From Chaos to Security: A Comparative Study of Lorenz and Rössler Systems in Cryptography
Abstract
1. Introduction
- Section 2 outlines the theoretical background of chaotic systems and describes the independence metrics employed in our experiments.
- Section 3 presents and interprets the experimental results, focusing on the comparative performance of the Lorenz and Rössler systems.
- Section 4 summarizes our findings and suggests future directions in the context of chaos-based encryption systems.
2. Motivation and Theoretical Background
2.1. Motivation
2.2. Numerical Formulations for Chaos-Based Cryptography: Continuous-Time Integration vs. Discrete-Time Maps
2.2.1. Runge–Kutta (Continuous-Time View)
2.2.2. Explicit Discretization (Discrete-Time View)
2.2.3. Conceptual Comparison Relevant to Our Metrics
2.2.4. Scope with Respect to Hardware-Oriented Discretizations
2.3. Independence Test and Transient Time
- Sorting the data sets X and Y.
- Calculating the empirical distribution functions and .
- Transforming the values into standardized variables U and V using the inverse normal distribution function.
- Computing the correlation coefficient and the test statistic t.
- Comparing the value of t with the critical value to determine the test result.
- : The two data sets conform to the bivariate Gaussian probability law, indicating that U and V are statistically independent.
- : The two data sets do not conform to the bivariate Gaussian probability law.
- Calculating the chi-square distribution to check the uniformity of the distributions of U and V.
- Comparing the value of z with the critical value to determine the test result.
- Visualize the distribution of the system states at different time points.
- Identify the time after which the experimental probability density functions stabilize.
- Use this time as the transient time for further analysis.
2.4. Chaoticity Metrics
2.4.1. Lyapunov Exponents
2.4.2. Kolomogorov–Sinai Entropy and Kaplan–Yorke Dimension
- Calculation of Lyapunov Exponents: First, the Lyapunov exponents of the system are calculated, as described previously.
- KS Entropy: It is calculated by summing the positive Lyapunov exponents. This represents the total rate of information growth in the system.
- KY Dimension: It is calculated using the Lyapunov exponents and their cumulative sum. The largest index j for which the cumulative sum is positive is identified, and the KY dimension is given by Formula (2):
2.5. The Autocorrelation Function and the Correlation Time
- The autocorrelation function is computed by correlating the signal with itself over a range of time lags. This involves calculating the mean of the signal, subtracting it from the signal, and then computing the correlation for each time lag.
- The correlation time is determined by finding the time lag at which the autocorrelation function decays to of its initial value.
Fourier Spectrum
- The Fourier transform is applied to the time-series data of the system to convert them from the time domain to the frequency domain. This is typically done using the Fast Fourier Transform (FFT) algorithm.
- The power spectrum is obtained by taking the square of the magnitude of the Fourier transform. This represents the energy of the signal at each frequency.
- The frequencies and their corresponding power values are plotted to visualize the distribution of energy across frequencies.
3. Experimental Results
- The Lorenz system has a KS entropy of 10.8929, indicating a high level of chaos.
- The Rössler system has a KS entropy of 0.0160, indicating a much lower level of chaos compared to the Lorenz system.
- The Lorenz system has a KY dimension of 1.3207, suggesting a moderately complex attractor.
- The Rössler system has a KY dimension of 1.0030, indicating a simpler attractor compared to the Lorenz system.
- The data were generated as mentioned at the beginning of Section 3.
- A thousand random initial conditions () were generated over time by solving the differential set of equations with a sampling frequency of 100 Hz.
- After the transient time elapsed (more than 30 s for Lorenz and 100 s for Rössler), a data set was selected at moment and a second data set was selected at moment . We used state variable x for this purpose, but similar conclusions can be obtained for y and z.
