Next Article in Journal
Radial Basis Function (RBF) and Multilayer Perceptron (MLP) Comparative Analysis on Building Renovation Cost Estimation: The Case of Greece
Previous Article in Journal
Detection and Reconstruction of Bursting Oscillations in Complex Systems Using the HAVOK Analysis Framework
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials

1
School of Big Data, Zhuhai College of Science and Technology, Zhuhai 519041, China
2
Department of Industrial Electronics, University of Minho, 4800-058 Guimaraes, Portugal
3
School of Computer Science, Zhuhai College of Science and Technology, Zhuhai 519041, China
*
Authors to whom correspondence should be addressed.
Algorithms 2024, 17(9), 389; https://doi.org/10.3390/a17090389
Submission received: 25 July 2024 / Revised: 28 August 2024 / Accepted: 29 August 2024 / Published: 2 September 2024

Abstract

:
Due to the similar characteristics of chaotic systems and cryptography, public key encryption algorithms based on chaotic systems are worth in-depth research and have high value for the future. Chebyshev polynomials have good properties and are often used in the design of public key algorithms. This paper improves the Bose Multi-Chaotic Public Key Cryptographic Algorithm (BMPKC) by applying Chebyshev polynomials. The proposed algorithm (CMPKC- k i ) introduces the selective coefficient k i based on the properties of Chebyshev polynomials, allowing the special functions that need to be negotiated in the original system to be freely and randomly chosen as Chebyshev polynomials, and can also be expanded to m levels. The improved cryptographic algorithm also utilizes chaotic hash functions and logistic mapping to generate pseudo-random sequences and overcomes shortcomings of the Bose algorithm by iteratively iterating the selected Chebyshev polynomials based on the number of 0s or 1s in the pseudo-random sequence, thus providing better security. Analysis and software testing results indicate that this algorithm has strong robustness against brute force attacks, achieving a higher attack time for breaking the private key compared to the CEPKC, BMPKC, and CMPKC algorithms. Compared to the CMPKC algorithm, our proposal algorithm achieves better performance in the encryption and decryption phases. Furthermore, we combine this Multi-Chaotic System Key Exchange Protocol with the Advanced Encryption Standard (AES) algorithm, while providing a demonstration, offering more possibilities for practical applications of this system.

1. Introduction

With the advent of cloud computing, the Internet of Things, the mobile internet, and the big data era, security threats brought by the deployment of new technologies are constantly expanding, and designing new high-performance encryption schemes has become an important problem to be urgently solved. Compared with traditional encryption systems, chaotic public key cryptography has higher security, better resistance to attacks, a longer validity period, and more application areas [1,2]. As a new direction in the field of public key cryptography research, it is still in the initial stage and has very important exploratory value.
Cryptography is a very active research field, with traditional ciphers mainly including DES, AES, RSA, and other algorithms [3]. In recent years, new ideas have stimulated many new forms of cipher systems, primarily including quantum cryptography [4], visual cryptography [5], biometric cryptography [6], DNA cryptography [7], homomorphic cryptography [8], attribute-based encryption [9], and Post-Quantum Cryptography [10,11].
Chaos theory is considered the third revolution in physics in the 20th century, following relativity and quantum mechanics. It is the seemingly random behavior generated by deterministic systems. It has extreme sensitivity to initial conditions and parameters, and long-term unpredictability, which conforms to some characteristics of cryptography, opening a new field of research in chaotic cryptography. In 1949, Shannon [12] pointed out the confusion and diffusion principles in cipher design, which correspond precisely to the pseudo-randomness and sensitivity to initial conditions of chaotic systems: the ergodicity and topological mixing of chaotic systems correspond to the confusion properties of ciphers; on the other hand, the extreme sensitivity of chaotic systems to initial conditions and control parameters corresponds to the diffusion properties of ciphers. Diffusion can create an avalanche effect, producing completely different outputs from tiny changes to the initial input. This suggests that chaos can be applied to the field of cryptography. Alvarez et al. [13] summarized some relationships between chaotic systems and cryptography. Chaotic cryptography theory emerged in the mathematics and physics fields in the early 1960s, and it is known as one of the three major scientific revolutions of the 20th century along with quantum theory and relativity. In 1989, Matthews proposed the chaotic cipher algorithm, which provided a chaotic sequence cipher scheme based on modified logistic mappings [14]. In particular, Pecora and Carroll published an article on chaotic synchronized secure communication in 1990 [15], sparking a research wave in chaotic cryptography. At the same time, analysis of chaotic cipher systems has also been carried out, proving the insecurity of some chaotic cipher systems and proposing improvement measures. In recent years, significant progress has been obtained in the research of chaotic cryptography [16,17,18,19,20,21], but there are still some challenging problems to be solved, such as the problem of finite precision digitization of chaotic systems, the security and efficiency of chaotic cipher design, etc. Therefore, compared with traditional cryptography, the development of chaotic cryptography is still not mature and perfect, lacking sufficient persuasiveness. On the other hand, compared with symmetric cryptography, the study of chaotic public key cryptography is relatively weak. Designing public key cryptographic systems based on chaotic systems is a new scientific exploration attempt, which has important research value and significance.

1.1. Trend

Currently, traditional public key encryption algorithms may have some potential issues, such as the threat of quantum computing, increasing key length requirements, and having specific algorithmic characteristics that are vulnerable to targeted attacks. Although the capability of chaotic cryptography to resist quantum computing is still under research, it offers a new approach that is different from traditional public key encryption. Chaotic encryption algorithms can provide more efficient computational performance than traditional public key algorithms, especially in resource-constrained environments such as IoT devices. Certain characteristics of chaotic systems allow for the design of lightweight encryption schemes, thereby saving computational and energy resources. Therefore, it is necessary to find new practical public key cryptographic algorithms as a supplement or replacement to current public key cryptographic algorithms. Table 1 lists the development of chaotic public key cryptography in chronological order, with people attempting to design public key cryptographic algorithms using cellular automata, chaotic iterative structures, distributed dynamical systems, multi-chaos systems, Chebyshev polynomials, torus automorphisms, etc. However, there are security flaws or low efficiency problems in all of them, which is why chaotic public key cryptography cannot match traditional public key cryptography. As a new direction in the field of public key cryptography research, chaotic public key cryptography is still in its early stages and has very important exploratory value.
According to Table 1, the development of chaotic public key cryptography, especially the Chebyshev-based public key cryptography discussed in this paper, can be roughly divided into three time periods, as shown in Figure 1.
  • In the embryonic stage, researchers started to explore the design of public key cryptography algorithms using different chaotic systems, such as cellular automata, distributed dynamical system models, Chebyshev chaotic mappings, chaotic synchronization systems, etc.
  • In the development stage, more attention was paid to the security of chaotic public key cryptography algorithms, especially the analysis and improvement of Chebyshev-based public key cryptography algorithms, to achieve higher security and efficiency.
  • In the expansion stage, chaotic public key cryptography algorithms were extended to other aspects of cryptography, such as identity-based public key encryption schemes, key exchange protocols, digital signature schemes, provable security, etc.
In the early schemes of chaotic public key cryptography, Puhua proposed a chaotic public key algorithm based on cellular automata, which was not practical due to its limitations [22]. Tenny et al. proposed a distributed dynamical model chaotic synchronization public key encryption scheme [40], but it did not adhere to the principle of “all secrets are embedded in the keys” and had potential vulnerabilities against digital attacks. Subsequently, Bose proposed a public key cryptography algorithm based on multiple chaotic systems [27], but it also suffered from security and efficiency issues. Public key cryptography based on multiple chaotic systems and Chebyshev polynomials remains of high value in chaotic public key cryptography research and is the focus of this project. Currently, Kumar et al. has further extended Chebyshev-based public key cryptography and proposed new encryption schemes [41], Islam has proposed new identity-based encryption and signature schemes [33], and Hong Lai et al. has proposed a three-party key exchange protocol based on Chebyshev polynomials and proved its security in the standard model, driving the advancement of chaotic public key cryptography theoretical research [34]. Chatterjee et al. proposed a new multi-server authentication scheme based on Chebyshev chaotic mappings, which is low in computation and communication costs and has been widely cited by scholars [42]. Attaullah et al. proposed a new cryptographic technique based on improved Chebyshev mapping and verified the effectiveness of the expected algorithm [43]. Louzzani et al. proposed a new chaotic Chebyshev polynomial-generating function and applied it to image encryption with good resistance against various attacks [44]. In recent years, chaotic public key cryptography has achieved some new research results [45,46,47,48].

1.2. Contribution

Our approach includes evaluating and discussing several modified Chebyshev public key cryptographic algorithms and understanding their performance and security compared to our proposed algorithm. Specifically, in our proposed improved chaotic multiple public key cryptographic algorithm based on Chebyshev polynomials (CMPKC- k i ), we aim to design a multiple chaotic public key algorithm using Chebyshev polynomials. The algorithm introduces the concept of selective coefficient k i based on the properties of Chebyshev polynomials, allowing the original system’s special functions f 1 ( x ) and f 2 ( x ) that need to be negotiated to be freely chosen as Chebyshev polynomials f k α ( x ) and f k β ( x ) , where the selection of k α and k β is randomly determined by k i and can also be extended to m levels. The improved cryptographic algorithm also utilizes chaotic hash functions and logistic mapping to generate pseudo-random sequences and overcomes the four shortcomings of the Bose algorithm by iteratively iterating f k α ( x ) and f k β ( x ) based on the number of 0s or 1s in the pseudo-random sequence, thus providing better security. Analysis and experimental results show that the algorithm has strong robustness against common attacks, achieving a higher attack time to break private keys compared to other variants, proving the algorithm’s security against such attacks. Compared to other similar variants of Chebyshev polynomial public key algorithms, our proposal achieves better performance in the encryption and decryption stages. Furthermore, we combine this multiple chaotic system key exchange protocol with the Advanced Encryption Standard (AES) algorithm and provide a demonstrative example.

