† Corresponding author. E-mail:
Project supported by the National Natural Science Foundation of China (Grant Nos. 61161006 and 61573383), the Key Innovation Project of Graduate of Central South University (Grant No. 2018ZZTS009), and the Postdoctoral Innovative Talents Support Program (Grant No. BX20180386).
Chaotic encryption is one of hot topics in cryptography, which has received increasing attention. Among many encryption methods, chaotic map is employed as an important source of pseudo-random numbers (PRNS). Although the randomness and the butterfly effect of chaotic map make the generated sequence look very confused, its essence is still the deterministic behavior generated by a set of deterministic parameters. Therefore, the unceasing improved parameter estimation technology becomes one of potential threats for chaotic encryption, enhancing the attacking effect of the deciphering methods. In this paper, for better analyzing the cryptography, we focus on investigating the condition of chaotic maps to resist parameter estimation. An improved particle swarm optimization (IPSO) algorithm is introduced as the estimation method. Furthermore, a new piecewise principle is proposed for increasing estimation precision. Detailed experimental results demonstrate the effectiveness of the new estimation principle, and some new requirements are summarized for a secure chaotic encryption system.
Over the past twenty years, chaotic secure communication has attracted a lot of attention by the realization of chaotic synchronization.[1] It is widely emerged in engineering applications, such as signal processing,[2–4] speech encryption,[5,6] and image processing.[7–18] In fact, researches on information encryption technology have been studied for several decades, and some classical encryption technologies were proposed, namely the data encryption standard (DES) and the advance encryption standard (AES). However, these traditional encryption methods have some shortcomings, e.g., incapability treating special properties of multimedia data like strong correlation and high redundancy.[19] Especially in the field of image processing, both of the DES and the AES are not suitable for the image encryption.[20] Thus, chaotic encryption becomes a promising encryption technology.
Chaos is characterized in ergodicity, randomness, and initial value sensitivity, which make chaos theory very suitable for cryptography applications. Because the mixing and randomness of chaos are similar to the confusion and diffusion effects in cryptography, chaotic encryption method shows more potential over traditional methods.[21] Compared with continuous-time chaotic systems,[22] chaotic maps are utilized more frequently, featuring its simple structure, no need for solution algorithm and high complexity. Chaotic map is the basis of chaotic cryptography,[23] and it is divided into one-dimensional (1D) and higher-dimensional (HD) cases. For example, Wang et al.[11] proposed a row and column switch encryption algorithm based on the classical 1D logistic map. Chenaghlu et al.[12] introduced a polynomial combination of 1D chaotic maps in a dynamic image encryption algorithm. To counteract the dynamics degradation of chaotic map in a digital computer as shown in Ref. [24], various enhancing methods for two and higher-dimensional chaotic maps were proposed: two-dimensional (2D) logistic map,[13] three-dimensional (3D) cat map,[14] and hyperchaotic maps[15–18] like 2D sine logistic modulation map (2D-SLMM),[15] 2D-logistic-adjusted-sine map (2D-LASM),[16] 2D sine ICMIC modulation map (2D-SIMM),[17] and 2D logistic ICMIC cascade map (2D-LICM).[18] According to the Kirchhoff criterion: the confidentiality of the system does not depend on the encryption system or the algorithm, but only depend on the key. Hence the parameter estimation technology may become one of threats for chaotic encryption due to its ability to accurately estimate parameters (initial values and system parameters). In contrast, only the equivalent version of PRNS of length as that of known plaintext is recovered in the conventional cryptanalysis methods as shown in Ref. [25]. Therefore, the study of parameter estimation can help people better analyze the chaotic encryption.
Recently, the topics of parameter estimation for chaotic system attracts more and more attention. The meta-heuristic algorithm is one of effective estimation methods,[26–33] featuring good robustness and easy implementation. It converts parameter estimation into an optimization problem, and the prior knowledge only takes some pseudo-random sequences generated by chaotic system as the samples. However, because the discrete-time chaotic system has more complex behavior, most of researches on parameter estimation are just limited to estimate the system parameters in continuous-time chaotic system.[26–32] Lately, Du et al.[33] successfully identified six continuous-time chaotic systems with unknown initial values and system parameters by a variant differential evolution algorithm. After that, Peng et al.[34] investigated the effect of samples on parameter estimation and proposed the IPSO algorithm to estimate parameters of chaotic maps. Simulations demonstrate the better performance of IPSO over other five meta-heuristic algorithms. These studies motivate us to thinking about a new problem: If the initial values and system parameters can be estimated, the secrete key of the chaotic map will be decoded. Therefore, it is interesting to investigate what kind of chaotic map can resist the parameter estimation attack. In addition, because the number of estimated parameters has great influence on estimation results,[34] the precision of traditional estimation principle,[32] i.e., simultaneous estimation of initial values and system parameters, is not high enough. Therefore, we try to propose a new piecewise estimation principle to solve this problem.
The rest of the present article is organized as follows. In Section
The traditional parameter estimation for chaotic map is regarded as a multi-dimensional optimization problem. Its principle is illustrated in Fig.
The original chaotic map is described as
Then the estimated system is described by
As shown in Fig.
To solve this problem, a new piecewise estimation principle is proposed. The new principle is illustrated in Fig. In fact, the initial values synchronization of the original system and the estimated system is not a necessary process.[29] Figure Based on the accurately estimation of system parameters, then the initial values are estimated.
The new estimation principle corresponds to the piecewise structure of the original principle, and it reduces the difficulty of estimation problem by reducing the considered dimensions.