Comparison of Results: RK4 Integration vs. Explicit Discrete Map
4. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
References
- Wang, L.; Song, W.; Di, J.; Zhang, X.; Zou, C. Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling. Entropy 2025, 27, 84. [Google Scholar] [CrossRef] [PubMed]
- Murillo-Escobar, M.A.; Meranza-Castillón, M.O.; López-Gutiérrez, R.M.; Cruz-Hernández, C. Suggested Integral Analysis for Chaos-Based Image Cryptosystems. Entropy 2019, 21, 815. [Google Scholar] [CrossRef]
- Guang, Y.; Yu, L.; Dong, W.; Wang, Y.; Zeng, J.; Zhao, J.; Ding, Q. Chaos-Based Lightweight Cryptographic Algorithm Design and FPGA Implementation. Entropy 2022, 24, 1610. [Google Scholar] [CrossRef]
- Lawnik, M.; Moysis, L.; Volos, C. Chaos-Based Cryptography: Text Encryption Using Image Algorithms. Electronics 2022, 11, 3156. [Google Scholar] [CrossRef]
- Zhang, B.; Liu, L. Chaos-Based Image Encryption: Review, Application, and Challenges. Mathematics 2023, 11, 2585. [Google Scholar] [CrossRef]
- Badea, B.; Vlad, A. Revealing statistical independence of two experimental data sets: An Improvement on Spearman’s Algorithm. In Lectures Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2006; Volume 3980, pp. 1166–1176. [Google Scholar]
- Vlad, A.; Ilyas, A.; Luca, A. Unifying running-key approach and logistic map to generate enciphering sequences. Ann. Telecommun. 2013, 68, 179–186. [Google Scholar] [CrossRef]
- Luca, A.; Vlad, A.; Badea, B.; Frunzete, M. A study on statistical independence in the tent map. In Proceedings of the IEEE International Symposium on Signals, Circuits and Systems (ISSCS), Iași, Romania, 9–10 July 2009; pp. 1–4. [Google Scholar]
- Dinu, A.; Frunzete, M. Singularity, Observability and Statistical Independence in the Context of Chaotic Systems. Mathematics 2023, 11, 305. [Google Scholar] [CrossRef]
- Dinu, A.; Frunzete, M. The Lorenz chaotic system, statistical independence and sampling frequency. In Proceedings of the International Symposium on Signals, Circuits, and Systems (ISSCS), Iași, Romania, 15–16 July 2021; pp. 1–4. [Google Scholar] [CrossRef]
- Dinu, A.; Vlad, A. The Compound Tent Map and the Connection Between Gray Codes and the Initial Condition Recovery. UPB Sci. Bull. Ser. A Appl. Math. Phys. 2014, 76, 17–28. Available online: https://www.scientificbulletin.upb.ro/rev_docs_arhiva/full72a_882955.pdf (accessed on 20 July 2024).
- Dinu, A.; Frunzete, M. Image Encryption Using Chaotic Maps: Development, Application, and Analysis. Mathematics 2025, 13, 2588. [Google Scholar] [CrossRef]
- Bakiri, M.; Guyeux, C.; Couchot, J.F.; Oudjida, A.K. Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses. Comput. Sci. Rev. 2018, 27, 135–153. [Google Scholar] [CrossRef]
- Ifrim, R.; Popescu, D. BPAP: FPGA Design of a RISC-like Processor for Elliptic Curve Cryptography Using Task-Level Parallel Programming in High-Level Synthesis. Cryptography 2025, 9, 20. [Google Scholar] [CrossRef]
- Strogatz, S. Nonlinear Dynamics and Chaos with Applications to Physics, Biology, Chemistry and Engineering (Studies in Nonlinearity), 1st ed.; Westview Press: Boulder, CO, USA, 1994. [Google Scholar]
- Vaduva, A.; Vlad, A.; Badea, B. Evaluating the performance of a test-method for statistical independence decision in the context of chaotic signals. In Proceedings of the 2016 International Conference on Communications (COMM), Bucharest, Romania, 9–10 June 2016; pp. 417–422. [Google Scholar] [CrossRef]
- Walpole, R.E.; Myers, R.H. Probability and Statistics for Engineers and Scientists, 4th ed.; MacMillan Publishing: New York, NY, USA, 1989. [Google Scholar]
- Kocarev, L.; Lian, S. Chaos-Based Cryptography: Theory, Algorithms and Applications; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
- Pecora, L.M.; Carroll, T.L. Synchronization in chaotic systems. Phys. Rev. Lett. 1990, 64, 821–824. [Google Scholar] [CrossRef]
- Baptista, M.S. Cryptography with chaos. Phys. Lett. A 1998, 240, 50–54. [Google Scholar] [CrossRef]
- Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef]
- Kocarev, L.; Jakimoski, G. Logistic map as a block encryption algorithm. Phys. Lett. A 2001, 289, 199–206. [Google Scholar] [CrossRef]
- Mishkovski, I.; Kocarev, L. Chaos-based public-key cryptography. In Chaos-Based Cryptography: Theory, Algorithms and Applications; Kocarev, L., Lian, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 27–65. [Google Scholar]