1.3. Organization

The remainder of this paper is organized as follows: Section 2 focuses on demonstrating Chebyshev chaotic mapping, the CEPKC algorithm, and the corresponding research work performed to upgrade and improve public key encryption schemes using the Chebyshev system. Then, we improved a public key encryption algorithm and provide related examples and flowcharts in Section 3. Section 4 emphasizes the software implementation and example verification of the proposed method, while Section 5 presents the performance, analysis, and discussion of the method in terms of security. Finally, Section 6 summarizes this paper and proposes future directions for work.

2. Preliminary

2.1. Chebyshev Chaotic Mapping

Definition 1.
Let  n  be a positive integer,  x [ 1,1 ] , and the  n  order Chebyshev polynomial  T n ( x ) : [ 1,1 ] [ 1,1 ]  is defined as:
T n ( x ) = cos ( n · arccos ( x ) )
T n ( x )  can also be defined using the following recursive relation:
T n ( x ) = 2 x T n 1 ( x ) T n 1 ( x ) , n 2
where in T 0 ( x ) = 1 , T 1 ( x ) = x . from Equation (2), it can be observed that the first n terms of the Chebyshev polynomial are:
T 2 ( x ) = 2 x 2 1 , T 3 ( x ) = 4 x 3 3 x , T 4 ( x ) = 8 x 4 8 x 2 + 1 ,
Chebyshev polynomials possess two important properties: the semi-group property and the chaotic property [49].

2.1.1. Semi-Group Property

T r ( T s ( x ) ) = cos ( r cos 1 ( cos ( s cos 1 ( x ) ) ) ) = cos ( r s cos 1 ( x ) ) = T s r ( x ) = T s ( T r ( x ) ) , where r and s are positive integers and x [ 1,1 ] . To utilize the properties of Chebyshev polynomials in the subsequent context, it is necessary to generalize their properties.
Theorem 1.
Chebyshev polynomials satisfy the semi-group property everywhere in the interval  ( ,   + ) , i.e.,
T r ( T s ( x ) ) = T r s ( x ) = T s ( T r ( x ) )

2.1.2. Chaotic Property

The Chebyshev map is a one-dimensional chaotic map with favorable nonlinear dynamic properties. Chaos occurs when the control parameter μ is greater than 1. When greater than 2, the map remains in a chaotic state. Figure 2 shows the bifurcation diagram of the Chebyshev map. Figure 3 shows the bifurcation diagram of the improved Chebyshev chaotic map x n + 1 = a · ( 1 2 x n 2 ) .

2.1.3. Lyapunov Exponent

The Lyapunov exponent is an important indicator of the dynamic behavior of nonlinear systems. In this section, the Lyapunov exponent (LE) is further used to analyze the predictability of the Chebyshev chaotic system. When n > 1 , the Chebyshev polynomial has an invariant density distribution of f * ( x ) = 1 π 1 x 2 and a positive Lyapunov exponent of λ = ln n > 0 , indicating its chaotic property. Figure 4 shows the Lyapunov Exponent of the Chebyshev Map.

2.1.4. Information Entropy

Information entropy is usually used to measure the uncertainty of a variable. The greater the uncertainty of variables, the higher the information entropy, which is defined as H ( x ) = i = 0 L 1 p ( x i ) log 1 p ( x i ) , where X = x i x i [ 0,255 ] , p x i is the probability of x i and L = 256 for grayscale images. The maximum value of information entropy is 8 for grayscale images.
Figure 5 shows the information entropy diagrams of the Chebyshev chaotic maps. It can be seen that the entropy values of the output sequence generated by the Chebyshev map stabilize within a good range when μ > 2 , indicating that the Chebyshev map exhibits a high degree of unpredictability.

2.2. Chebyshev-ElGamal Public Key Cryptographic Algorithm (CEPKC)

In [50], Kocarev et al. utilized the semi-group properties and chaotic characteristics of Chebyshev chaotic mapping to propose a Chebyshev polynomial-based ElGamal-like public key cryptography algorithm, with the ElGamal public key cryptography algorithm as a blueprint. This algorithm does not require the generation of large prime numbers as private keys, and has high computational efficiency. In the algorithm, r and s are large random integers, and x [ 1,1 ] . Due to the chaotic characteristics, s and T s x can be seen as independent random numbers. However, the inverse operation of the trigonometric function definition in the Chebyshev chaotic mapping leads to the ciphertext information being c = ( c 1 , c 2 ) = ( T r ( x ) , T s ( x ) ) , from which an adversary can compute:
r = r o u n d m i n k Z ± arccos ( T r ( x ) ) + 2 k π arccos x ,
as T r s ( x ) = T s r ( x ) = T s ( T r ( x ) ) = T s ( T r ( x ) ) = T s r ( x ) = T r ( T s ( x ) ) and the adversary can recover the plaintext m = c 2 · ( T r ( T s ( x ) ) ) 1 . Similarly, the adversary can compute s using Equation (4) to steal Bob’s equivalent private key. To enhance security, Kocarev et al. extended the definition of Chebyshev polynomials from the real field to the finite field ( Z N , + , × ) , as shown below:
T n ( x ) = ( 2 x T n 1 ( x ) T n 2 ( x ) ) ( mod N ) ,
where n 2 and N is a large prime number. It can be proven that the semi-group properties of Chebyshev polynomials still hold in the finite field Z N . Since T n ( x ) is an algebraic expression, Equation (6) holds.
T n ( x ) ( mod N ) = T n ( ( x ( mod N ) ) ) ( mod N ) .
Therefore, the semi-group expression of Chebyshev polynomials in the finite field can be derived, as shown in Equation (7).
T r ( T s ( x ) ) ( mod N ) = T s r ( x ) ( mod N ) = T s ( T r ( x ) ) ( mod N ) .
For any Chebyshev polynomial T n ( x ) in the finite field Z N , it can also be represented as:
T n ( x ) = ( a n x n + a n 1 x n 1 + + a 1 x + a 0 ) ( mod N ) .
At the current stage, no inverse function expression for finite field Chebyshev polynomials has been found.

2.2.1. CEPKC Algorithm

Assuming Alice is the sender and Bob is the receiver, the communication process of the ElGamal-type public key algorithm based on finite field Chebyshev polynomials (CEPKC) proposed by Kocarev et al. [51] is as follows:
  • Key generation. Bob randomly generates a large prime number N , chooses positive integers x and s , such that x < N , s < N , and computes y = T s ( x ) mod N . Bob’s public key is ( x , N , y ) , and the private key is s .
  • Message encryption. After receiving Bob’s public key ( x , N , y ) , Alice converts the message to be encrypted into an integer m ( 1 < m < N ) . She chooses a random number r , such that 0 < r < N . Using the public key ( x , N , y ) , she calculates c 1 = T r ( x ) ( mod N ) and c 2 = ( m · T r ( y ) ) ( mod N ) then sends the ciphertext message c = ( c 1 , c 2 ) to Bob.
  • Message decryption. Upon receiving the ciphertext message c , Bob can decrypt it using the private key s to recover the plaintext message m = ( c 2 · T s ( c 1 ) 1 ) ( mod N ) .

2.2.2. Parameter Selection in the Algorithm

The selection of parameters is crucial to ensure the security of the CEPKC public key cryptographic algorithm, and the following principles [25,52] are mainly considered:
  • Selection of parameter N : If N is a prime number, it is desirable to make N + 1 or N 1 have no factors other than 2, in which case N is called a strong prime; if N is a composite number, N = Π i = 1 φ p i k i , where p i is a prime number and it is preferable to have p i as a strong prime, ideally φ 3 . When properly chosen, the probability of small cycles occurring is minimized.
  • Principles for selecting parameter x : For the above prime number N , x is a parameter for the seed of T n ( x ) . Randomly choose an integer x Z N * , where Z N * denotes the group on Z N , with x 1 . If N + 1 = Π i = 1 φ p i k i , where p i is a prime number, i ( 1 , φ ) , let n = N + 1 p i and compute T n ( x ) . If T n ( x ) = 1 and p i 2 , restart. Repeat until the desired parameter x is obtained. When N and x are appropriately chosen, the probability of small cycles is minimized, and the security of the finite field CEPKC encryption scheme can be effectively enhanced.