The IPSO algorithm separates into the basic PSO algorithm and a special inertia weight. It is specially designed for parameter estimation of chaotic map. Its structure is simple, and the running speed is almost the same as that of the basic PSO algorithm.
The PSO algorithm is a well-known meta-heuristic algorithm, which originates the wisdom of bird group.[35] The algorithm describes a process which some particles simulate bird flight in search of food (optimal solution). Each particle represents a bird, and they are initialized with random positions. In each algorithm iteration, particles keep track of its own current optimal and the current population optimal positions to update its velocity, until the optimal solution is found or the termination condition is met. The velocity of particle i
The PSO algorithm is divided into global search process and local search process. The global search process refers to the capability of finding the global optimal solution, while the local search process refers to the capability of applying the previous knowledge to find a better solution. The two processes are contradict each other, and the inertia weight ω is the key to balance them. So, the ω must be set reasonably to achieve better performance.
In the basic PSO algorithm, inertia weight linearly decreases with increasing iterations. It has been proved that it is not suitable for parameter estimation of chaotic maps,[33] so the special inertia weight in IPSO algorithm is set as
The implementation steps of the IPSO algorithm are illustrated in Algorithm
In this section, numerical simulations are carried out in six different chaotic maps, including 2D-logistic map,[13] 2D-LASM,[16] logistic–logistic (LL) map,[36] 2D-SLMM,[15] Chebyshev map (2D),[37] and 2D-LICM.[18] The parameter settings and their corresponding chaotic attractors of these six maps are presented in Table
To eliminate the randomness of algorithm and compare the security of chaotic maps, we performed 100 consecutive algorithm runs for each chaotic map. If the error between the final estimation result and the original parameter is less than 1 × 10−6, then the estimation is considered to be successful. Here, the success rate is calculated by
Parameter estimation results of traditional principle are presented in Table
From the above results, it is concluded that: For the traditional estimation principle, if the chaotic map has more than three estimated parameters (including system parameters and initial values) and its LE is larger than that of LL map (1.0973), it is difficult for the general meta-heuristic algorithm to estimate its parameters accurately. Furthermore, the results also demonstrate the conclusions in Ref. [34], i.e., both of the number of estimated parameters and the system complexity affect the estimation precision, and the influence of the estimated number is larger than that of the system complexity.
Parameter estimation results of the new principle are presented in Table
From these results, the conclusions are summarized as: The new principle is more effective than the traditional principle. Based on the new principle, only the 2D-LICM can resist parameter estimation attack. Increasing the number of estimated parameters and LE of chaotic systems is an effective means to increase the resistance to parameter estimation attack, and the influence of the number of estimated parameters is greater than that of LE. In addition, because of the special sensitivity of the initial value for chaotic system, it is more difficult to estimate the initial values than to estimate the system parameters.
Noise is an unavoidable factor in practical applications. Therefore, the parameter estimation of new principle with the the interference of additive white Gaussian noise (AWGN) is considered in this section. In the field of communication, AWGN refers to a kind of noise signal whose spectrum components obey uniform distribution (i.e., white noise) and whose amplitude obeys Gaussian distribution. The noise intensity increases with the decrease of signal-to-noise ratio (SNR).
Here, due to the interference of random noise, it is considered that the estimation is successful if the error is no more than 1 × 10−3. Because the 2D-LICM cannot be estimated accurately by the IPSO algorithm, it is not considered in the simulation of this section. Results of step 1 in new estimation principle are presented in Table
As it is shown, the system parameters of 2D-logistic map and 2D-LASM can still be accurately estimated when the SNR of signal channel reaches 40 dB, but the remaining three maps can only be accurately estimated when the SNR is 50 dB. Results of step 2 are demonstrated in Table
It is concluded that: Under the interference of AWGN, although the estimation precision decreases a lot, most of the chaotic maps are still estimated accurately under the signal with 50-dB SNR. The conclusion in the previous noise-free simulation is valid, that is, chaotic systems with more estimated parameters and larger LE are more difficult to be accurately estimated, and the number of estimated parameters is more influential.
In this paper, we focus on the dynamics analysis of encryption by chaotic maps, and summarized some new requirements for the secure chaotic encryption system. The IPSO algorithm is introduced for parameter estimation of chaotic maps, and a new piecewise estimation principle is proposed. Numerical simulations were carried out in six different chaotic maps with unknown system parameters and initial values, and the results lead to the following conclusions.
(i) The design of chaotic maps with more estimated parameters and larger LE is more effective against the estimation attack. From the results in this paper, it is more important to increase the number of system parameters and initial values (the component of secrete key) than to enhance the LE of the chaotic system.
(ii) The new piecewise parameter estimation principle is more effective than the traditional one.
(iii) In our simulations, utilizing the 2D-LICM (4 estimated parameters and LE: 2.4135) for chaotic encryption is the relatively secure method.
(v) Estimating initial values are more difficult than estimating system parameters.
In the simulations, some practical factors are considered, including unknown system parameters, unknown initial values, and noise interference. These simulations were therefore theoretically constitute a possibility of anti-chaotic encryption. In the future, more powerful meta-heuristic algorithms may be proposed by the efforts of researchers, so how to construct a chaotic system with both simple structure and high complexity is a problem worthy of continuously concerned. What is more important is that the introduced approach may be a useful tool for the cryptanalysis and the synchronization of chaotic maps. Our next work is to use this method in the applications of chaotic secure communication.