Next Article in Journal
Control of Nonlinear Systems with Input Delays and Disturbances Using State and Disturbance Sub-Predictors
Previous Article in Journal
Aggregating Image Segmentation Predictions with Probabilistic Risk Control Guarantees
Previous Article in Special Issue
A Novel Multi-Channel Image Encryption Algorithm Leveraging Pixel Reorganization and Hyperchaotic Maps
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Spin-Wheel: A Fast and Secure Chaotic Encryption System with Data Integrity Detection

by
Luis D. Espino-Mandujano
*,† and
Rogelio Hasimoto-Beltran
*,†
Center for Research in Mathematics (CIMAT), Guanajuato 36240, Mexico
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2025, 13(11), 1712; https://doi.org/10.3390/math13111712
Submission received: 11 April 2025 / Revised: 9 May 2025 / Accepted: 21 May 2025 / Published: 23 May 2025
(This article belongs to the Special Issue Chaos-Based Secure Communication and Cryptography, 2nd Edition)

Abstract

:
The increasing demand for real-time multimedia communications has driven the need for highly secure and computationally efficient encryption schemes. In this work, we present a novel chaos-based encryption system that provides remarkable levels of security and performance. It leverages the benefits of applying fast-to-evaluate chaotic maps, along with a 2-Dimensional Look-Up Table approach (2D-LUT), and simple but powerful periodic perturbations. The foundation of our encryption system is a Pseudo-Random Number Generator (PRNG) that consists of a fully connected random graph with M vertices representing chaotic maps that populate the 2D-LUT. In every iteration of the system, one of the M chaotic maps in the graph and the corresponding trajectories are randomly selected from the 2D-LUT using an emulated spin-wheel picker game. This approach exacerbates the complexity in the event of an attack, since the trajectories may come from the same or totally different maps in a non-sequential time order. We additionally perform two levels of perturbation, at the map and trajectory level. The first perturbation (map level) produces new trajectories that are retrieved from the 2D-LUT in non-sequential order and with different initial conditions. The second perturbation applies a p-point crossover scheme to combine a pair of trajectories retrieved from the 2D-LUT and used in the ciphering process, providing higher levels of security. As a final process in our methodology, we implemented a simple packet-based data integrity scheme that detects with high probability if the received information has been modified (for example, by a man-in-the-middle attack). Our results show that our proposed encryption scheme is robust to common cryptanalysis attacks, providing high levels of security and confidentiality while supporting high processing speeds on the order of gigabits per second. To the best of our knowledge, our chaotic cipher implementation is the fastest reported in the literature.

1. Introduction

Video streaming (on-demand and real-time) has revolutionized our communication culture in all aspects of our lives (social, healthcare, entertainment, business, education, etc.), accounting for 65% of total Internet traffic [1], and it is projected to increase to 82% during 2025 [2]. Among video streaming applications, live or real-time streaming is one of the most popular media transmitted over the Internet (27% more views per video compared to video on demand [3]), allowing for virtual interactions among geographically separated individuals. This increasing demand in video communications has consequently driven the need for users’ right to privacy and consequently propelled the development of highly secure and computationally efficient encryption schemes.
Although the security of current encryption standards is paramount, good performance and low power consumption are equally important aspects that chaos-based encryption schemes can offer [4,5,6]. Previous studies [7,8] have shown that chaos-based block ciphers can consume 150% less energy and be 200% faster than current implementations of the Advanced Encryption Standard (AES) [9] on various platforms, such as desktops, laptops, and smartphones. These promising results open up new possibilities for the development of competitive chaotic encryption schemes on very different platforms, ranging from high-end workstations to mobile devices, including low-performance Internet of Things (IoT) technologies.
However, Chaos-Based Cryptography (CBC) still faces some major challenges, including security, computational complexity, and floating-point precision. The security of CBC schemes depends on the appropriate choice of the underlying chaotic dynamical systems. These systems must have good dynamical properties, such as long cycles, high sensitivity to initial conditions, and an appropriate (uniform) probability distribution. The computational complexity of CBC schemes must be efficient in meeting the demands of modern multimedia applications, especially on power and energy-constrained mobile devices. Lastly, most CBC schemes require floating-point precision calculations, which can introduce rounding errors and affect the probability distribution of generated trajectories, introducing vulnerabilities to the system [10,11]. Despite these challenges, various techniques have been proposed to improve the security and efficiency of CBC schemes, focusing on extending the cycle length at the expense of increasing their computational complexity. Among the most important techniques for this work are multiple maps and perturbation schemes [7,12,13,14,15,16,17], High-Dimensional Chaotic Systems (HDCSs) [18,19,20,21], and LookUp Table (LUT) approaches [22,23]. In particular, the use of LUTs, initially controversial [24,25], is now an excellent solution for robust chaos-based cryptography, as described in Section 2.
The idea behind multiple chaotic maps is to increase both the cycle length and the robustness of the overall system. In this way, an attacker must face the task of breaking a network of chaotic maps rather than a single map. When combined with periodic perturbations, the level of security increases considerably. We are convinced that both the cryptographic strategy itself and the use of multiple low-dimensional chaotic maps should work together to ensure the security of the system. Moreover, the vulnerabilities of chaotic maps should be independent of the overall scheme itself. That is, the scheme should have the ability to overcome these vulnerabilities when they arise.
In [26], a simple Coupled Map Lattice (CML) is proposed for color image encryption, consisting of interacting elements (chaotic maps) through a coupling parameter. Every trajectory produced by the CML is influenced by all maps, providing greater security than single map schemes. A similar but more complex and robust image encryption scheme is proposed in [27]. The authors mixed different chaotic maps (Logistic, Sine and Tent maps) into the CML and applied a Z-scrambling method at a bit level to increase the security of the encryption scheme. A CML variant is presented in [7], in which the N interacting maps are iterated into smaller subgroups rather than collectively. A moving window of size 1 < w < N is defined, and only the maps falling within w are sequentially iterated a random number of times. The window moves periodically along the CML, grouping different maps in such a way that, in the end, all maps are equally iterated. A three-level perturbation scheme is also proposed [7], which modifies the map’s variables, parameters, and the initial key to increase the cycle length of the CML.
Although HDCS offer greater complexity, this often results in a significant decrease in performance [28,29], resulting in slower schemes. Excess complexity is the main cause of speed limitations in many chaos-based schemes [28,30,31]. In [32], the authors propose a multi-channel image encryption algorithm that makes use of pixel reorganization and hyperchaotic maps. Their algorithm employs two hyperchaotic maps to jointly generate chaotic sequences to obtain better randomness. Then, two rounds of scrambling and diffusion operations are applied and coupled with one round of substitution operations to the high 4-bit components of the image. For the 4-bit low components, one round of substitution and diffusion operations is conducted. In [33], an encryption algorithm is proposed, using a new Pseudo-Random Number Generator (PRNG) based on mixing three-dimensional variables of a cat chaotic map. A uniformly distributed chaotic sequence by a logistic map is also used during a pixel mixing step. The core of the algorithm is to use the sequence generated by the PRNG to achieve the disruption and diffusion of the image pixels and produce an effect of obfuscation and encryption of the image content. Hyperchaos and biological systems such as DNA sequence merging have been proposed for robust image encryption [23,34,35,36,37]. The authors in [34] transform the input image into a binary matrix, then carry out DNA encoding, and they perform the DNA sequence complement operation using two logistic maps. olor image encryption based on the DNA and double chaos system is proposed [35]. After the input image is scrambled, three sets of chaotic sequences are generated using Lorenz chaotic mapping and fourth-order Rossler hyperchaotic to transform the chaotic component images and chaotic sequences into DNA sequences. They applied the DNA coding rules and three DNA operation rules for the final image encryption.
The use of chaotic maps along with dynamic LUT models has been shown to generate fast and secure encryption systems with an excellent avalanche effect (ciphertexts from slightly different plaintexts differ significantly), as described in [38]. An LUT can be seen as a transformation function in which the input value produces an index to be used in the encryption process. The beginning of LUT models can be traced back to Baptista (1998) [39], who proposed an iterative chaotic encryption scheme where the phase space is divided into M equal-sized subintervals corresponding to the number of elements in the plaintext alphabet. Each plaintext alphabet is assigned to one subinterval and encrypted as the number of iterations on the logistic map needed to visit the corresponding subinterval departing from a private initial condition. Baptista´s scheme and variants stayed in the eye of the hurricane for more than 10 years due to security flaws and low speed performance [40]. A different and improved LUT approach is proposed in [38], in which the M subintervals are represented by indices pointing to chaotic trajectories stored (initially) in sequential order. Since the indices are randomly chosen, the encryption process is performed using non-sequential trajectories that may be far apart (in time) from each other, increasing the security and speed of the system.
Our goal is to develop a system that is not only secure but also highly efficient and adaptable to the needs of modern real-time multimedia applications. In contrast to previously mentioned approaches that use high-dimensional or multiple chaotic maps sequentially iterated, in this research, we propose a simpler and more efficient structure based on the concept of a random graph of chaotic maps (representing the vertices), wherein maps are randomly selected via a spin-wheel-like procedure. This random selection, combined with a new two-dimensional lookup table of trajectories and random perturbations, allows for a higher degree of diffusion and confusion in the ciphertext, increasing resistance to cryptanalysis attacks. Finally, a fast and robust scheme is incorporated after the encryption process to establish the integrity of the encrypted plaintext at the recipient’s end [41]. The overall goal of this research is to develop an encryption scheme that provides an optimal balance between security and performance, focusing on applications that require a high level of confidentiality and low latency.

