Page 96 - 2024-Vol20-Issue2
P. 96
92 | Shumran & Al-Hussein
Fig. 8. Diagram showing the bifurcation of a ? [0, 1.4]. 10 4
Henon Map with a = 1.4 4
3
2
1
0
-1
-2
-3
-4
0 20 40 60 80 100 120 140 160
Fig. 9. The time waveform of the signal of the chaotic Henon
function.
In 2021 Haris Aziz [25], a new encryption method is of- Fig. 10. Encryption scheme, adopted from [24].
fered for audio applications that require real-time processing.
Principles of confusion and diffusion form the foundation of tem based on chaotic maps, hybrid chaotic shift transform
the proposed scheme’s framework. Mordell elliptic curves (HCST), and deoxyribonucleic acid (DNA) encoding rules.
(MEC) and a symmetric group of permutations S8 are applied The scheme uses chaotic maps such as two-dimensional modi-
to the confusion to incorporate nonlinearity. The utilization fied Henon map (2D-MHM) and standard map. An additional
of chaotic maps enhances the proposed scheme’s durability tool that improves the cryptosystem’s security is DNA encod-
even more. In defense applications, especially in conflict ing technology. Using distinct encryption/decryption quality
zones, the suggested scheme is meant to meet the needs of metrics, the algorithm’s performance is assessed for a range
real-time voice communications. Multiple S-box applications of speech signals. Nonetheless, diverse analyses indicated
have resulted in more robust cryptosystems with substantial that the algorithm is appropriate for narrow-band radio trans-
confusion and dispersion. The multiple S8 MEC S-box col- mission. .To improve the algorithm’s security performance
lection enhances the security of the suggested scheme and is and key space, two chaotic maps are employed. Diffusion and
very relevant to the current target application case. Fig. 12. confusion are used, respectively, to alter the speech samples’
illustrates the case, in which eight identical pixel values are values and shuffle their locations at random. Fig. 13. displays
modified using eight distinct S-boxes and one single S-box. the encryption scheme’s whole design.
The graphic shows that whereas several S-box transformations In 2016, Amina Mahdi et al [28], a new stream cipher sys-
result in unique values and improved correlation, transforma- tem has been presented in which the bit stream is generated
tion with a single S-box had no effect on correlation. By from the Henon map by using three different methods so as
utilizing numerous S-boxes to create a transformation effect, to achieve a sequence of zeros and ones similar in properties
the cryptosystem may be optimized to meet the necessary to Pseudo Random Number (PRN) code. The first method is
security level with fewer rounds. the analog-to-digital convertor method (ADC) which is used
In 2018, M.Y. Mohamed Parvees, et al [26], created a method
for efficiently shuffling audio bytes by utilizing several chaotic
maps. The audio encryption method creates sequences us-
ing the chaotic economic map and the Henon map. The se-
quences become interdependent with one another because of
the system’s efficient algorithm. The suggested algorithm
will become more sensitive and complex as a result of this
interdependency.
In 2017, S. J. Sheela [27], proposed a new audio cryptosys-