Analysable Chaos-based Design Paradigms For Cryptographic Applications

Chaos-based cryptography has garnered significant attention, with many designs focusing on obscuring security through complex designs that make them difficult to analyze, improper design structures (ad-hoc designs) with inaccurate keyspace justification. These compromise the standards of well design...

Full description

Bibliographic Details
Main Author: Abba, Abubakar
Format: Thesis
Language:English
Published: 2024
Subjects:
Online Access:http://eprints.usm.my/62227/
http://eprints.usm.my/62227/1/ABUBAKAR%20ABBA%20-%20TESIS%20cut.pdf
_version_ 1848884924086484992
author Abba, Abubakar
author_facet Abba, Abubakar
author_sort Abba, Abubakar
building USM Institutional Repository
collection Online Access
description Chaos-based cryptography has garnered significant attention, with many designs focusing on obscuring security through complex designs that make them difficult to analyze, improper design structures (ad-hoc designs) with inaccurate keyspace justification. These compromise the standards of well designed, simple, and secure design principles in cryptographical design protocol and do not facilitate future cryptanalytic efforts. Moreover, to date, there have not been any chaos-based cryptosystems being implemented to secure real-world communications. This study proposes simple and analyzable paradigms based on well-established cryptographic principles (SPN and Feistel) to address these issues. First, an in-depth review is conducted on the current state-of-the-art in the field of chaos-based cryptographic algorithms to identify the challenges of various design and evaluation methods that have been developed over the years. A comprehensive analysis into a largely overlooked problem in chaos-based cryptosystems is conducted, highlighting their unusually large keyspaces. Multiple examples demonstrate instances of chaos-based ciphers overestimating keyspaces and reveal practical and theoretical challenges in key generation approaches. The study highlights recommendations and alternative solutions for utilizing secret keys in chaos-based cryptography. Then, a simple chaos-based key schedule that ensures the involvement of every bit of the secret key in the generation of round keys is proposed. The proposed key schedule successfully passed both the NIST and ENT statistical test suites, indicating that highly complex designs are unnecessary to achieve desirable security properties.
first_indexed 2025-11-15T19:14:26Z
format Thesis
id usm-62227
institution Universiti Sains Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T19:14:26Z
publishDate 2024
recordtype eprints
repository_type Digital Repository
spelling usm-622272025-05-15T03:04:14Z http://eprints.usm.my/62227/ Analysable Chaos-based Design Paradigms For Cryptographic Applications Abba, Abubakar QA75.5-76.95 Electronic computers. Computer science Chaos-based cryptography has garnered significant attention, with many designs focusing on obscuring security through complex designs that make them difficult to analyze, improper design structures (ad-hoc designs) with inaccurate keyspace justification. These compromise the standards of well designed, simple, and secure design principles in cryptographical design protocol and do not facilitate future cryptanalytic efforts. Moreover, to date, there have not been any chaos-based cryptosystems being implemented to secure real-world communications. This study proposes simple and analyzable paradigms based on well-established cryptographic principles (SPN and Feistel) to address these issues. First, an in-depth review is conducted on the current state-of-the-art in the field of chaos-based cryptographic algorithms to identify the challenges of various design and evaluation methods that have been developed over the years. A comprehensive analysis into a largely overlooked problem in chaos-based cryptosystems is conducted, highlighting their unusually large keyspaces. Multiple examples demonstrate instances of chaos-based ciphers overestimating keyspaces and reveal practical and theoretical challenges in key generation approaches. The study highlights recommendations and alternative solutions for utilizing secret keys in chaos-based cryptography. Then, a simple chaos-based key schedule that ensures the involvement of every bit of the secret key in the generation of round keys is proposed. The proposed key schedule successfully passed both the NIST and ENT statistical test suites, indicating that highly complex designs are unnecessary to achieve desirable security properties. 2024-07 Thesis NonPeerReviewed application/pdf en http://eprints.usm.my/62227/1/ABUBAKAR%20ABBA%20-%20TESIS%20cut.pdf Abba, Abubakar (2024) Analysable Chaos-based Design Paradigms For Cryptographic Applications. PhD thesis, Universiti Sains Malaysia.
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Abba, Abubakar
Analysable Chaos-based Design Paradigms For Cryptographic Applications
title Analysable Chaos-based Design Paradigms For Cryptographic Applications
title_full Analysable Chaos-based Design Paradigms For Cryptographic Applications
title_fullStr Analysable Chaos-based Design Paradigms For Cryptographic Applications
title_full_unstemmed Analysable Chaos-based Design Paradigms For Cryptographic Applications
title_short Analysable Chaos-based Design Paradigms For Cryptographic Applications
title_sort analysable chaos-based design paradigms for cryptographic applications
topic QA75.5-76.95 Electronic computers. Computer science
url http://eprints.usm.my/62227/
http://eprints.usm.my/62227/1/ABUBAKAR%20ABBA%20-%20TESIS%20cut.pdf