2. Proposed Scheme

Our proposed encryption algorithm can be applied to any type of multimedia data, including text, audio, images, and video, in a compressed or uncompressed domain. It is independent of the compression method and can be applied as full or selective encryption [4,37,42,43,44], depending on the level of security required by the application. Broadly speaking, our encryption system consists of three main modules (see Figure 1): (a) A Pseudo-Random Number Generator (PRNG), the core algorithm in the encryption process; (b) Encryption Process; and (c) Data Integrity Protection (DIP), a mechanism for detecting ciphertext manipulation or attacks during the communication process. Each module is described in detail in the following subsections.

2.1. Pseudo-Random Number Generator (PRNG)

Our PRGN is based on the concept of a random graph or random network of M chaotic maps and a 2-Dimensional LUT (2D-LUT) of size N x M that stores N trajectories per map. Each map and corresponding trajectories are randomly selected on the basis of the Spin-Wheel Picker (SWP) game. The SWP generates two random indices, one for the selection of the chaotic map and the other for the corresponding map trajectory within the 2D-LUT. In this way, every system iteration generates random trajectories from different maps without a predefined temporal order (older trajectories may be randomly used before newer ones within the selected map), which increases the robustness of the system against various attacks such as brute-force, plaintext, ciphertext, etc. Each requested trajectory is replaced by a new one coming from the sequential iterative process of the corresponding selected map. Each component of the PRNG is described in detail in the following sub-sections.

2.1.1. Chaotic Map: Digitized Renyi Map

An important decision that must be made in any chaos-based encryption is the choice of the chaotic map (i.e., the core function of the system). Since our interest lies in developing a fast and highly secure encryption system, we choose a digitized version of the Renyi map [45], defined as follows:
x k = Φ ( x k 1 ) = ( β x k 1 + ( x k 1 n ) ) m o d 2 P R
where Φ is the Renyi map function, k is the iteration index, β Z > 0 and 1 n 8 are control parameters, P R is the CPU bit-precision (32 or 64 bits), and x 0 Z > 0 is the initial condition. Φ is defined over the integer domain and generates trajectories with much higher speed than the corresponding chaotic maps with floating-point arithmetic. However, as a digitized chaotic map, it presents degraded dynamic properties caused by the limited precision of computers (see [15]). In consequence, its statistical properties and cycle length are severely degraded compared to their analog representation, resulting in trajectories with poor random behavior. Furthermore, the trajectories of the Renyi map follow a linear process (see Equation (1)), increasing until they exceed the computer precision and the wrap-around occurs. Having consecutive trajectories of this map significantly reduces the number of possible parameters, making it partially predictable to an attacker. Ideal chaotic behavior has been shown not to be necessary from the chosen map, as long as the proposed scheme provides the mechanisms or strategies to improve randomness, mitigate cycles, overcome fixed points, and generate a uniform distribution [38]. Our proposed scheme is intended to provide all the necessary protection to avoid exposing the identity of chaotic maps.

2.1.2. PRNG Initialization

The initialization process (Algorithm 1) begins by assigning random values to each map parameter and initial variable, according to a predefined seed or system key K, as shown in Figure 2a. β and x 0 are represented by P R = 64 bits (see Table 1), while n is represented by 8 bits; therefore, 136 bits are taken from the cipher key ( K ) to initialize each map in sequential order (from 1 to M). The longer the encryption key, the greater the number of chaotic maps involved in the system. For M maps, a key length of 136 × M bits is required; however, if K is shorter, a bit overlap strategy of at most P R / 2 bits can be used to initialize each map to avoid the same or similar control parameters. The M maps are represented as follows:
x m , k = Φ m ( x m , k 1 ) = ( β m x m , k 1 + ( x m , k 1 n j ) ) ( m o d 2 P R )
where 8 m M is the current map index and M 16 is the total number of maps as a function of 1088 K 2176 bits (without map overlapping). For every cipher session, different system’s seeds are employed; that is, K is a random variable in both value and length (and thus M). An associated matrix (2D-LUT) is then built and fed with N sequential trajectories from each map to form an N × M initial matrix (Figure 2b). It is worth mentioning that this is the only step in which the trajectories for each map (or column) are inserted in order in the 2D-LUT; during plaintext encryption, the trajectories are inserted randomly for additional security (as explained later in Section 2.1.1).
Algorithm 1 Initialization
  1:
Parameters, X_initials = PRNG_SEED
  2:
H = 0 // Perturbation Term
  3:
Maps = [ Map(Parameter,X) for Parameter,X in Parameters, X_initials ]
  4:
for i in 0…N do // Fill the the trajectories 2D-LUT
  5:
     for j in 0…M do
  6:
          2D-LUT[i][j] = Maps[i].next() // this also updates Maps[i].X
  7:
     end for
  8:
end for
  9:
T L A S T = 2D-LUT[i][j] // Sets the last value entered into the 2D-LUT
10:
iteration = 0
11:
for m in 0…M do
12:
     H = H ⨁ Matrix[N][M]
13:
end for
Once the look-up table has been populated, a system perturbation variable (to be used during ciphering) is initialized as follows:
H i = 0 = m = 1 M 2 D - LUT [ N , m ]
where i represents the system iteration index, and H i = 0 represents the XOR (⨁) operation of the last inserted trajectories in the 2D-LUT per map; that is, all map trajectories along the N t h row (Figure 2b). H i > 0 is updated on an iteration basis using the most recently inserted trajectory. The main function of H i during the encryption process is to randomly perturb individual maps with contributions from all maps (as explained in the following subsection), modifying in this way the future behavior and dynamics of the encryption system. Finally, T L A S T = 2 D - LUT [ N , M ] is the last trajectory inserted in the lookup-table and used by the SWP for the selection of a map ( T L A S T varies on an iteration basis).

2.1.3. Spin-Wheel and Crossover Process

The goal of our proposed PRNG is to create complex and mutual interactions between maps to lengthen the encryption system cycle. Our strategy is to avoid using consecutive trajectories of the same map or a predefined sequence of maps; otherwise, chaotic parameters could be inferred and used to predict future values of the sequence. Our PRNG consists of two schemes (Figure 3):
Spin-Wheel Picker (SWP): The first step in the PRNG is the random selection of the map and corresponding trajectory within the 2D-LUT employing the SWP strategy (Figure 3a). The SWP generates two random indices, one for the selection of the map (column index) and another for the selection of its corresponding trajectory (row index) in the 2D-LUT. In the first case (map index), the SWP is simulated by putting together the M maps in a circular array and using the module operation as follows:
m i = ( T L S B ( i 1 ) m o d M ) + 1 ;
where m i is the selected map index in the 2D-LUT at global or system iteration i, and T L S B is the Least Significant Byte (LSB) of T L A S T . The corresponding trajectory or row index ( t i ) is obtained in a similar way as in Equation (4), except that we now use the Most Significant Byte (MSB) of T L A S T , named T M S B :
t i = ( T M S B ( i 1 ) m o d N ) + 1 ;
The corresponding random trajectory T m i = L U T [ t i , m i ] becomes the seed for generating the final trajectories to be used in the ciphering process (described in Section 2.2).
Crossover Strategy: In our second step, three additional trajectories are generated through a p-point crossover operation between the selected trajectories T m i and its adjacent trajectory T m i + 1 = L U T [ t i , m i + 1 ] (Figure 3b). During crossover, a random bit position p = ( T L A S T m o d ( P R 15 ) ) + 8 is calculated so that the first 8 p ( P R 8 ) bits of T m i and the P R p bits of T m i + 1 are combined to generate the first final trajectory (out of three) of the i t h iteration T F 1 , i , as shown in Figure 4. After this process, the bits used in T m i and T m i + 1 are replaced by the next trajectory of the selected chaotic map. The Φ m i map is first perturbed with the following expression:
x m , k = Φ m i ( x m i , k 1 ) + ( H i m o d ϵ ) ;
where ( H i mod ϵ ) is the perturbation mechanism and ϵ is an arbitrary 3-bit value obtained from the crossover variable T F 1 , i . The new perturbed trajectory x m i , k is now inserted in L U T [ m i , t i ] . Henceforth, the 2D-LUT holds original and perturbed trajectories in the same column (or map) in a nonsequential order, and both are available to be randomly picked for future iterations. T m + 1 , i is simply replaced by the next iterated trajectory L U T [ t i , m i + 1 ] = x m i + 1 , k = Φ m i + 1 ( x m i + 1 , k 1 ) , which is also involved in the new values of T L A S T = x m i + 1 , k and H i = H i 1 T L A S T .
Similarly, to compute the second final trajectory, new indices m i and t i are calculated from the SWP (Equations (4) and (5)) based on the least and most significant bytes of the new T L A S T , respectively. The new adjacent and randomly selected trajectories T m i and T m i + 1 are retrieved from the 2D-LUT to go through the p-point crossover operation to obtain T F 2 , i . In a similar fashion as in T F 1 , i , T m i and T m i + 1 are replaced by new trajectories from their corresponding maps, and T L A S T and H i are updated, respectively. The same operation is performed to obtain T F 3 , i . As can be seen, only those trajectories selected by the SWP are perturbed; the corresponding adjacent trajectories (which become the actual T L A S T ) are used as pointers to the new indices for the next trajectory.
It is worth noting that the described approach ensures that it is not possible to know which trajectory corresponds to each map at a given time. As a result, even if an attacker obtains consecutive trajectories used in the ciphering processing, he cannot easily determine the parameters of an individual map because the trajectories are masked (crossover process) and do not necessarily belong to the same map consecutively. The random selection of maps and trajectories breaks the continuity of the entire system.
The process used to generate a single random number is explained in Algorithm 2.
Algorithm 2 Random Number Generation
  1:
// SWP random selection of the map and trajectory indices
  2:
m i = T L S B mod M
  3:
t i = T M S B mod N
  4:
selected_trajectory = 2D-LUT[ t i , m i ]
  5:
selected_trajectory_secondary = 2D-LUT[ t i , m i + 1 mod M]
  6:
// Crossover Strategy
  7:
p = ( T L A S T mod (PR − 15)) + 8
  8:
TF = crossover(selected_trajectory, selected_trajectory_secondary, p)
  9:
// before returning the random number we have to replace the random bits used
10:
// ϵ & H adds the perturbation term
11:
T L A S T = Maps[ m i ].next() + ϵ & H
12:
H = H ⨁ T L A S T
13:
// —————————–
14:
// this will replace only the bits used to generate the random number
15:
selected_trajectory = crossover( T L A S T , selected_trajectory, p)
16:
selected_trajectory_secondary = crossover(selected_trajectory_secondary, T L A S T , p)
17:
// —————————–
18:
return TF

2.2. Ciphertext and Data Integrity

A resistant encryption scheme along with a simple mechanism to verify and detect data integrity at the receiver’s end is proposed. For each cipher block i, three final trajectories ( T F l , i ( 1 l 3 )) are generated by the PRNG (Section 2.1) and combined in a block-cipher as follows:
C i = E P i : = P i + T F 1 , i T F 2 , i Φ M + 1 T F 3 , i i = 1 P i + T F 1 , i T F 2 , i Φ M + 1 C i 1 T F 3 , i i > 1
P i is the plaintext of length PR bits, C i is the corresponding ciphertext, and Φ M + 1 is a new Renyi map with parameters β = T F 1 , 1 T F 2 , 1 H i and n = ( T F 3 , 1 m o d 8 ) . Φ M + 1 is independent of the PRNG and only participates in the cipher as a feedback transformation function between previous ciphertext ( C i 1 ) and the actual final trajectory T F 3 , i . It creates ciphertext dependencies in each iteration, making the system more sensitive to changes in the plaintext and corresponding key. As described in Section 3 (Performance Analysis), due to feedback transformation, it is difficult to determine the individual values of T F 1 , i , T F 2 , i , T F 3 , i , C i 1 , and Φ M + 1 parameters ( β and n). Moreover, it is practically impossible to determine the original trajectories and corresponding parameters of the ( M ) Renyi maps for the following reasons: (a) trajectories may have gone through multiple perturbations; and (b) trajectories in the LUT are taken randomly.
A severe disadvantage of adding feedback to the cipher is that a single bit error in the received bitstream impedes deciphering of all remaining data. To solve this, packets (transmitted over the Internet) are ciphered independently; that is, feedback is reset on a packet basis, eliminating all dependencies among them (the dependency is only intra-packet). If a packet is lost, the rest of the information can still be deciphered. In the case of an attack, such as Man-in-the-Middle, the intruder positions himself between two-party communication and may divert and/or alter original messages, taking control of the communication. The mechanism for verifying data integrity is simple and lightweight; it does not have an impact on the encryption/decryption speed or the information transfer time. The scheme is based on a predefined SHA-256 key, known by both the sender and receiver. Each byte of the SHA-256 key (32 bytes long), represented by S H A 8 i ( 1 i 32 ) , is transformed according to the ciphertext content of each packet as follows:
D I p = Φ M + 1 ( ( B Y T E _ S U M ( P p ) ) SHA 8 b = ( p m o d 32 ) + 1 )
The resulting byte D I p is appended to the corresponding cipher-packet as an identifier of data integrity. D I p (where p is the packet number) is obtained by adding all bytes in the last plaintext of the processing packet ( B Y T E _ S U M ( P p ) ) and XORed with the b t h byte of S H A 8 b , and the result is transformed by Φ M + 1 .
The decryption process consists of performing the inverse operations; therefore, the inverse transformation is expressed as follows:
P i = D C i : = C i T F 2 , i Φ T F 3 , i T F 1 , i i = 1 C i T F 2 , i Φ C i 1 T F 3 , i T F 1 , i i > 0
where Equation (8) remains unmodified. The operations performed are practically the same as during encryption, so in contrast to other encryption algorithms such as AES, the encryption and decryption speeds should be the same.
After processing the ciphertext, the last deciphered text should coincide with the original plaintext P p , which is then used to compute a candidate byte S H A 8 b . The computed candidate byte is compared with the real S H A 8 b ; if they coincide, then the package is considered legitimate; otherwise, the packet has been tampered with.

3. Performance Analysis

In this section, the performance of the proposed scheme is analyzed based on the following cryptosystem properties: (1) PRNG randomness test; (2) map selection randomness; (3) PRNG seed sensitivity; (4) ciphertext distribution; (5) correlation analysis; (6) cryptographics attack; and (7) speed performance. The scheme is applied to various plaintext formats (see Table 2) using different number of maps ( 8 M 16 ) and, consequently, different system key lengths ( 1088 K 2176 ).

3.1. PRNG Randomness Test

To characterize the effectiveness of our PRNG, we applied the random test suite developed by the National Institute of Standards and Technology (NIST) [49], with parameters specified in Table 3.
By applying the proposed SWP approach with Renyi maps, our proposed PRNG successfully passes the NIST tests, as shown in Table 4, demonstrating a uniform distribution and robust randomness suitable for cryptographic applications. The success of this approach, in passing the tests, can be primarily attributed to the random selection of maps and the coupling term between different trajectories (crossover process). This coupling term acts as “noise” that masks the calculation errors in digitized maps and diversifies the values, achieving a more ideal random behavior.

3.2. Map Selection Randomness

Another aspect investigated is the efficiency of the number of chaotic maps in the SWP. Although the overall randomness of the PRNG has been verified with randomness tests (Section 3.1), it is important to ensure that the selection of maps is done optimally (unbiased) and does not generate unnecessary computational resources. In this sense, the present analysis focuses on evaluating the efficiency of the SPW in the random selection of chaotic maps. For this, we created an occurrence table to record each time a chaotic map is selected and analyzed the frequency distribution using both the χ 2 test and the Quantile–Quantile plot (QQ-plot), which represent a graphical tool to help us assess whether a set of data plausibly came from some theoretical distribution, such as the uniform distribution in this case.
Figure 5 shows the evolution of the χ 2 uniformity test with a significance level of α = 0.1 for different numbers of maps. It can be seen that the number of maps used in the generation process within the range 8 M 16 is above the significance level, which means that there is enough evidence to conclude that the distribution is uniform (all maps have the same probability of being visited during the encryption process). It is worth noting that, when the number of maps is a power of 2, the significance level is asymptotically close to 1. A QQ-plot and histogram visualization reveal that no matter the number of maps, the uniformity test is confirmed, as shown in Figure 6.

3.3. PRNG Seed Sensitivity

A systematic approach to evaluate the sensitivity of the PRNG to the initial seed is conducted using the Hamming distance (number of bit positions at which the corresponding symbols are different). By analyzing the distribution of the calculated Hamming distances, insights into the sensitivity of the PRNG to the initial seed are obtained. First, an initial random seed is selected as a starting point. This seed is then subject to systematic modifications by changing a single bit and generating a sequence of random numbers using the PRNG. Subsequently, the Hamming distance between the encrypted sequence generated with the original seed and the sequence generated with the modified seed is calculated. We perform this process for every single bit in K, and the results obtained indicate a high sensitivity of the PRNG to the initial seed. The average Hamming distance was found to be close to 0.5 (see Figure 7), suggesting that, on average, half of the bits in the random sequences differ when a single bit of the seed is modified. This confirms that small changes in the initial seed produce significant changes in the generated random number sequences. In other words, our PRNG fulfills a fundamental requirement for randomness and security: the impossibility of predicting the random number sequence from a similar seed or the inability to perform a local search starting from a seed that produces a similar sequence. Additionally, the high sensitivity to the seed provides significant resistance against brute-force attacks, enhancing the security of the PRNG.

3.4. Ciphertext Distribution

A fundamental requirement for a secure encryption scheme is to produce ciphertext with a uniform distribution, regardless of the plaintext’s distribution. This ensures that each symbol in the ciphertext has an equal probability of occurrence, thwarting attempts by attackers to identify statistically significant patterns. Such patterns could potentially reveal information about the underlying plaintext. By rendering a ciphertext that is indistinguishable from random noise, the proposed encryption scheme effectively masks the characteristics of the original data.
Figure 8 illustrates the effectiveness of the proposed encryption scheme. The plaintext image, when encrypted, undergoes a significant transformation, resulting in a ciphertext image that is visually indistinguishable from random noise. This is evident in the histograms of the plaintext and ciphertext images. The plaintext histogram exhibits distinct peaks and valleys, reflecting the non-uniform distribution of pixel intensities. In contrast, the ciphertext histogram shows a nearly flat distribution, indicating that the encryption process has successfully randomized the pixel values. This uniform distribution is a key characteristic of a strong encryption scheme, as it makes it difficult for attackers to extract any meaningful information from the ciphertext. Figure 9 shows original and encrypted histograms for audio and video data, respectively, wherein the same uniform ciphertext pattern as in Figure 8 is obtained. Therefore, our encryption system provides uniform ciphertexts independently of the data type and compression scheme.

3.5. Correlation Analysis

We now present the effect of two different system keys on the resultant ciphertext for the same plaintext. For this, we make use of Pearson’s correlation coefficient. This statistical measure allows us to determine the relationship between pairs of ciphertexts generated with slightly different keys. It quantifies the linear relationship between two variables; that is, it indicates how well the data fit into a straight line. The correlation coefficient can take values between 1 and 1 and is defined as follows:
r x y = n x i y i x i y i n x i 2 ( x i ) 2 n y i 2 ( y i ) 2
If the correlation is high (close to 1 or 1 ), it means that a small change in the key produces a predictable change in the ciphertext, indicating a weakness in the cipher. Conversely, if the correlation is low (close to 0), it indicates that the cipher is resistant to key changes, producing significant and unpredictable changes in the ciphertext. To evaluate the sensitivity of the encryption algorithm to key modifications, we modify the most significant, least significant, and middle bits. By analyzing the correlation coefficients obtained for each file type and each key modification (see Table 5), it was consistently observed that the values were close to zero (we have included a pdf book in our current test).

3.6. Cryptographic Attack

With the aim of determining the strength of our encryption scheme, we evaluate the computational complexity of recovering the random numbers or trajectories involved in the ciphering process. This is evaluated based on the following cryptanalysis techniques: brute force, chosen ciphertext, and chosen plaintext attacks.
In brute-force attacks, the main objective is to infer the system key K. In our case, it requires ( 2 1088 K 2176 ) operations to break the entire system, becoming a practically impossible task with current computer performance. Since we allow an overlapping system-key (additional maps can be created by reusing a portion of K), the order of the attack becomes even higher since we have more unknown number maps than the original key length can provide (see Section 2.1 System Initialization). With key overlapping, the total brute force attack becomes 2 1088 K 2176 + 2 N ( P R = 64 ) / 2 , where N is the number of additional maps derived from K.
In chosen ciphertext attack, the attacker can generate the corresponding plaintext P i from the selected ciphertext C i ). By analyzing this relationship, the attacker may be able to deduce the key. For this, it is necessary to first determine the values of the final trajectories T F 1 , i , T F 2 , i , and ϕ ( c i 1 T F 3 , i ) on an iteration basis (see Equation (9)). Given that PRNG and ciphertext have a uniform distribution and considering that each packet is independently encrypted with an average length of 720 bytes (it contains 90 ciphertexts requiring 3 × 64 bit final trajectories), then the chosen ciphertext attack becomes 2 90 × ( 3 × 64 ) = 17 , 280 (for only one packet). It is better but still hard to guess the 90 64-bit plaintexts in each packet ( 2 90 × 64 = 5720 ). If, on the other hand, the target attack is to find the parameters and initial condition of the M maps, it becomes again an impossible task. It is necessary to find the inverse process of the entire cipher system, i.e., T F ( 1 , 2 , 3 ) , i , ϕ ( ) , the inverse of the crossover, the trajectory used for selecting a map by the S W P , etc. Finally, for a chosen plaintext attack, in which the attacker can choose specific messages (plaintexts) and the corresponding ciphetext to analyze correspondences, the same inverse process (as in the chosen ciphertext attack) needs to be performed. As can be seen, the best option to attack the system is brute force. The proposed PRNG is robust enough for currently known attacks.
The integrity of the received ciphertext information (or packets) may also be subject to attacks using, for example, a man-in-the-middle attack (see Section 2.2). In this attack, an intruder may be eavesdropping on private communication between the sender and receiver, sometimes altering or replacing messages to disrupt the conversation. To simulate this attack, we performed a random permutation of bits within a packet, randomly toggled random bits in the ciphertext sequence, then deciphered into plaintext and checked whether the integrity byte matched the correct value. The experiment was repeated one million times, and the collisions were counted and compared for the full number of experiments. Our results show a probability of 0.0039 that an integrity attack would pass undetected.

3.7. Speed Performance

Encryption speed is a critical factor in many applications, especially those that require real-time processing of large volumes of data, such as video streaming. This section presents the speed performance of the encryption algorithm on two different platforms, as shown in Table 6.
To compare the efficiency of our proposed scheme against AES and other state-of-the-art chaotic ciphers, a performance experiment was conducted. In each test, a random 1 GB file was generated and encrypted using each of the algorithms. To ensure an accurate measurement of the encryption time, the initialization time of the algorithm was excluded. The results obtained were expressed in terms of encryption speed, measured in gigabits per second. To ensure a fair comparison between the algorithms, only software implementations of AES provided by the OpenSSL library (version 3.0.7) were used.
As shown in Table 6, the proposed encryption scheme was found to be significantly faster than the rest. A noteworthy observation is that the Roulette scheme has virtually the same encryption and decryption speed, whereas AES has a higher encryption speed. We consider this property to be of great importance for real-time communications, as if encryption is faster, the source may send messages faster than the destination can process them, introducing additional latency between messages.
To further characterize the performance of the developed cipher system, the relationship between the size of the data being ciphered and the corresponding cipher processing time was investigated. Figure 10 illustrates this dependency for 1KB data size increments, showing an overall positive linear correlation between ciphered data size and cipher time. In general, this indicates that our proposed cipher algorithm processes the data in a consistent manner, taking a relatively constant amount of time per byte.

4. Conclusions

The proposed scheme is based on a random roulette method for selecting and iterating through a graph composed of M chaotic maps and an N × M lookup table, with N precalculated trajectories initially ordered in temporal order for each map M. Three random values are involved in the encryption process: (1) selection of the map M i through the random roulette; (2) selection of the trajectory of the map i t h map ( M i , j ) in the lookup table; and (3) random selection of the variable 0 O f f s e t < 8 , which indicates the position of the byte within the selected map trajectory from which the trajectory will start for the encryption process (each trajectory consists of 8 bytes). Point (2) indicates that the trajectories of each map are not used sequentially or in temporal order, while point (3) indicates that the final trajectory selected within the lookup table may come from up to two contiguous maps M i and M i + 1 , containing the first bytes of M i and the last of M i + 1 , which significantly increases the security of the system in case of attacks. Experimental analysis demonstrates that the developed scheme is completely random in terms of trajectory generation and selection of maps or nodes in the chaotic map graph, showing a uniform distribution in both cases. There is an equal probability of visiting any map within the graph, offering high security against both system and brute-force attacks. According to the reported encryption speeds, the proposed scheme is theoretically capable of serving hundreds of real-time video communications without affecting performance. Based on our state-of-the-art literature review, we can confirm that our proposed encryption scheme is the fastest reported in the literature.
Since our proposed scheme exhibits a very high performance, the main target applications are real-time multimedia communications (audio, image, and video). In the context of video conferencing, the implementation of this scheme would enable higher concurrent participants without perceptible degradation in the stream quality. This capability holds significant implications for applications which require secure communication for sensitive domains, including governmental and corporate sectors, remote medical consultations, or financial exchanges.

Author Contributions

Software, L.D.E.-M.; Investigation, L.D.E.-M. and R.H.-B.; Writing—original draft, L.D.E.-M.; Writing—review & editing, R.H.-B.; Supervision, R.H.-B. All authors have read and agreed to the published version of the manuscript.

Funding

The APC was funded by Secretaría de Ciencia, Humanidades, Tecnología e Innovación (SECIHTI) and CIMAT.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. PR-Newswire: Press Release Distribution, Targeting, Monitoring and Marketing. Available online: https://www.prnewswire.com/ (accessed on 10 April 2025).
  2. Vidico: Video Production Company. 2025. Available online: https://vidico.com/ (accessed on 10 April 2025).
  3. CONVIVA. 2025. Available online: http://www.conviva.com/ (accessed on 10 April 2025).
  4. Hasimoto-Beltran, R.; Calderon-Calderon, M.D.; Olavarría-Jaramillo, V.H. Secure real-time chaotic partial encryption of entropy-coded multimedia information for mobile devices: Smartphones. IEEE Access 2022, 10, 15876–15890. [Google Scholar] [CrossRef]
  5. Bentafat, E.; Rathore, M.M.; Bakiras, S. Towards real-time privacy-preserving video surveillance. Comput. Commun. 2021, 180, 97–108. [Google Scholar] [CrossRef]
  6. Jeong, E.S.; Kim, B.H.; Lee, D.H. A generic partial encryption scheme for low-power mobile devices. Multimed. Tools Appl. 2014, 72, 2087–2106. [Google Scholar] [CrossRef]
  7. Hasimoto-Beltrán, R. High-performance multimedia encryption system based on chaos. Chaos Interdiscip. J. Nonlinear Sci. 2008, 18, 023110. [Google Scholar] [CrossRef]
  8. Almasalha, F.; Hasimoto-Beltran, R.; Khokhar, A.A. Partial encryption of entropy-coded video compression using coupled chaotic maps. Entropy 2014, 16, 5575–5600. [Google Scholar] [CrossRef]
  9. Bernstein, D.J.; Schwabe, P. New AES software speed records. In Proceedings of the Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on Cryptology in India, Kharagpur, India, 14–17 December 2008; Proceedings 9. Springer: Berlin/Heidelberg, Germany, 2008; pp. 322–336. [Google Scholar]
  10. Li, S.; Mou, X.; Cai, Y.; Ji, Z.; Zhang, J. On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision. Comput. Phys. Commun. 2003, 153, 52–58. [Google Scholar] [CrossRef]
  11. Öztürk, İ.; Kiliç, R. Cycle lengths and correlation properties of finite precision chaotic maps. Int. J. Bifurcat. Chaos 2014, 24, 1450107. [Google Scholar] [CrossRef]
  12. Bogdan, C.; Chargé, P.; Fournier-Purnaret, D. Behavior of chaotic sequences under a finite representation and its cryptographic applications. In Proceedings of the IEEE Workshop on Nonlinear Maps and Applications (NOMA), Toulouse, France, 13–14 December 2007. [Google Scholar]
  13. Cao, H.; Lan, Y. Chaos perturbation in terms of cycles. Results Phys. 2024, 58, 107514. [Google Scholar] [CrossRef]
  14. Hasimoto-Beltrán, R.; Ramírez-Ramírez, R. Cycle detection for secure chaos-based encryption. Commun. Nonlinear Sci. Numer. Simul. 2011, 16, 3203–3211. [Google Scholar] [CrossRef]
  15. Merah, L.; Ali-Pacha, A.; Hadj-Said, N.; Belkacem, M. New and efficient method for extending cycle length of digital chaotic systems. Iran. J. Sci. Technol. Trans. Electr. Eng. 2019, 43, 259–268. [Google Scholar] [CrossRef]
  16. Hosny, K.M.; Elnabawy, Y.M.; Salama, R.A.; Elshewey, A.M. Multiple image encryption algorithm using channel randomization and multiple chaotic maps. Sci. Rep. 2024, 14, 30597. [Google Scholar] [CrossRef] [PubMed]
  17. Hasimoto-Beltrán, R. Low-complexity chaotic encryption system. Rev. Mex. Física 2007, 53, 58–65. [Google Scholar]
  18. Palacios, A.; Juarez, H. Cryptography with cycling chaos. Phys. Lett. A 2002, 303, 345–351. [Google Scholar] [CrossRef]
  19. Tang, W.K.S.; Liu, Y. Formation of high-dimensional chaotic maps and their uses in cryptography. In Studies in Computational Intelligence; Springer: Berlin/Heidelberg, Germany, 2011; pp. 99–136. [Google Scholar]
  20. Fu-Yan, S.; Shu-Tang, L.; Zong-Wang, L. Image encryption using high-dimension chaotic system. Chin. Phys. 2007, 16, 3616–3623. [Google Scholar] [CrossRef]
  21. Li, L.; Wang, W.; Li, J. A novel image encryption algorithm based on high-dimensional compound chaotic systems. In Proceedings of the 2011 International Conference on Multimedia Technology, Hangzhou, China, 26–28 July 2011. [Google Scholar]
  22. Cheng, P.; Yang, H.; Wei, P.; Zhang, W. A fast image encryption algorithm based on chaotic map and lookup table. Nonlinear Dyn. 2015, 79, 2121–2131. [Google Scholar] [CrossRef]
  23. Wang, S.; Pan, J.; Cui, Y.; Chen, Z.; Zhan, W. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems. Mathematics 2024, 12, 3297. [Google Scholar] [CrossRef]
  24. Wong, K.W. A combined chaotic cryptographic and hashing scheme. Phys. Lett. A 2003, 307, 292–298. [Google Scholar] [CrossRef]
  25. Alvarez, G.; Montoya, F.; Romera, M.; Pastor, G. Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys. Lett. A 2004, 326, 211–218. [Google Scholar] [CrossRef]
  26. Pisarchik, A.; Zanin, M. Image encryption with chaotically coupled chaotic maps. Phys. D Nonlinear Phenom. 2008, 237, 2638–2648. [Google Scholar] [CrossRef]
  27. Wang, X.; Guan, N.; Zhao, H.; Wang, S.; Zhang, Y. A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Sci. Rep. 2020, 10, 9784. [Google Scholar] [CrossRef]
  28. Chu, R.; Zhang, S.; Gao, X. A novel 3D image encryption based on the chaotic system and RNA crossover and mutation. Front. Phys. 2022, 10, 844966. [Google Scholar] [CrossRef]
  29. Al-Masalha, F.; Hasimoto, R.; Khokhar, A. Performance evaluation of different encryption schemes on portable and mobile platforms. In Proceedings of the International Conference on Green Computing, Chicago, IL, USA, 15–18 August 2010; pp. 435–441. [Google Scholar]
  30. Feng, L.; Du, J.; Fu, C.; Song, W. Image encryption algorithm combining chaotic image encryption and convolutional neural network. Electronics 2023, 12, 3455. [Google Scholar] [CrossRef]
  31. Gasri, A.; Khennaoui, A.A.; Ouannas, A.; Grassi, G.; Iatropoulos, A.; Moysis, L.; Volos, C. A New Fractional-Order Map with Infinite Number of Equilibria and Its Encryption Application. Complexity 2022, 2022, 3592422. [Google Scholar] [CrossRef]
  32. Feng, W.; Yang, J.; Zhao, X.; Qin, Z.; Zhang, J.; Zhu, Z.; Wen, H.; Qian, K. A novel multi-channel image encryption algorithm leveraging pixel reorganization and hyperchaotic maps. Mathematics 2024, 12, 3917. [Google Scholar] [CrossRef]
  33. Shi, L.; Li, X.; Jin, B.; Li, Y. A chaos-based encryption algorithm to protect the security of digital artwork images. Mathematics 2024, 12, 3162. [Google Scholar] [CrossRef]
  34. Zhang, Q.; Guo, L.; Wei, X. Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 2010, 52, 2028–2035. [Google Scholar] [CrossRef]
  35. Liu, Q.; Liu, L. Color image encryption algorithm based on DNA coding and double chaos system. IEEE Access 2020, 8, 83596–83610. [Google Scholar] [CrossRef]
  36. Wang, Y.; Wu, C.; Kang, S.; Wang, Q.; Mikulovich, V. Multi-channel chaotic encryption algorithm for color image based on DNA coding. Multimed. Tools Appl. 2020, 79, 18317–18342. [Google Scholar] [CrossRef]
  37. Khan, J.S.; Boulila, W.; Ahmad, J.; Rubaiee, S.; Rehman, A.U.; Alroobaea, R.; Buchanan, W.J. DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption. IEEE Access 2020, 8, 159732–159744. [Google Scholar] [CrossRef]
  38. Hasimoto-Beltran, R. Freac-LUT: A new dynamic look-up table approach to secure chaotic encryption. Int. J. Bifurc. Chaos 2013, 23, 1350004. [Google Scholar] [CrossRef]
  39. Baptista, M. Cryptography with chaos. Phys. Lett. A 1998, 240, 50–54. [Google Scholar] [CrossRef]
  40. Rhouma, R.; Solak, E.; Arroyo, D.; Li, S.; Alvarez, G.; Belghith, S. Comment on “Modified Baptista type chaotic cryptosystem via matrix secret key. Phys. Lett. A 2009, 373, 3398–3400. [Google Scholar] [CrossRef]
  41. Conti, M.; Dragoni, N.; Lesyk, V. A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 2016, 18, 2027–2051. [Google Scholar] [CrossRef]
  42. Lui, O.Y.; Wong, K.W. Chaos-based selective encryption for H.264/AVC. J. Syst. Softw. 2013, 86, 3183–3192. [Google Scholar] [CrossRef]
  43. Massoudi, A.; Lefebvre, F.; De Vleeschouwer, C.; Macq, B.; Quisquater, J.J. Overview on selective encryption of image and video: Challenges and perspectives. EURASIP J. Multimed. Inf. Secur. 2008, 2008, 1–18. [Google Scholar] [CrossRef]
  44. Darwish, S.M. A modified image selective encryption-compression technique based on 3D chaotic maps and arithmetic coding. Multimed. Tools Appl. 2019, 78, 19229–19252. [Google Scholar] [CrossRef]
  45. Addabbo, T.; Alioto, M.; Fort, A.; Pasini, A.; Rocchi, S.; Vignoli, V. A class of maximum-period nonlinear congruential generators derived from the Rényi chaotic map. IEEE Trans. Circuits Syst. I Regul. Pap. 2007, 54, 816–828. [Google Scholar] [CrossRef]
  46. Agency, W.H.C. The Final Days. 2000. Available online: http://catalog.archives.gov/id/5860128 (accessed on 10 April 2025).
  47. Strauss, R. At the Summit. 2010. Available online: https://imslp.org/wiki/Special:ReverseLookup/320964 (accessed on 10 April 2025).
  48. Burkardt, J. apollonian_gasket.ascii.pgm. 2011. Available online: https://people.sc.fsu.edu/~jburkardt/data/pgma/pgma.html (accessed on 10 April 2025).
  49. Smid, E.B.; Leigh, S.; Levenson, M.; Vangel, M.; DavidBanks, A.; JamesDray, S. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. 2010. Available online: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22r1a.pdf (accessed on 10 April 2025).
Figure 1. Encryption system modules: (a) Pseudo-Random Number Generator (PRNG); (b) encryption process; and (c) Data Integrity Protection (DIP).
Figure 1. Encryption system modules: (a) Pseudo-Random Number Generator (PRNG); (b) encryption process; and (c) Data Integrity Protection (DIP).
Mathematics 13 01712 g001
Figure 2. PRNG Initialization: (a) The system key provides the initial parameters of the chaotic maps. (b) Each column of the 2D-LUT is filled with the first N trajectories of the corresponding map.
Figure 2. PRNG Initialization: (a) The system key provides the initial parameters of the chaotic maps. (b) Each column of the 2D-LUT is filled with the first N trajectories of the corresponding map.
Mathematics 13 01712 g002
Figure 3. Spin-Wheel Picker Schemes: (a) spin-wheel of chaotic maps; (b) 2D-LUT. T 1 , T 2 and T 3 represent the spin-wheel random selection of maps 3, 1 and 2 respectively.
Figure 3. Spin-Wheel Picker Schemes: (a) spin-wheel of chaotic maps; (b) 2D-LUT. T 1 , T 2 and T 3 represent the spin-wheel random selection of maps 3, 1 and 2 respectively.
Mathematics 13 01712 g003
Figure 4. Crossover operation: Final Trajectory ( T F k , i ) is generated by combining the p most significative bits of Φ j (represented in red) and the ( P R p ) bits of the neighboring map trajectory Φ j + 1 (represented in blue).
Figure 4. Crossover operation: Final Trajectory ( T F k , i ) is generated by combining the p most significative bits of Φ j (represented in red) and the ( P R p ) bits of the neighboring map trajectory Φ j + 1 (represented in blue).
Mathematics 13 01712 g004
Figure 5. p-value evolution of χ 2 uniformity test for chaotic map selection.
Figure 5. p-value evolution of χ 2 uniformity test for chaotic map selection.
Mathematics 13 01712 g005
Figure 6. QQ-plots and histograms for 8, 14, and 16 maps, respectively.
Figure 6. QQ-plots and histograms for 8, 14, and 16 maps, respectively.
Mathematics 13 01712 g006
Figure 7. Hamming distance between random number sequences generated by a single bit difference in the system key: (a) boxplot; and (b) modified bit position.
Figure 7. Hamming distance between random number sequences generated by a single bit difference in the system key: (a) boxplot; and (b) modified bit position.
Mathematics 13 01712 g007
Figure 8. Plaintext and Ciphertext compared side by side with their corresponding histograms.
Figure 8. Plaintext and Ciphertext compared side by side with their corresponding histograms.
Mathematics 13 01712 g008
Figure 9. Original and encrypted histograms for audio [47] and video data [46].
Figure 9. Original and encrypted histograms for audio [47] and video data [46].
Mathematics 13 01712 g009
Figure 10. Relationship between cipher time and ciphered data size.
Figure 10. Relationship between cipher time and ciphered data size.
Mathematics 13 01712 g010
Table 1. Size in bits of chaotic map’s parameters for P R of 64 bits. For a different PR, β and x 0 match the PR value, while the size of n remains at 8 bits. Note: Event though n uses 8 bits, only 6 are used for P R = 64 since 2 6 = 64 .
Table 1. Size in bits of chaotic map’s parameters for P R of 64 bits. For a different PR, β and x 0 match the PR value, while the size of n remains at 8 bits. Note: Event though n uses 8 bits, only 6 are used for P R = 64 since 2 6 = 64 .
Parameter β x 0 n
Size (bits)64648 (6 effectively)
Table 2. Sample files for testing the proposed encryption system.
Table 2. Sample files for testing the proposed encryption system.
FileFormatSize (MB)
Video [46]MPEG-415.9
Audio [47]mp318.2
Image [48]PGM7.8
(Uncompressed)
NIST-Manual [49]pdf7.4
Table 3. Standard parameters in the NIST test suite [49]. M represents the number of bits in a substring (block) being tested.
Table 3. Standard parameters in the NIST test suite [49]. M represents the number of bits in a substring (block) being tested.
ParameterValue
Bit stream length 1 × 10 6
Number of bit streams100
Significance level0.01
Block frequency test—block length (M)128
Non-overlapping template test—block length (M)9
Overlapping template test—block length (M)9
Approximate entropy test—block length (M)10
Serial test—block length (M)16
Linear complexity test—block length (M)500
Table 4. NIST randomness test results, * p-value resulting from applying the chi-squared test to the frequency of the p-values obtained by the randomness tests, ** Proportion of binary sequences that passed the randomness test.
Table 4. NIST randomness test results, * p-value resulting from applying the chi-squared test to the frequency of the p-values obtained by the randomness tests, ** Proportion of binary sequences that passed the randomness test.
Testp-Value *Proportion of Success **
Frequency0.81653798/100Success
CumulativeSums0.36691898/100Success
Runs0.01918899/100Success
LongestRun0.73991899/100Success
Rank0.99633598/100Success
FFT0.97169999/100Success
NonOverlappingTemplate0.96429599/100Success
OverlappingTemplate0.137282100/100Success
Universal0.79813999/100Success
ApproximateEntropy0.350485100/100Success
RandomExcursions0.51744265/65Success
RandomExcursionsVariant0.06348264/65Success
Serial0.699313100/100Success
LinearComplexity0.816537100/100Success
Table 5. Correlation coefficients between ciphertext with an original key and ciphertext with a modified bit in the original key. video file corresponds to [46]; audio file corresponds to [47]; image file corresponds to [48]; and book file corresponds to [49].
Table 5. Correlation coefficients between ciphertext with an original key and ciphertext with a modified bit in the original key. video file corresponds to [46]; audio file corresponds to [47]; image file corresponds to [48]; and book file corresponds to [49].
FileBitBitBit
Least Significant Middle Most Significant
video.mp40.0002 0.0016 0.0011
audio.mp30.0008 4.4 × 10 5 0.0002
image.pgm0.00110.00070.0029
NIST-Manual.pdf 9.9 × 10 5 0.0001 0.0015
Table 6. Our cipher speed comparison against state-of-the-art schemes. * The speed in [23] is approximated.
Table 6. Our cipher speed comparison against state-of-the-art schemes. * The speed in [23] is approximated.
AlgorithmOperating SystemProcessorRAMSpeed (Gbps)
Our SchemeWindows 11Intel Core i5-11400H16 GB5.9981
AESWindows 11Intel Core i5-11400H16 GB1.6113
Wang [23]Windows 11Intel Core i5-13400F8 GB0.745 *
Feng [32]Not reportedIntel E3-1232 v38 GB0.0609
Shi [33]Not reportedNot reported (3.6 GHz)8 GB0.4531
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Espino-Mandujano, L.D.; Hasimoto-Beltran, R. Spin-Wheel: A Fast and Secure Chaotic Encryption System with Data Integrity Detection. Mathematics 2025, 13, 1712. https://doi.org/10.3390/math13111712

AMA Style

Espino-Mandujano LD, Hasimoto-Beltran R. Spin-Wheel: A Fast and Secure Chaotic Encryption System with Data Integrity Detection. Mathematics. 2025; 13(11):1712. https://doi.org/10.3390/math13111712

Chicago/Turabian Style

Espino-Mandujano, Luis D., and Rogelio Hasimoto-Beltran. 2025. "Spin-Wheel: A Fast and Secure Chaotic Encryption System with Data Integrity Detection" Mathematics 13, no. 11: 1712. https://doi.org/10.3390/math13111712

APA Style

Espino-Mandujano, L. D., & Hasimoto-Beltran, R. (2025). Spin-Wheel: A Fast and Secure Chaotic Encryption System with Data Integrity Detection. Mathematics, 13(11), 1712. https://doi.org/10.3390/math13111712

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop