called robust chaos characterizes the proposed dynamic system, i.e., there are no periodic windows. Moreover, both the Lyapunov exponent’s stable value and the iterated variable’s density suggest that this mapping can be used in chaotic cryptography applications. Additionally, the proposed mapping was compared with logistic, tent, and sine maps. The obtained results show its better features concerning other compared dynamical systems.
The article also introduces a new image encryption algorithm. It uses, among others, S-box, which is cyclically shifted and saves encrypted pixels in the cipher-image in the first free place from its beginning or end. However, it is required that the images be saved in RGB color format. The algorithm was tested on the images of Lena, Baboon, and Pepper, for which color histograms, and measures, entropy, and correlation analysis for the adjacent pixels are presented. These values are successively almost equal to the following: 8 for the entropy, 0 for the correlation of adjacent pixels, 100% for the , and 33% for the . The obtained values show that this simple algorithm can be used in practice to encrypt images.