2.3. Bose Multi-Chaotic Public Key Algorithm (BMPKC)

A public key encryption algorithm based on the multi-chaos system ( m ~ -CS) [27] is divided into the following basic steps. For ease of reading, let us assume m ~   = 2, so m ~ -CS is C-CS (a couple of chaotic systems) in this case. Assume there are two different one-dimensional chaotic maps F 1 ( x 1 , p 1 ) and F 2 ( x 2 , p 2 ) , such that x 1 ( i + 1 ) = F 1 ( x 1 ( i ) , p 1 ) ,   x 2 ( i + 1 ) = F 2 ( x 2 ( i ) , p 2 ) , where p 1 , p 2 are control parameters, x 1 ( 0 ) , x 2 ( 0 ) are initial conditions, and { x 1 ( i ) } , { x 2 ( i ) } denote the two chaotic orbits.
Step 1. Alice and Bob determine the linear transformations f 1 ( x ) and f 2 ( x ) , chaotic mappings F 1 ( x 1 ,   p 1 ) and F 2 ( x 2 ,   p 2 ) , and initial vector x 0 through public negotiation x 1 ( i + 1 ) = F 1 ( x 1 ( i ) , p 1 ) , x 2 ( i + 1 ) = F 2 ( x 2 ( i ) , p 2 ) , where p 1 , p 2 are control parameters, x 1 0 , x 2 ( 0 ) are initial conditions, and { x 1 ( i ) , x 2 ( i ) } denote the two chaotic orbits.
Step 2. Alice randomly selects key seeds s A 1 and s A 2 and a large number n A [ 0 ,   N ] , inputs these parameters into a pseudo-random sequence generator, outputs a { 0 ,   1 } sequence k i A of length n A , iterates x 0 for n A times based on the content of k i A to obtain x n A , and passes x n A as the public key to Bob, x i = h ( x i 1 ,   k i ) ,
h 2 ( x ,   k ) = f 1 ( x )     i f   k = 0 ,   f 2 ( x )     i f   k = 1 .
k i is the defined pseudo-random sequence k i = g ( x 1 ( i ) , x 2 ( i ) ) , where
g x 1 i ,   x 2 i = 1 ,                                                     i f   x 1 > x 2 ,   n o   o u t p u t ,   i f   x 1 = x 2 ,   0 ,                                                     i f   x 1 < x 2 .
Step 3. Similarly, Bob secretly selects key seeds s B 1 and s B 2 and a large number n B [ 0 ,   N ] , inputs these parameters into a pseudo-random sequence generator, outputs a { 0 ,   1 } sequence k i B of length n B , iterates x 0 for n B times based on the content of k i B to obtain x n B , and passes x n B as the public key to Alice.
Step 4. Alice iterates x n B for n A times based on k i A to obtain x n B + n A .
Step 5. Bob iterates x n A for n B times based on k i B to obtain x n A + n B .
Since f 1 ( x ) and f 2 ( x ) are both linear transformations, and f 1 f 2 = f 2 f 1 , we have
x n B + n A = f 1 n A 1 f 2 n A 2 ( x n B ) = f 1 n A 1 f 2 n A 2 f 1 n B 1 f 2 n B 2 ( x 0 ) = f 1 n A 1 + n B 1 f 2 n A 2 + n B 2 ( x 0 ) ,
where n A 1 , n A 2 , n B 1 , n B 2 are the numbers of 0s and 1s in k i A and k i B . Obviously, n A 1 + n A 2 = n A , n B 1 + n B 2 = n B . Similarly, x n A + n B = f 1 n A 1 + n B 1 f 2 n A 2 + n B 2 ( x 0 ) , so x n A + n B = x n B + n A , which is used as the actual key.
The process of the algorithm is shown in Figure 6.
Similarly, by extending the function h 2 ( x ,   k ) in the algorithm to m ~ times h m ~ ( x ,   k ) , the linear function count becomes m ~ and the corresponding selection functions are
h m ~ ( x ,   k ) = f 1 ( x ) i f   k = 1 ,   f 2 ( x ) i f   k = 2 , f m ~ ( x ) i f   k = m ~ .
The choice of K is given by the defined pseudo-random sequence k i = g ( x 1 ( i ) , x 2 ( i ) , , x m ~ ( i ) ) , where g ( x 1 ( i ) , x 2 ( i ) , , x m ~ ( i ) ) follows the conditions described in Equation (13).
g ( x 1 ( i ) , x 2 ( i ) , , x m ~ ( i ) ) = 1 ,   i f   x 1 > x 2 ,   x 1 > x 3 ,   , x 1 > x m ~ ,   2 ,   i f   x 2 > x 1 ,   x 2 > x 3 ,   , x 2 > x m ~ ,   r ,   i f   x r > x 1 ,   x r > x 2 ,   , x r > x m ~ ,     m ~ ,       i f   x m ~ > x 1 ,   x m ~ > x 2 ,   , x m ~ > x m ~ 1 .

2.4. Multi-Chaotic Public Key Cryptographic Algorithm Based on Chebyshev Polynomials

In [27], Bose proposes a specific design case, where the key point of the algorithm lies in both f 1 ( x ) and f 2 ( x ) being linear transformations and satisfying f 1 f 2 = f 2 f 1 . In fact, f 1 ( x ) and f 2 ( x ) do not need to be strictly linear transformations, so the commutative property becomes particularly important. The semi-group property of Chebyshev polynomials happens to satisfy this property.
To avoid attacks based on the 2-norm as presented by Wang et al. [53], Su et al. propose a multi-chaos public key algorithm based on Chebyshev polynomials (CMPKC). The key exchange step of this algorithm is like Bose’s multi-chaos public key algorithm, as shown in Figure 7 for m ~ = 2.
It is easy to see that the basic ideas of these two algorithms are consistent, with the difference being that the former involves Alice and Bob publicly negotiating m ~ linear functions f 1 ( x ) , f 2 ( x ) , , f m ~ ( x ) that satisfy the commutative property, while the latter involves Alice and Bob publicly negotiating m ~ choice functions f 1 ( x ) , f 2 ( x ) , , f m ~ ( x ) as Chebyshev polynomials with mutually prime degrees. Since Chebyshev polynomials have the semi-group property, they still satisfy the requirements of a public key encryption scheme. At this point, x i = h ( x i 1 ,   k i ) .
h m ~ ( x ,   k ) = f 1 ( x ) ( mod N ) i f   k = 1 ,   f 2 ( x ) ( mod N ) i f   k = 2 ,   f m ~ ( x ) ( mod N ) i f   k = m ~ .

2.5. Security Analysis of the Algorithm Above

The Bose algorithm (RMPKC) combines the Diffie–Hellman protocol framework. The authors of Reference [53] point out that attacking this algorithm is equivalent to solving the Diffie–Hellman problem, and the difficulty is ( N P ) m ~ , where N and P represent the key space size and the complexity of the linear transformation, respectively. However, the algorithm still has the following shortcomings [28]:
Let C be a complex field, and C n be the n -dimensional vector space of C . At this point, the linear transformation f 1 x ,     f 2 ( x ) can be represented as f 1 ( x ) = x · L , f 2 ( x ) = x · R . Since f 1 f 2 = f 2 f 1 , this means that L R = R L ; therefore,
x n A = x 0 · L n A 1 R n A 2 .
  • If f 1 ( x ) and f 2 ( x ) are linear transformations on the vector space C n , it is difficult to choose suitable linear transformations f 1 and f 2 , since f 1 f 2 = f 2 f 1 does not hold in this space.
  • Let A be any norm of A , if L < 1 and R < 1 , when n A 1 and n A 2 are two large integers, the statistical characteristics of the n -tuple vector x n A are poor. In fact, in the instances given by Bose, despite x 0 being secret, there are still potential security issues, such as when k > 1 and n 8 , k n 8 ; when k < 1 and n 8 , k n 0 . This requires that n A cannot be a large integer, otherwise the statistical characteristics of the public key will be compromised.
  • Although it is difficult for an attacker to infer the specific operational steps from the seed x 0 to the public key x n A , they can still calculate n A 1 n A 2 by conducting single-bit tests on Alice’s pseudo-random sequence generator. Letting n 0 , n 1 denote the number of 0s and 1s in an arbitrary bit sequence of length n , the statistic is
    X = ( n 0 n 1 ) 2 n .
This approximately follows a χ 2 distribution with 1 degree of freedom, so P ( X < 3.8415 ) > 0.5 and n A 1 n A 2 < 3.8415 n A . Let s = n A , then n A i 0.5 n A < 3.8415 n A / 2 < s , i 1 , 2 . Furthermore, based on Equation (15), we have
x n A = x 0 · ( L R ) 0.5 n A L ξ R ζ ,
where ξ = n A 1 0.5 n A , ζ = n A 2 0.5 n A , such that ξ , ζ 0 , ± 1 , , ± s .
We can see that the algorithm provides three design parameters: the size N of the key, the computational complexity P of linear functions, and the number m ~ of linear functions. By analyzing the properties of the m ~ -CS pseudo-random sequence generator, we deduce that the computational degree of the algorithm is ( N P / m ~ ) m ~ , which is lower than ( N P ) m ~ . In fact, the attacker can be computed as
x i ,   i 1 ,   , i m ~ = f 1 i + i 0 f 2 i + i 1 f m ~ i + i m ~ 1 ( x 0 ) ,
where i 1 , 2 , , n A / m ~ , i k 0 , 1 ( k = 1 , 2 , , N ) .
Based on x n A x i ,   i 1 ,   , i m ~ , the computational complexity of breaking the private key n A can be calculated as
C b r e a k i = 1 N / m ~ i P · m ~ · N 0.5 m ~ .
4.
Since it requires step-by-step adaptation to the selection rules, Alice cannot use a fast algorithm to encrypt messages. Nonetheless, the attacker can estimate n A and calculate the weight of the matrix through a sum of squares algorithm. In the worst case scenario, the time consumed for encryption and decryption are equal, so this mode cannot withstand brute force attacks.
Regarding the four shortcomings mentioned above, the CMPKC public key algorithm replaces the linear transformations in the original algorithm with Chebyshev polynomials, inheriting the security performance of multiple chaotic systems in the original algorithm. Transforming to the real finite field can greatly increase the security of the algorithm. In this case, f 1 ( x ) and f 2 ( x ) are no longer linear transformations, making it very difficult to choose orthogonal linear transformations. Nevertheless, attackers can still decipher this encryption system through points 3 and 4 mentioned above, indicating that the encryption mode mentioned does not have sufficient security yet.

3. An Improved Multi-Chaotic Public Key Cryptographic Algorithm Based on Chebyshev Polynomials (CMPKC-ki)

3.1. Selection of Coefficient ki

Before introducing the improved algorithm, we need to clarify the use of the coefficient k i . The detailed selection scheme of k i is described as follows:
  • Alice chooses two large prime numbers P and Q , and sets N = P · Q . She generates a large integer d < N randomly.
  • Calculate A = T d ( x ) ( mod N ) , where ( x ,   A ,   N ) are the public key and d is the private key.
  • Bob randomly selects r < N , calculates T r ( A ) ( mod N ) , and selects k i based on Equation (20).
  • Calculate B = T r ( x ) ( mod N ) and send it to Alice.
  • Alice calculates T d ( B ) ( mod N ) based on the private key d and selects k i based on Equation (20).
The selection rule of k i is as follows:
k i = k 1 ,     0 T r ( T d ( x ) ) mod N = T d ( T r ( x ) ) mod N δ n                             k 2 ,     δ n T r ( T d ( x ) ) mod N = T d ( T r ( x ) ) mod N 2 δ n                         k i ,     ( i 1 ) δ n T r ( T d ( x ) ) mod N = T d ( T r ( x ) ) mod N i δ n           k n ,     ( n 1 ) δ n T r ( T d ( x ) ) mod N = T d ( T r ( x ) ) mod N δ         .
In Equation (20), δ is a large number and n is the number of k i . It is easy to see from the semi-group property of Chebyshev that T r ( T d ( x ) ) mod N = T d ( T r ( x ) ) mod N .
( A mod N ) ( mod P ) = A ( mod P ) , where A represents the Chebyshev polynomial and N = P · Q , P and Q are two large prime numbers.

3.2. Chaotic Hash Function for Generating a 0 ,   1 Sequence

In the algorithm’s design, we will use a chaotic hash function to generate a 0 ,   1 sequence. The specific Algorithm 1 is as follows.
Algorithm 1 Chaotic hash function generates a 0 ,   1 sequence
Input: seed_value, sequence_length, Chaotic parameters r
Output: binary sequence
1: ChaoticHash(seed, length):
2:   x: = seed
3:  bit_sequence:= “”
4:  for I from 1 to length do
5:      x: = logistic_map(x)
6:      if x > 0.5 then
7:          bit_sequence:= bit_sequence + ‘1’
8:      else
9:           bit_sequence: = bit_sequence + ‘0’
10:       end if
11:   end for
12:   return bit_sequence:
13: Function logistic_map(x):
14:    r : = // Chaotic parameters
15:   return r * x * (1 − x)

3.3. Improved Algorithm (CMPKC-ki)

The improved public key encryption system adopts the coefficient selection k i based on the equality T r ( T d ( x ) ) mod N = T d ( T r ( x ) ) mod N , where the size of k i   ( i = 1 ,   2 n ) is determined, and T ( x ) is the Chebyshev polynomial. The specific value selection rule of k i and the size of n are shared secrets among participants. A pseudo-random sequence 0 ,   1 is generated using chaotic hash functions and logistic mapping. The initial value x 0 is iterated n A and n B times based on the sequence content to obtain x n A and x n B , and then iterated n B and n A times again to obtain x n B + n A and x n A + n B .
The key exchange process of this improved multi-chaos public key system is illustrated in Figure 8.
The algorithm is described as follows (assuming Alice wants to communicate with Bob):
Let N be a large positive number, and the chaotic system is of m levels.
Step 1. Alice and Bob choose coefficients k i through public negotiation and calculation and determine the initial value x 0 and m ~ selection functions f 1 ( x ) , f 2 ( x ) , , f m ~ ( x ) , where f 1 ( x ) , f 2 ( x ) , , f m ~ ( x ) are Chebyshev polynomials.
Step 2. Alice randomly selects a key seed s A and a large number n A [ 0 ,   N ] , inputs these parameters into a pseudo-random sequence generator, and outputs a 0 , 1 sequence r A of length n A . Select k α , k β by the selectivity coefficient k i , select functions f k α and f k β based on k α and k β . Iterating f k α ( x 0 ) , f k β ( x 0 ) over n A 1 ,     n A 2 times according to the content of 0 , 1 in r A to obtain x n A , and pass x n A as the public key to Bob.
x i = h ( x i 1 ,   k i ) h m ~ ( x ,   k ) = f 1 ( x ) ( mod N ) i f   k = 1 ,   f 2 ( x ) ( mod N ) i f   k = 2 ,   f m ( x ) ( mod N ) i f   k = m ~ .
Step 3. Similarly, Bob randomly selects a key seed s B and a large number n B [ 0 ,   N ] , inputs these parameters into a pseudo-random sequence generator, and outputs a 0 , 1 sequence r B of length n B . Select k α , k β by the selectivity coefficient k i , select functions f k α and f k β based on k α and k β . Iterating f k α ( x 0 ) , f k β ( x 0 ) over n B 1 ,   n B 2 times according to the content of {0, 1} in r B to obtain x n B , and pass x n B as the public key to Alice.
Step 4. Alice iterates x n B over n A times according to r A to obtain x n B + n A .
Step 5. Bob iterates x n A over n B times according to r B to obtain x n A + n B .
Since f 1 ( x ) , f 2 ( x ) , , f m ~ ( x ) are Chebyshev polynomials, it is known from preliminary knowledge that Chebyshev polynomials satisfy the semi-group property on , + . Therefore, we have f k α f k β = f k β f k α ( k α ,   k β [ 1 ,   m ~ ] ) , that is
x n B + n A = f k α n A 1 f k β n A 2 ( x n B ) = f k α n A 1 f k β n A 2 f k α n B 1 f k β n B 2 ( x 0 ) = f k α n A 1 + n B 1 f k β n A 2 + n B 2 ( x 0 ) ,
where n A 1 ,   n A 2 ,   n B 1 ,   n B 2 are the numbers of 0s and 1s in r A and r B , respectively. Similarly, it can be proven that
x n A + n B = f k α n A 1 + n B 1 f k β n A 2 + n B 2 ( x 0 ) ,
therefore, we have x n A + n B = x n B + n A .
Combined with the process in Figure 8, this improved algorithm can be used for both encryption and decryption, and can be combined with the AES algorithm for further applications.

3.3.1. Improved Algorithm for Encryption and Decryption

Assuming plaintext m , the steps are as follows:
  • Bob selects private key s B , calculates x n B , and passes it to Alice.
    Similarly, Alice selects private key s A , calculates x n A , and passes it to Bob.
  • Encrypt c = x n A + n B · m , then Alice passes x n A and ciphertext c to Bob.
Bob calculates x n B + n A based on his private key n B , and uses it to recover plaintext m = c / x n B + n A .

3.3.2. Combination with the AES Algorithm to Obtain the Improved Algorithm

Based on steps 1 to 5 of the improved public key encryption algorithm in Section 3.3, x n A + n B and x n B + n A can be used as the keys for encryption and decryption in the AES algorithm, thus achieving the combination of chaotic public key encryption and AES private key encryption. The specific process is shown in Figure 9.
It is worth noting that after calculating x n A + n B and x n B + n A , they cannot be directly applied to the AES algorithm in most cases. This is because, in practical applications, AES keys need to be represented as hexadecimal strings, Base64 encoded strings, or raw byte sequences. Thus, we need to continue to convert the values of x n A + n B and x n B + n A into the corresponding format.
Step 6: Alice and Bob each transcode the exchanged keys x n A + n B and x n B + n A into 32-byte random binary keys using Algorithm 2.
Algorithm 2 Convert a decimal number to a 32-byte random binary key
Input: decimal_number, random_key
Output: 32-byte random binary key, Hexadecimal representation
1: Function decimal_to_random_key(decimal_number):
2:    decimal_bytes: = Convert decimal_number to byte array(decimal_number)
3:    hash_object: = Create SHA-256 hash object (decimal_bytes)
4:    hash_result: = Get digest from hash_object
5:   random_key: = First 32 bytes of hash_result
6:   return random_key
Step 7: Alice inputs the plaintext into the AES algorithm for encryption.
Step 8: Bob, upon receiving the ciphertext, uses the key x n B + n A to recover the plaintext using Algorithm 3.
Algorithm 3 Encrypt and decrypt using the AES algorithm.
Input: plaintext, key
Output: ciphertext, decrypted_data
1: Function encrypt (plaintext, key):
2:   cipher: = Create AES cipher object with key in CBC mode
3:   iv: = Generate random initialization vector (IV)
4:   padded_plaintext: = Pad plaintext to AES block size
5:   ciphertext: = Encrypt padded_plaintext with cipher using the IV
6:   Return iv, ciphertext
7: Function decrypt(ciphertext, key, iv):
8:   cipher: = Create AES cipher object with key in CBC mode and IV
9:   decrypted_bytes: = Decrypt ciphertext with cipher
10:  decrypted_data: = Unpad decrypted_bytes to AES block size
11:  Return decrypted_data

4. Software Implementation

4.1. Feasibility Analysis

4.1.1. Fast Algorithm for Chebyshev Polynomials

In Section 3, we presented the improved multiple chaotic public key algorithm, which no longer uses the orthogonal linear exchange designed by Bose in [27]. Instead, it is replaced by Chebyshev polynomials and a set of enhancements (e.g., the introduction of the selective coefficient k i , freely selectable Chebyshev polynomials f k i ( x ) , and the chaotic hash function). Since Chebyshev polynomials also possess the semi-group property, they still meet the requirements of the public key encryption scheme.
As the semi-group property of Chebyshev polynomials holds in the interval ( , + ) , decryption computation is feasible. Evaluating the Chebyshev polynomials to reduce the calculation time of T n ( x ) is an important challenge. This paper adopts a fast algorithm consistent with the work proposed in [54] to calculate Chebyshev polynomials.

4.1.2. Selection of Parameters

To enhance the readability of this article and facilitate understanding, let the chaotic series m = 2 in Equation (21) and the modulus N = 167,413,457 . Pseudo-random 0 , 1 sequences are generated by the chaotic hash function, detailed in Algorithm 1, where seed_value = 0.123456789, sequence_length = 100, and Chaotic parameters r = 3.8.

