Next Article in Journal
On the Diversity-Based Weighting Method for Risk Assessment and Decision-Making about Natural Hazards
Previous Article in Journal
A New Dictionary Construction Based Multimodal Medical Image Fusion Framework
Article Menu
Issue 3 (March) cover image

Export Article

Open AccessArticle
Entropy 2019, 21(3), 268;

Implementing a Chaotic Cryptosystem by Performing Parallel Computing on Embedded Systems with Multiprocessors

UABC, Engineering, Architecture and Design Faculty, 22860 Ensenada, Mexico
ITE, Department of Electrical and Electronic Engineering, Ensenada Institute of Technology, 22780 Ensenada, Mexico
CBTIS, Industrial Technological and Services Baccalaureate Center, Mazatlan, Mexico
ITT, Department of Electrical and Electronic Engineering, Tijuana Institute of Technology, 22435 Tijuana, Mexico
INAOE, Department of Electronics, 72840 Puebla, Mexico
Author to whom correspondence should be addressed.
Received: 19 February 2019 / Revised: 4 March 2019 / Accepted: 5 March 2019 / Published: 9 March 2019
(This article belongs to the Section Multidisciplinary Applications)
Full-Text   |   PDF [2541 KB, uploaded 9 March 2019]   |  


Profiling and parallel computing techniques in a cluster of six embedded systems with multiprocessors are introduced herein to implement a chaotic cryptosystem for digital color images. The proposed encryption method is based on stream encryption using a pseudo-random number generator with high-precision arithmetic and data processing in parallel with collective communication. The profiling and parallel computing techniques allow discovery of the optimal number of processors that are necessary to improve the efficiency of the cryptosystem. That is, the processing speed improves the time for generating chaotic sequences and execution of the encryption algorithm. In addition, the high numerical precision reduces the digital degradation in a chaotic system and increases the security levels of the cryptosystem. The security analysis confirms that the proposed cryptosystem is secure and robust against different attacks that have been widely reported in the literature. Accordingly, we highlight that the proposed encryption method is potentially feasible to be implemented in practical applications, such as modern telecommunication devices employing multiprocessors, e.g., smart phones, tablets, and in any embedded system with multi-core hardware. View Full-Text
Keywords: cryptosystem; chaotic cryptography; embedded system; parallel computing; PRNG cryptosystem; chaotic cryptography; embedded system; parallel computing; PRNG

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Flores-Vergara, A.; Inzunza-González, E.; García-Guerrero, E.E.; López-Bonilla, O.R.; Rodríguez-Orozco, E.; Hernández-Ontiveros, J.M.; Cárdenas-Valdez, J.R.; Tlelo-Cuautle, E. Implementing a Chaotic Cryptosystem by Performing Parallel Computing on Embedded Systems with Multiprocessors. Entropy 2019, 21, 268.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top