- Addabbo, T.; Fort, A.; Rocchi, S.; Vignoli, V. Digitized chaos for pseudo-random number generation in cryptography. In Chaos-Based Cryptography: Theory, Algorithms and Applications; Kocarev, L., Lian, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 67–97. [Google Scholar]
- Tang, W.K.S.; Liu, Y. Formation of high-dimensional chaotic maps and their uses in cryptography. In Chaos-Based Cryptography: Theory, Algorithms and Applications; Kocarev, L., Lian, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 99–136. [Google Scholar]
- Xiao, D.; Liao, X.; Deng, S. Chaos-based hash function. In Chaos-Based Cryptography: Theory, Algorithms and Applications; Kocarev, L., Lian, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 137–203. [Google Scholar]
- Su, Z.; Lian, S.; Zhang, G.; Jiang, J. Chaos-based video encryption algorithms. In Chaos-Based Cryptography: Theory, Algorithms and Applications; Kocarev, L., Lian, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 205–226. [Google Scholar]
- Solak, E. Cryptanalysis of chaotic ciphers. In Chaos-Based Cryptography: Theory, Algorithms and Applications; Kocarev, L., Lian, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 227–256. [Google Scholar]
- Uchida, A.; Amano, K.; Inoue, M.; Hirano, K.; Naito, S.; Someya, H.; Oowada, I.; Kurashige, T.; Shiki, M.; Yoshimori, S.; et al. Fast physical random bit generation with chaotic semiconductor lasers. Nat. Photonics 2008, 2, 728–732. [Google Scholar] [CrossRef]
- Li, P.; Wang, Y.-C.; Zhang, J.-Z. All-optical fast random number generator. Opt. Express 2010, 18, 20360–20369. [Google Scholar] [CrossRef] [PubMed]
- Argyris, A.; Deligiannidis, S.; Pikasis, E.; Bogris, A.; Syvridis, D. Implementation of 140 Gb/s true random bit generator based on a chaotic photonic integrated circuit. Opt. Express 2010, 18, 18763–18768. [Google Scholar] [CrossRef] [PubMed]
- Wang, A.; Li, P.; Zhang, J.; Zhang, J.; Li, L.; Wang, Y. 4.5 Gbps high-speed real-time physical random bit generator. Opt. Express 2013, 21, 20452–20462. [Google Scholar] [CrossRef]
- Fridrich, J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 1998, 8, 1259–1284. [Google Scholar] [CrossRef]
- Kocarev, L.; Szczepanski, J.; Amigó, J.M.; Tomovski, I. Discrete chaos-I: Theory. IEEE Trans. Circuits Syst. I Regul. Pap. 2006, 53, 1300–1309. [Google Scholar] [CrossRef]
- Amigó, J.M. Chaos-based cryptography. In Intelligent Computing Based on Chaos; Springer: Berlin/Heidelberg, Germany, 2009; pp. 291–313. [Google Scholar] [CrossRef]
- Corona-Bermúdez, E.; Chimal-Eguía, J.C.; Corona-Bermúdez, U.; Rivero-Ángeles, M.E. Chaos Meets Cryptography: Developing an S-Box Design with the Rössler Attractor. Mathematics 2023, 11, 4575. [Google Scholar] [CrossRef]
- Zulfiqar, N.; Ahmad, T.; Ghazal, T.M.; Ikram, A.; Gazzawe, F.; Albahar, M.A.; Hussein, A.H.; Khan, A.S. Securing Digital Images: A Chaos-Driven Scrambling Algorithm Using the Rössler System. PLoS ONE 2025, 20, e0326202. [Google Scholar] [CrossRef]
- Hamza, Y.A.; Omer, M.D. An Efficient Method of Image Encryption Using Rossler Chaotic System. Acad. J. Nawroz Univ. 2021, 10, 11. [Google Scholar] [CrossRef]
- Tubaki, M.; Nayak, J.P.R.; Satheesha, K.M. Implementation of Chaotic Rossler System in Cryptography. J. Basic Sci. Eng. 2025, 22, 463–474. [Google Scholar] [CrossRef]
Metric | Lorenz | Rössler | Interpretation | Qualitative Impact |
---|---|---|---|---|
Slight reduction in maximal divergence rate | Minor | |||
KS entropy | Directly tied to | Minor | ||
KY dimension | Attractor complexity slightly lower | Negligible | ||
Correlation time | Slower decorrelation | Minor | ||
Independence distance d | Requires slightly larger separation | Minor | ||
Transient time | ≈ | ≈ | No perceptible change | None |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dinu, A. From Chaos to Security: A Comparative Study of Lorenz and Rössler Systems in Cryptography. Cryptography 2025, 9, 58. https://doi.org/10.3390/cryptography9030058
Dinu A. From Chaos to Security: A Comparative Study of Lorenz and Rössler Systems in Cryptography. Cryptography. 2025; 9(3):58. https://doi.org/10.3390/cryptography9030058
Chicago/Turabian StyleDinu, Alexandru. 2025. "From Chaos to Security: A Comparative Study of Lorenz and Rössler Systems in Cryptography" Cryptography 9, no. 3: 58. https://doi.org/10.3390/cryptography9030058
APA StyleDinu, A. (2025). From Chaos to Security: A Comparative Study of Lorenz and Rössler Systems in Cryptography. Cryptography, 9(3), 58. https://doi.org/10.3390/cryptography9030058