4.1.3. Applications of the Selection of Coefficient ki

The calculation process for selecting coefficient k i follows the scheme described in Section 3.1. An example is provided below for illustration.
Selection process for k i :
  • Alice chooses two large prime numbers P = 10,753 and Q = 15,569 and sets N = P · Q = 167,413,457 . She generates a large integer d = 19,973 < N at random.
  • Alice computes A = T d ( x ) ( mod N ) = 131,403,701 .
    The public key is ( x ,   A ,   N ) = ( 112,233 ,   131,403,701 ,   167,413,457 ) , and the private key is d = 19,973 .
  • Bob randomly selects an integer r = 13,297 < N and computes T r ( A ) ( mod N ) = T 13297 ( 131,403,701 ) ( mod   167,413,457 ) = 96,703,620 . According to Equation (20), he selects the value of k i . For clarity, let us assume δ = N = 167,413,457 , n = 7 and select k i = 3 i + 1 as an arithmetic sequence. Let us calculate coefficient k i shown in Equation (24) by applying Equation (20), and since T r ( A ) ( mod N ) = T r ( ( T d ) ( x ) ) ( mod N ) = 96,703,620 , we choose k i = k 5 = 16 .
    k i = 4 ,                     0 T r ( T d ( x ) ) mod N 23,916,208.1                                                     7 ,                     23,916,208.1 T r ( T d ( x ) ) mod N 47,832,416.3           10 ,                   47,832,416.3 T r ( T d ( x ) ) mod N 71,748,624.4         13 ,                   71,748,624.4 T r ( T d ( x ) ) mod N 95,664,832.6         16 ,                     95,664,832.6 T r ( T d ( x ) ) mod N 119,581,040.7   19 ,                   119,581,040.7 T r ( T d ( x ) ) mod N 143,497,248.9 22 ,                   143,497,248.9 T r ( T d ( x ) ) mod N 167,413,457.0 .
  • Calculate B = T r ( x ) ( mod N ) = 38,698,867 and send it to Alice.
  • Alice computes T d ( B ) ( mod N ) = T r ( ( T d ) ( x ) ) ( mod N ) = 96,703,620 based on the private key d = 19,973 . Similarly, according to Equation (20) and the assumptions made in Section 3.1, k i can still be selected as k 5 = 16 .
Through the above process, Alice and Bob can select the same value of k i while preserving their private key, which will support the subsequent improvement of the Chebyshev polynomial multi-chaos public key algorithm.
Assume that, in the case of N = 167,413,457 , x 0 = 112,233   a n d   n = 7 , the value of the coefficient k i is randomly selected through arbitrary transformations of r and d . Here, the generation method of two large prime numbers in the Rivest–Shamir–Adleman algorithm can be used to select r and d . This not only ensures strong randomness but also avoids unpredictable troubles caused by arbitrary value selection. Table 2 presents five sets of experimental results under arbitrary transformations of r and d .
From the values in Table 2, it is easy to see that when n = 7 , the choice of k i already exhibits preliminary randomness. In practical applications, as long as k n < N , theoretically, the value of N can be arbitrarily large and the values of k n and n can also be arbitrarily large. This means that the choice of coefficient k i has strong randomness in practical applications.

4.2. An Example

PYTHON is a popular and powerful programming language that can be used for mathematical calculation and analysis. In our software implementation, we used algorithm libraries under the Windows environment. Below, we provide a specific example to verify the effectiveness of the proposed algorithm.
Step 1. Alice and Bob publicly negotiate and determine the initial values x 0 = 112,233 and N = 167,413,457 . They select two functions f k α ( x ) , f k β ( x ) in Equation (25), where the selection rule for k i is as described in Section 4.1.3.
h ( x ,   k ) = f 1 ( 112,233 ) ( mod   167,413,475 ) i f   k = 1 ,   f 2 ( 112,233 ) ( mod   167,413,475 ) i f   k = 2 , f m ~ ( 112,233 ) ( mod   167,413,475 ) i f   k = m ~ . ,
where f 1 ( x 0 ) , f 2 ( x 0 ) , , f m ~ ( x 0 ) are Chebyshev polynomials and are calculated using the fast algorithm described in Section 4.1.1.
Step 2. Alice randomly selects a key seed s A = 0.123456 and a large number n A = 1000 [ 0 ,   N ] . She inputs these parameters into a pseudo-random sequence generator (as described in Section 4.1.2) and obtains a sequence r A of length n A = 1000 . The output of this example is as follows:
r A = [ 0101111101101011 101111 ] .
According to Table 2, we select k α = k 5 = 16 , k β = k 3 = 10 and the functions f k α = f 16 and f k β = f 10 based on k α and k β . Then, calculate the number of 0s and 1s in the sequence r A , denoted as n A 1 = 267 and n A 2 = 733 , respectively.
Next, we compute f k α ( x 0 ) ( mod N ) = f 16 ( 112,233 ) ( mod   167,413,475 ) = 21,588,224 and f k β ( x 0 ) ( mod N ) = f 10 ( 112,233 ) ( mod   167,413,475 ) = 53,130,926 and iterate these calculations, respectively, n A 1 = 267 and n A 2 = 733 times to obtain x n A = f k α n A 1 f k β n A 2 x 0 = f 16 267 f 10 733 112,233 = 123,490,595 . Finally, x n A is transmitted as the public key to Bob.
Step 3. Similarly, Bob randomly selects a key seed s B = 0.56789 and a large number n B = 1200 [ 0 ,   N ] , and inputs these parameters into a pseudo-random sequence generator (as in Section 4.1.2). This generates a sequence of length n B = 1200 consisting of 0 , 1 , denoted as r B , and the results are as follows:
r B = [ 1011010101111011 011111 ] .
According to Section 4.1.3, Bob calculates k α = k 5 = 16 , k β = k 3 = 10 based on Alice’s public key. Similarly, Bob selects the functions f k α = f 16 and f k β = f 10 based on k α and k β .
Bob counts the number of 0s and 1s in r B , which are n B 1 = 340 and n B 2 = 860 , respectively. By applying the functions f k α ( x 0 ) ( mod N ) = 21,588,224 and f k β ( x 0 ) ( mod N ) = 53,130,926 , Bob iterates these calculations n B 1 = 340 and n B 2 = 860 times. This results in x n B = f k α n B 1 f k β n B 2 x 0 = f 16 340 f 10 860 112,233 = 16,931,337 , with x n B then transmitted as the public key to Alice.
Step 4. Alice iterates x n B over n A times based on r A to obtain x n B + n A . According to Equation (14), we have:
x n B + n A = f k α n A 1 f k β n A 2 ( x n B ) = f 16 267 f 10 733 ( 16,931,337 ) = 63,457,287 .
Step 5. Similarly, Bob iterates x n A over n B times based on r B to obtain x n A + n B . At this point:
x n A + n B = f k α n B 1 f k β n B 2 ( x n A ) = f 16 340 f 10 860 ( 123,490,595 ) = 63,457,287 .

4.2.1. Applying the Improved Algorithm Directly to Encryption and Decryption

Assuming the plaintext m = 12,345 , the steps are as follows:
  • Bob selects the key seed s B to calculate n B 1 = 340 and n B 2 = 860 , thus obtaining x n B = 16,931,337 , and passes x n B to Alice;
    Similarly, Alice selects the key seed s A to calculate n A 1 = 267 and n A 2 = 733 , thus obtaining x n A = 123,490,595 , and passes x n A to Bob;
  • Encryption: c = x n A + n B · m = 63,457,287 × 12,345 = 783,380,208,015 . Then, Alice passes x n A and the ciphertext c to Bob;
  • Decrypt: Bob calculates n B 1 = 340 and n B 2 = 860 based on his private key s B , and computes x n B + n A = 63,457,287 . Using this value, he recovers the plaintext m as m = c / x n B + n A = 783,380,208,015 / 63,457,287 = 12,345 .

4.2.2. Combining the Improved Algorithm with the AES Algorithm

In the improved public key encryption algorithm, we have calculated x n A + n B = x n B + n A = 63,457,287 and provided an example of its direct use for encryption. Now, we will combine the improved algorithm with AES and continue with step 5 of the improved algorithm.
Step 6. Alice and Bob each transcode the exchanged keys x n A + n B and x n B + n A into 32-byte random binary keys using Algorithm 2. The transcoding results are shown in Table 3.
The transcoded result of x n A + n B = x n B + n A = 63,457,287 is as follows:
“,\xa6ZE\xa9]\x83\xa5\xfd\x9c\xe2nZ\xe9\r\xe26\xb9\xe6{t\xf8g\xd1q\xd6h\xda\x0f\xd1\xfcj”
Step 7. Assuming the plaintext is “hello world”,
Alice inputs the plaintext into the AES algorithm for encryption, resulting in the following ciphertext:
“B\x88\x0e\xd0|\xc6\xd9\xbb\x19R\xf6m\x04xD\xda”
Step 8. Bob, upon receiving the ciphertext, uses the key x n B + n A to recover the plaintext “hello world”.
The combined result of transcoding the keys x n A + n B and x n B + n A and applying the AES encryption algorithm is shown in Table 4.

5. Implementation Results and Analysis

This paper uses a Xiaomi laptop produced by Tianmi Technology Co., Ltd. in Beijing, China, for verification and analysis. The processor is an 11th generation Intel® Core™ i5-11320H @ 3.20 GHz, with 16.0 GB RAM (15.8 GB available) (Intel Corporation, Santa Clara, CA, USA), and the operating system is Windows 10, 64-bit. The implementation and analysis are carried out on this hardware and software system. The next two sections focus on the performance and security evaluation of CMPKC-Ki compared to RMPKC and its variants.

5.1. Performance Analysis

5.1.1. Key Generation

To maintain consistency in the comparison, we unified the value of the multi-chaos level m of the algorithm as 2, and used the same principles for selecting parameters N and x as the CEPKC algorithm in Section 2.2. We generated and analyzed initial random primes for each of the three cases. Each test was performed for different bit sizes of the initial primes within the range of 128, 256, 512, 1024, and 2048. Table 5 shows the comparison analysis of CMPKC- k i with CEPKC and CMPKC. Figure 10 shows the comparison of key generation times under different key sizes. It is easy to see that the key generation time of the standard CEPKC algorithm is the lowest, while the CMPKC- k i algorithm falls in the middle, and the key generation time of CMPKC is the highest. Through analysis, our proposed CMPKC- k i algorithm adds a selective coefficient k i , which increases an initial parameter compared to CEPKC and CMPKC, thus resulting in a longer key generation time. However, due to adjustments made in the multiple chaotic selection and pseudo-random sequence generation stages, the time cost of key generation is lower compared to the CMPKC algorithm. Although there is an increase in key generation time cost relative to the CEPKC scheme, the added security is significant, so we consider the limited increase in time to be tolerable.

5.1.2. Encryption and Decryption

From the encryption and decryption time trends shown in Figure 11 and Figure 12, the standard CEPKC has the lowest execution time for encryption and decryption, especially after 1024 bits, making it the best in terms of encryption and decryption time. Since the CMPKC- k i scheme involves additional computational steps for coefficient selection during the encryption and decryption phases, increasing the overall complexity of the algorithm, attackers are unable to guess the private key or plaintext by multiplying the public key and prime numbers. Furthermore, until the typical size of 1024 bits, our proposed CMPKC- k i scheme performs comparably to CEPKC in terms of encryption and decryption times. For higher bit sizes, CMPKC- k i demonstrates better efficiency in both encryption and decryption processes compared to CMPKC, slightly lagging behind the standard CEPKC scheme. However, it is worth noting that our proposed encryption scheme is generally applied in lightweight encryption environments, with the recommended modulus N size being 1024 bits. Therefore, our CMPKC- k i scheme stands out as efficient and high-performing among all the discussed algorithms. In an overall performance evaluation, among the three algorithms discussed, the CMPKC- k i algorithm proves to be the most efficient and effective, positioning it as the best algorithm after the standard CEPKC, while CMPKC emerges as the least efficient variant. The reasonable increase in key generation time in CMPKC- k i , compared to standard CEPKC, is justified as the introduction of k i adds complexity, making the CMPKC- k i system more time-consuming to break and enhancing overall security.

5.2. Security Analysis

Since we use Chebyshev polynomials based on finite fields, with the domain and range extended to Z N , it effectively avoids the breaking method mentioned in Section 2.2 that utilizes inverse trigonometric functions. In this paper, the selection coefficient k i is chosen based on the value of T e d ( x ) ( mod N ) , which can only be obtained through calculations by the communicating parties. It is impossible for any third party to know T e d ( x ) ( mod N ) , thus ensuring the security of the selection of k i .
In the calculation process, the computational complexity of k i is equivalent to that of the ElGamal public key cryptosystem and does not add an additional computational load. However, it is computationally infeasible to determine d from ( x ,   T d ( x ) ( mod N ) ) . However, the resonant characteristics of Chebyshev polynomial points in finite fields still exist. That is, given the public key ( x ,   T d ( x ) ) , by calculating x i = T i ( x ) and y i = T d ( x i ) = T d ( T i ( x ) ) , enough points ( x i ,   y i ) can be obtained on the Chebyshev polynomial curve, allowing for curve fitting to derive the key d . The autocorrelation function of T d ( x ) exhibits binary characteristics, and the normalized autocorrelation function R d ( η ) for T d ( x ) is given by:
R d ( η ) = x = 0 N 1 ( T d ( x ) mod N ) ( T d ( x + η ) mod N ) x = 0 N 1 ( T s ( x ) mod N ) 2 .
In the formula, when N is sufficiently large, it can be shown that:
R d ( η ) = 1 ,   η = 0 , ε ,   η 0 .
where ε is a constant, such that 0 < ε < 1 . In other words, when N is sufficiently large, R d ( η ) exhibits binary characteristics. In practical public key encryption systems, the field values are extremely large. Therefore, it can be assumed that the points on the T d ( x ) curve are difficult to predict and count during the effective lifespan of the key. Even if an attacker gains access to many points on the curve, they cannot fit the curve and deduce the private key d within the limited lifespan of the key.
Furthermore, considering the range of values for k i , as long as the maximum value of k i , k n < N , and given that N can be theoretically arbitrarily large, the values of k n and n can also be arbitrarily large. This means that in practical applications, the selection of the coefficient k i is highly random, further ensuring the security of the algorithm.
In Section 2.5, we have observed four shortcomings of previous algorithms. By replacing the corresponding linear transformations with finite field Chebyshev polynomials, we can overcome shortcomings 1 and 2. For shortcoming 3, we use chaotic hash functions and logistic mappings to generate pseudorandom sequences. By analyzing the properties of multi-chaos systems, we hypothesized that attackers can calculate x i ,   i 1 ,   , i m ~ = f 1 i + i 0 f 2 i + i 1 f m ~ i + i m ~ 1 ( x 0 ) , where i 1 ,   2 ,   , n A / m ~ and i k 0 ,   1 ( k = 1 ,   2 ,   , N ) . However, in our proposed new algorithm, f 1 ( x ) , f 2 ( x ) , , f n ( x ) have been replaced with f k α ( x ) , f k β ( x ) , , f k n ( x ) , where k α ,   k β ,   , k n k i , with sufficiently large ranges and good randomness. This makes it impossible for attackers to effectively attack the algorithm based on the assumptions.
Regarding shortcoming 4, the performance test of the algorithm shows that the improved algorithm has stronger resistance to brute force attacks compared to previous algorithms. Table 6 represents the comparison of brute force attack times from 4-bit prime numbers to 7-bit prime numbers. When attacking prime numbers of 7 bits or more, the execution result requires a long time, and the time trend of brute force attacks is already clear within 7 bits, so we will analyze it within 7 bits. Figure 13 also shows the advantage of the results through a line chart. To compare the results more easily, a logarithmic scale with a base of 10 is used for the vertical axis when plotting.
From the corresponding Table 6 and Figure 13, for all prime number lengths, CEPKC takes the least amount of time to brute force decrypt its private key components, and BMPKC also shows results close to CEPKC. This means that standard CEPKC and BMPKC have similar complexity and security, and therefore, they have the lowest security among all discussed algorithms. Compared with the other three algorithms, our proposed CMPKC- k i algorithm shows a significantly longer decryption time on all prime number bits. Therefore, relative to other algorithms, the proposed CMPKC- k i algorithm has the longest brute force attack time and, therefore, the highest security. CMPKC has the second-longest attack time, only slightly shorter than CMPKC- k i .

6. Conclusions and Future Work

Due to the similar characteristics between chaotic systems and cryptography, chaos-based public key encryption is currently a hot topic. This paper improves the performance and security of the Bose Multi-Chaotic Public Key Cryptographic Algorithm (BMPKC) from the aspects of efficiency and reliability. The proposed algorithm is named CMPKC- k i , which overcomes the shortcomings of previous algorithms by using selective coefficient k i , chaotic hash functions, and logistic mapping to generate pseudo-random sequences. CMPKC- k i provides better security because it leads to more complex algorithms and the process of public key generation is sent in parallel, making it difficult for attackers to obtain much information about the key or decrypt the message. Compared to the standard CEPKC and BMPKC, CMPKC- k i takes longer to break private keys. Meanwhile, we also explore the combination of the improved chaotic public key encryption system with the AES encryption method, which provides more possibilities for practical applications of the system.
In summary, this solution has the characteristics of strong practicality and high security, making contributions to the field of information encryption. We believe that its advantage lies in the fact that even if attackers guess the chaotic sequence m within the same period, they still need to obtain the specific k i from the selective coefficient and break the chaotic hash function, which is almost impossible within the limited time. Therefore, the security of the algorithm is greatly improved. Although the overall design of this solution is satisfactory, it requires more time for key generation due to parallel computation and the occurrence of selective coefficients through several generation stages. In the case of large prime numbers, the efficiency of the algorithm will decrease, so the selective coefficient cannot be too large or it will have a negative impact on the required time for the algorithm, as seen in Figure 10, which can be considered as a drawback and an issue that needs continuous improvement. In conclusion, after performance and security analysis, the proposed CMPKC- k i algorithm demonstrates superior results with improved security.
As future research work, we plan to compare the proposed public key encryption system with other common advanced public key encryption schemes in different application scenarios for performance analysis and conduct a more detailed assessment of security aspects. The algorithm will also be extended to parallel machines so that multiple related operations can be parallelly computed on multi-core processors. Compared to similar public key encryption systems, this will result in lower computational costs and wider acceptability in IoT devices. Additionally, we can explore the potential of combining other chaotic mappings, fractals, and traditional encryption methods (such as AES, DES, and Blowfish) to achieve higher efficiency and security in the field of encryption. Interested researchers can implement this algorithm on hardware platforms such as field-programmable gate arrays (FPGAs) and application-specific integrated circuits (ASICs) to optimize its performance for practical applications. In conclusion, this research brings possibilities for continual exploration and advancement in the digital security field.

Author Contributions

Conceptualization, C.Z., Y. L, A.T. and L.W.; methodology, C.Z. and L.W.; software, C.Z., J.B., T.G. and S.P.; validation, Y.L., A.T. and L.W.; formal analysis, C.Z., J.B. and L.W.; investigation, J.B., Y.L. and A.T.; resources, Y.L., A.T., J.B. and S.P.; writing – original draft, C.Z. and J.B.; writing – review & editing, C.Z., J.B., Y.L., A.T., L.W., T.G. and S.P.; supervision, Y.L., A.T. and L.W.; project administration, Y.L., A.T., L.W., T.G. and S.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant number 62372494, the Guangdong Province College Youth Innovative Talent Project, grant number 2023KQNCX132, the Guangdong Province College Youth Innovative Talent Project, grant number 2024KQNCX013, the Guangdong Key Disciplines Project, grant number 2021ZDJS138, the Guangdong Key Disciplines Project, grant number 2022ZDJS139, and FCT—Foundation for Science and Technology within the R&D Units Project Scope, grant number UIDB/00319/2020.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kocarev, L. Chaos-based cryptography: A brief overview. IEEE Circuits Syst. Mag. 2001, 1, 6–21. [Google Scholar] [CrossRef]
  2. Pisarchik, A.N.; Zanin, M. Chaotic map cryptography and security. In Encryption: Methods, Software and Security; Nova Science Publishers, Inc.: Hauppauge, NY, USA, 2010; pp. 1–28. [Google Scholar]
  3. Mahajan, P.; Sachdeva, A. A study of encryption algorithms AES, DES and RSA for security. Glob. J. Comput. Sci. Technol. 2013, 13, 15–22. [Google Scholar]
  4. Sonko, S.; Ibekwe, K.I.; Ilojianya, V.I.; Etukudoh, E.A.; Fabuyide, A. Quantum cryptography and US digital security: A comprehensive review: Investigating the potential of quantum technologies in creating unbreakable encryption and their future in national security. Comput. Sci. IT Res. J. 2024, 5, 390–414. [Google Scholar] [CrossRef]
  5. Ibrahim, D.R.; Teh, J.S.; Abdullah, R. An overview of visual cryptography techniques. Multimed. Tools Appl. 2021, 80, 31927–31952. [Google Scholar] [CrossRef]
  6. Sharma, S.; Saini, A.; Chaudhury, S. A survey on biometric cryptosystems and their applications. Comput. Secur. 2023, 134, 103458. [Google Scholar] [CrossRef]
  7. Singh, A.; Kumar, A.; Namasudra, S. DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography. Front. Comput. Sci. 2024, 18, 181801. [Google Scholar] [CrossRef]
  8. Chillotti, I.; Gama, N.; Georgieva, M.; Izabachène, M. TFHE: Fast fully homomorphic encryption over the torus. J. Cryptol. 2020, 33, 34–91. [Google Scholar] [CrossRef]
  9. Shruti; Rani, S.; Srivastava, G. Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme. Expert Syst. Appl. 2024, 235, 121180. [Google Scholar] [CrossRef]
  10. Bernstein, D.J.; Lange, T. Post-quantum cryptography. Nature 2017, 549, 188–194. [Google Scholar] [CrossRef]
  11. Joseph, D.; Misoczki, R.; Manzano, M.; Tricot, J.; Pinuaga, F.D.; Lacombe, O.; Leichenauer, S.; Hidary, J.; Venables, P.; Hansen, R. Transitioning organizations to post-quantum cryptography. Nature 2022, 605, 237–243. [Google Scholar] [CrossRef]
  12. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  13. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
  14. Matthews, R. On the derivation of a “chaotic” encryption algorithm. Cryptologia 1989, 13, 29–42. [Google Scholar] [CrossRef]
  15. Pecora, L.M.; Carroll, T.L. Synchronization in chaotic systems. Phys. Rev. Lett. 1990, 64, 821. [Google Scholar] [CrossRef] [PubMed]
  16. Zhang, B.; Liu, L. Chaos-Based Image Encryption: Review, Application, and Challenges. Mathematics 2023, 11, 2585. [Google Scholar] [CrossRef]
  17. Salman, D.S.; Naif, J.R. Comparative study of chaotic system for encryption. Iraqi J. Comput. Inform. 2023, 49, 83–92. [Google Scholar] [CrossRef]
  18. Alexan, W.; Alexan, N.; Gabr, M. Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs. Fractal Fract. 2023, 7, 287. [Google Scholar] [CrossRef]
  19. Corona-Bermúdez, E.; Chimal-Eguía, J.C.; Corona-Bermúdez, U.; Rivero-Ángeles, M.E. Chaos Meets Cryptography: Developing an S-Box Design with the Rössler Attractor. Mathematics 2023, 11, 4575. [Google Scholar] [CrossRef]
  20. Kotadai, Z.; Yves, E.J.; Fischer, C.; Rodríguez-Muñoz, J.D.; Moreno-Lopez, M.F.; Tlelo-Cuautle, E.; De Dieu, N.J. Fractional order 1D memristive time-delay chaotic system with application to image encryption and FPGA implementation. Math. Comput. Simul. 2024, 227, 58–84. [Google Scholar]
  21. Sambas, A.; Miroslav, M.; Vaidyanathan, S.; Ovilla-Martínez, B.; Tlelo-Cuautle, E.; El-Latif, A.A.A.; Abd-El-Atty, B.; Benkouide, K.; Bonny, T. A New Hyperjerk system with a half line equilibrium: Multistability, Period doubling reversals, antimonotonocity, electronic circuit, FPGA design and an application to image encryption. IEEE Access 2024, 12, 9177–9194. [Google Scholar] [CrossRef]
  22. Puhua, G. Cellular automaton public-key cryptosystem. Complex Syst. 1987, 1, 51–57. [Google Scholar]
  23. Kocarev, L.; Tasev, Z. Public-key encryption based on Chebyshev maps. In Proceedings of the 2003 International Symposium on Circuits and Systems, 2003, ISCAS’03, Bangkok, Thailand, 25–28 May 2003; p. III. [Google Scholar]
  24. Kocarev, L.; Makraduli, J.; Amato, P. Public-key encryption based on Chebyshev polynomials. Circuits Syst. Signal Process. 2005, 24, 497–517. [Google Scholar] [CrossRef]
  25. Bergamo, P.; D’Arco, P.; De Santis, A.; Kocarev, L. Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I Regul. Pap. 2005, 52, 1382–1393. [Google Scholar] [CrossRef]
  26. Kocarev, L.; Sterjev, M.; Fekete, A.; Vattay, G. Public-key encryption with chaos. Chaos Interdiscip. J. Nonlinear Sci. 2004, 14, 1078–1082. [Google Scholar] [CrossRef]
  27. Bose, R. Novel public key encryption technique based on multiple chaotic systems. Phys. Rev. Lett. 2005, 95, 098702. [Google Scholar] [CrossRef]
  28. Zhang, L. Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 2008, 37, 669–674. [Google Scholar] [CrossRef]
  29. Ariffin, M.R.K.; Abu, N.A. A A β -cryptosystem: A chaos based public key cryptosystem. Int. J. Cryptol. Res. 2009, 1, 149–163. [Google Scholar]
  30. Blackburn, S.R. The discrete logarithm problem modulo one: Cryptanalysing the Ariffin–Abu cryptosystem. J. Math. Cryptol. 2010, 4, 193–198. [Google Scholar] [CrossRef]
  31. Algehawi, M.B.; Samsudin, A.A. new Identity Based Encryption (IBE) scheme using extended Chebyshev polynomial over finite fields Zp. Phys. Lett. A 2010, 374, 4670–4674. [Google Scholar] [CrossRef]
  32. Haifeng, Q. Pitfalls in identity based encryption using extended Chebyshev polynomial. China Commun. 2012, 9, 58. [Google Scholar]
  33. Islam, S.K.H. Identity-based encryption and digital signature schemes using extended chaotic maps. Cryptol. ePrint Arch. 2014, 2014, 275–280. [Google Scholar]
  34. Lai, H.; Orgun, M.A.; Xiao, J.; Pieprzyk, J.; Xue, L.; Yang, Y. Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Nonlinear Dyn. 2014, 77, 1427–1439. [Google Scholar] [CrossRef]
  35. Lee, T.F.; Lin, C.Y.; Lin, C.L.; Hwang, T. Provably secure extended chaotic map-based three-party key agreement protocols using password authentication. Nonlinear Dyn. 2015, 82, 29–38. [Google Scholar] [CrossRef]
  36. Abd-El-Atty, B.; Amin, M.; Abd-El-Latif, A.; Ugail, H.; Mehmood, I. An efficient cryptosystem based on the logistic-chebyshev map. In Proceedings of the 2019 13th International Conference on Software, Knowledge, Information Management and Applications, 2019, SKIMA, Island of Ulkulhas, Maldives, 26–28 August 2019; pp. 1–6. [Google Scholar]
  37. Tan, Z. Privacy-preserving two-factor key agreement protocol based on chebyshev polynomials. Secur. Commun. Netw. 2021, 2021, 6697898. [Google Scholar] [CrossRef]
  38. Meshram, C.; Ibrahim, R.W.; Meshram, S.G.; Imoize, A.L.; Jamal, S.S.; Barve, S.K. An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric. J. Supercomput. 2022, 78, 12792–12814. [Google Scholar] [CrossRef]
  39. Meshram, A.; Alouane-Turki, M.H.; Wazalwar, N.M.; Chandrashekhar, M. An Efficient Three-Party Authenticated Key Exchange Procedure Using Chebyshev Chaotic Maps with Client Anonymity. Comput. Mater. Contin. 2023, 75, 5337. [Google Scholar] [CrossRef]
  40. Tenny, R.; Tsimring, L.S.; Larson, L.; Abarbanel, H.D.I. Using distributed nonlinear dynamics for public key encryption. Phys. Rev. Lett. 2003, 90, 047903. [Google Scholar] [CrossRef]
  41. Kumar, A.; Ansari, M.M. Multi message signcryption based on chaos with public verifiability. Int. J. Sci. Technol. Res. 2013, 2, 194–198. [Google Scholar]
  42. Chatterjee, S.; Roy, S.; Das, A.K.; Chattopadhyay, S.; Kumar, N.; Vasilakos, A.V. Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment. IEEE Trans. Dependable Secur. Comput. 2016, 15, 824–839. [Google Scholar] [CrossRef]
  43. Attaullah; Javeed, A.; Shah, T. Cryptosystem techniques based on the improved Chebyshev map: An application in image encryption. Multimed. Tools Appl. 2019, 78, 31467–31484. [Google Scholar] [CrossRef]
  44. Louzzani, N.; Boukabou, A.; Bahi, H.; Boussayoud, A. A novel chaos based generating function of the Chebyshev polynomials and its applications in image encryption. Chaos Solitons Fractals 2021, 151, 111315. [Google Scholar] [CrossRef]
  45. Khan, M.; Alanazi, A.S.; Khan, L.S.; Hussain, I. An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial. Complex Intell. Syst. 2021, 7, 2751–2764. [Google Scholar] [CrossRef]
  46. Ren, H.; Niu, S.; Chen, J.; Li, M.; Yue, Z. A Visually Secure Image Encryption Based on the Fractional Lorenz System and Compressive Sensing. Fractal Fract. 2022, 6, 302. [Google Scholar] [CrossRef]
  47. Guillén-Fernández, O.; Tlelo-Cuautle, E.; de la Fraga, L.G.; Sandoval-Ibarra, Y.; Nuñez-Perez, J.-C. An Image Encryption Scheme Synchronizing Optimized Chaotic Systems Implemented on Raspberry Pis. Mathematics 2022, 10, 1907. [Google Scholar] [CrossRef]
  48. Mohamed, N.A.E.-S.; El-Sayed, H.; Youssif, A. Mixed Multi-Chaos Quantum Image Encryption Scheme Based on Quantum Cellular Automata (QCA). Fractal Fract. 2023, 7, 734. [Google Scholar] [CrossRef]
  49. Zhao, G.; Ma, Y. Introduction to chaotic cryptographic algorithms. In Chaotic Applied Cryptography, 1st ed.; Cheng, J., Ed.; Science Press: Beijing, China, 2021; pp. 176–194. [Google Scholar]
  50. Kocarev, L.; Shiguo, L. Chaos-Based Cryptography: Theory, Algorithms and Applications, 1st ed.; Springer: Berlin, Germany, 2011; pp. 33–40. [Google Scholar]
  51. Kocarev, L.; Jakimoski, G.; Stojanovski, T.; Parlitz, U. From chaotic maps to encryption schemes. In Proceedings of the 1998 IEEE International Symposium on Circuits and Systems, ISCAS, Monterey, CA, USA, 31 May–3 June 1998; pp. 514–517. [Google Scholar]
  52. Cheong, K.Y.; Koshiba, T. More on security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. II Express Briefs 2007, 54, 795–799. [Google Scholar] [CrossRef]
  53. Wang, K.; Pei, W.; Zou, L.; He, Z. Cryptanalysis of multiple chaotic systems based public key encryption technique. Acta Phys. Sin. 2006, 55, 6234–6247. [Google Scholar] [CrossRef]
  54. Zhang, C.; Liang, Y.; Tavares, A.; Wang, L.; Gomes, T.; Pinto, S. An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA. Symmetry 2024, 16, 263. [Google Scholar] [CrossRef]
Figure 1. Diagram of the development history of chaotic public key cryptography.
Figure 1. Diagram of the development history of chaotic public key cryptography.
Algorithms 17 00389 g001
Figure 2. Bifurcation diagram for the Chebyshev map.
Figure 2. Bifurcation diagram for the Chebyshev map.
Algorithms 17 00389 g002
Figure 3. Bifurcation diagram of the improved Chebyshev chaotic map.
Figure 3. Bifurcation diagram of the improved Chebyshev chaotic map.
Algorithms 17 00389 g003
Figure 4. Lyapunov Exponent of the Chebyshev Map.
Figure 4. Lyapunov Exponent of the Chebyshev Map.
Algorithms 17 00389 g004
Figure 5. Information entropy of the Chebyshev map.
Figure 5. Information entropy of the Chebyshev map.
Algorithms 17 00389 g005
Figure 6. The proposed key exchange protocol using CCS [27].
Figure 6. The proposed key exchange protocol using CCS [27].
Algorithms 17 00389 g006
Figure 7. Key exchange process of a multi-chaotic system.
Figure 7. Key exchange process of a multi-chaotic system.
Algorithms 17 00389 g007
Figure 8. Key exchange process of the improved multi-chaos system.
Figure 8. Key exchange process of the improved multi-chaos system.
Algorithms 17 00389 g008
Figure 9. Combined application of the improved multiple chaotic system key exchange process and AES algorithm.
Figure 9. Combined application of the improved multiple chaotic system key exchange process and AES algorithm.
Algorithms 17 00389 g009
Figure 10. Key Generation Time Comparison.
Figure 10. Key Generation Time Comparison.
Algorithms 17 00389 g010
Figure 11. Encryption Time Comparison.
Figure 11. Encryption Time Comparison.
Algorithms 17 00389 g011
Figure 12. Decryption Time Comparison.
Figure 12. Decryption Time Comparison.
Algorithms 17 00389 g012
Figure 13. Brute Force Attack Time Comparison.
Figure 13. Brute Force Attack Time Comparison.
Algorithms 17 00389 g013
Table 1. Major research history of chaotic public key cryptography.
Table 1. Major research history of chaotic public key cryptography.
YearAuthorDescriptionEvaluation
1987Puhua, G.
[22]
A public key cryptography algorithm based on cellular automation, which can be seen as a discrete dynamical system.It has significant limitations, such as performing poorly in processing large-scale data, with slow computational processes that cannot meet real-time requirements.
2003Kocarev, L.
[23,24]
Bergamo, P.
[25]
A chaotic public key cryptography algorithm based on Chebyshev polynomials, which is extended to finite fields due to security flaws and deployed in applications such as key exchange protocols and digital signatures.It represents a primary focus within the realm of chaotic public key cryptography, marking the inaugural application of Chebyshev polynomials in a more extensive manner to public key encryption algorithms.
2004Kocarev, L.
[26]
A public key cryptography algorithm based on toroidal self-isomorphism, which can be seen as an extension of public key cryptography based on Chebyshev polynomials.The algorithm’s security is claimed to be consistent with the RSA algorithm and is purportedly applicable to the ElGamal and Rabin public key algorithms. However, only a simple example is provided, and the conclusion awaits confirmation.
2005Bose, R. [27]
Zhang, L. [28]
A public key cryptography algorithm based on multiple chaotic systems.It has been proven to have security flaws, such as its susceptibility to brute force attacks.
2009Ariffin, M.R.K. [29]
Blackburn, S.R. [30]
A new public key cryptography algorithm constructed using the A A β chaotic system, claiming to have the same level of security as the classical discrete logarithm problem.By solving the discrete logarithm problem modulo 1, it has been demonstrated that this cryptographic system is not sufficiently secure.
2010Algehawi, M.B. [31]
Haifeng, Q.
[32]
An identity-based encryption scheme is proposed based on Chebyshev chaotic mapping (IBE).It has security flaws. People can more easily attack by exploiting the semi-group property of extended Chebyshev polynomials on Z p .
2014Islam, S.K.H.
[33]
New identity-based encryption and signature schemes are proposed based on Chebyshev polynomials.The security and efficiency still need to be verified.
2014Lai, H.
[34]
A three-party key exchange protocol is proposed based on Chebyshev polynomials and proven to be secure in the standard model.It has promoted the progress of chaotic public key cryptography research as the protocol is the first provably secure 3PAKE protocol using Chebyshev chaotic maps under the standard model.
2015Lee, T.F.
[35]
A three-party key exchange protocol based on Chebyshev chaotic mapping is proposed based on password authentication.Its security can be proven in the random oracle model.
2018Abd-El-Atty, B. [36]An efficient cryptosystem is based on the Logistic-Chebyshev map.Its security has not been verified yet.
2021Tan, Z.
[37]
A secure dual-factor key agreement protocol based on Chebyshev polynomials.Preliminarily addressed the issue of user unlinkability in authentication key protocols based on chaotic maps.
2022Meshram, C.
[38]
Secure client authentication based on Chebyshev chaotic mapping.It has higher security and computational performance.
2023Meshram, A.
[39]
An efficient three-party authenticated key exchange process (AKEP) is proposed using Chebyshev chaotic mapping.It presents a novel type of key exchange process, based on an efficient three-party authenticated key exchange procedure (AKEP) using Chebyshev chaotic maps with client anonymity.
Table 2. Values of coefficient k i under arbitrary transformations of r and s .
Table 2. Values of coefficient k i under arbitrary transformations of r and s .
Group r d k i
113,29719,973 k 5 = 16
225,12726,777 k 3 = 10
346,26147,059 k 3 = 10
487618353 k 4 = 13
533198369 k 1 = 4
Table 3. Converting decimal numbers to 32-byte random binary keys.
Table 3. Converting decimal numbers to 32-byte random binary keys.
TypeInitial Parameters and Execution Results
Inputdecimal number = 63.457.287
random key = decimal_to_random_key (decimal_number)
Output32-byte binary key:
‘ , \xa6ZE\xa9] \x83\xa5\xfd\x9c\xe2nZ\xe9\r\xe26\xb9\xe6[t
\xf8g\xd1q\xd6h\xda\xOf\xd1\xfcj’
0x (for hexadecimal representations): 2ca65a45a95d83a5fd9ce26e5ae90de236b9e67b74f867d171d668da0fd1fc6a
Table 4. Combined test results of transcoded key x n A + n B with AES encryption algorithm.
Table 4. Combined test results of transcoded key x n A + n B with AES encryption algorithm.
TypeInitial Parameters and Execution Results
Inputkey: = “ , \xa6ZE\xa9]\x83\xa5\xfd\x9c\xe2nZ\xe9\r\xe26
\xb9\xe6{t\xf8g\xd1q\xd6h\xda\x0f\xd1\xfcj”
plaintext: = “hello world”
Encryptiv, ciphertext: = Encrypt (plaintext, key)
Decryptdecrypted_data: = Decrypt (ciphertext, key, iv)
OutputThe data after encryption:
‘B\x88\x0e\xd0|\xc6\xd9\xbb\x19R\xf6m\x04xD\xda’
The data after decryption: ‘hello world’
Table 5. Analysis and comparison of the CMPKC- k i model with the CEPKC and CMPKC models.
Table 5. Analysis and comparison of the CMPKC- k i model with the CEPKC and CMPKC models.
ModelThe Length of Module N
(in bits)
Key Generation Time
(in ms)
Encryption Time
(in ms)
Decryption Time
(in ms)
CEPKC12848.541.481.37
25699.023.573.53
512190.1410.9310.57
10241182.3642.8541.13
204810,396.48281.16270.61
CMPKC12868.541.621.36
256134.023.933.89
512224.1412.0211.92
10241482.3647.1445.24
204812,696.48318.22297.67
CMPKC- k i 12862.311.461.44
256121.893.523.43
512203.7610.9610.46
10241347.643.6142.13
204811,542.25290.33287.29
Table 6. Brute force attack time comparison in milliseconds.
Table 6. Brute force attack time comparison in milliseconds.
Prime Length
(in bits)
CEPKC
(in ms)
BMPKC
(in ms)
CMPKC
(in ms)
CMPKC- k i
(in ms)
412.425.2720.6625.16
540.8416.16260.85335.96
6263.38129.093288.194438.59
71286.35653.6949,154.3565,516.34
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, C.; Bai, J.; Liang, Y.; Tavares, A.; Wang, L.; Gomes, T.; Pinto, S. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials. Algorithms 2024, 17, 389. https://doi.org/10.3390/a17090389

AMA Style

Zhang C, Bai J, Liang Y, Tavares A, Wang L, Gomes T, Pinto S. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials. Algorithms. 2024; 17(9):389. https://doi.org/10.3390/a17090389

Chicago/Turabian Style

Zhang, Chunfu, Jing Bai, Yanchun Liang, Adriano Tavares, Lidong Wang, Tiago Gomes, and Sandro Pinto. 2024. "An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials" Algorithms 17, no. 9: 389. https://doi.org/10.3390/a17090389

APA Style

Zhang, C., Bai, J., Liang, Y., Tavares, A., Wang, L., Gomes, T., & Pinto, S. (2024). An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials. Algorithms, 17(9), 389. https://doi.org/10.3390/a17090389

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop