<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Parallel Data Encryption Based on Tinkerbell and Ikeda Chaotic Functions</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Borislav Stoyanov</string-name>
          <email>borislav.stoyanov@shu.bg</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dimitar Dobrev</string-name>
          <email>d.d.dobrev@shu.bg</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Konstantin Preslavsky University of Shumen</institution>
          ,
          <addr-line>115 Universitetska Str., Shumen, 9700</addr-line>
          ,
          <country country="BG">Bulgaria</country>
        </aff>
      </contrib-group>
      <fpage>6</fpage>
      <lpage>9</lpage>
      <abstract>
        <p>In this paper, we present a parallel encryption algorithm based on the Tinkerbell and Ikeda chaotic functions in order to meet the multi-core processor. The parallel algorithm is constructed with a data parallel approach. The experimental outputs show that the parallel encryption proposes more efficient performance against the serial execution of the scheme.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Parallel encryption</kwd>
        <kwd>Tinkerbell chaotic function</kwd>
        <kwd>Ikeda chaotic function</kwd>
        <kwd>NIST statistical tests</kwd>
        <kwd>PractRand statistical tests</kwd>
        <kwd>ENT statistical tests</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The enchanting knowledge in data processing and communication
interchange have created a high demand for the secure of multimedia communication
over the Internet. A major challenge is to protect confidentiality for the informa
tion in the networks. Modern ciphers like RC4 [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], Salsa20 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], and SEAL [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] are
constructed with confusion and difusion characteristics. These two characteris
tics can likewise be found in chaotic functions, which are normally recognized
by sensitive dependence on initial parameters and by having evolution through
phase space that appears to be perfectly random. As of late, various chaos-based
cryptographic encryption scheme have been presented [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4, 5, 6</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], a novel
pseudo-random number generator (PRNG), based on a novel logarithmic chaotic
map is presented. Two Tinkerbell functions are used to novel image encryption
scheme designed in [8].
      </p>
      <p>Parallel computations are used to make encryption quicker and less
expensive. Parallel encryption algorithm for multi-core processor based on logistic map
are presented in [9, 10, 11, 12, 13]. In this study, parallel calculations with
multicore CPU is used to gain both time execution and security level of the designed
encryption scheme. Inspired from [14], the main contributions of our study can
be summarized as follows:
• we present novel pseudo-random byte generation scheme based on
Tinkerbell and Ikeda chaotic functions, which has good statistical
characteristics;
• we design novel parallel encryption algorithm with high level of security.
2. New pseudo-random byte generator based on Tinkerbell and</p>
    </sec>
    <sec id="sec-2">
      <title>Ikeda chaotic functions</title>
      <sec id="sec-2-1">
        <title>2.1. Description of the chaotic functions</title>
        <p>The Tinkerbell map [15] is a two-dimensional discrete-time dynamical
system given by:</p>
        <p>yn+1 = 2xnyn – cxn + dyn,
where a = 0.9, b = 0.6013, c = 2.0 and d = 0.50.</p>
        <p>xn+1 = x2n – y2n + axn + byn
zn+1 = 1 + u(cos tn + wnsin tn)
wn+1 = u(znsin tn + wncos tn)</p>
        <p>The two-dimensional Ikeda chaotic function is given by [16, 17]:
where u is a parameter u = 0.7941 and
6
tn = 0.4 – –1–+––z–2n–+–w––2n–
(1)
(2)
(3)
(4)
(5)</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. New pseudo-random byte generation algorithm</title>
        <p>The proposed generator consists of the next steps:
1. The initial values x0, y0, z0, and w0 from Tinkerbell and Ikeda chaotic
maps are determined.
2. The two chaotic maps are iterated for J and K times, respectively.
3. The iteration continues, and as a result, four real fractions are generated
and postprocessed as positive bytes.
4. Perform XOR operation between xi, yi, zi, and wi to get a single output
byte.
5. Return to Step 2 until the byte output is reached.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Performance evaluation</title>
        <p>In case of serial encryption, the initial key is a set of all initial values of the
proposed pseudo-random generator. There are four 64 bits floating-point values
by 51 significant bits each [18]. The initial seed of the proposed byte generation
algorithm is 204 bits. This is suficiently high against exhaustive search [19].</p>
        <p>
          In order to estimate pseudo-randomness of the output bytes, we used the
statistical programs NIST [
          <xref ref-type="bibr" rid="ref8">20</xref>
          ], PractRand [
          <xref ref-type="bibr" rid="ref9">21</xref>
          ], and ENT [
          <xref ref-type="bibr" rid="ref10">22</xref>
          ].
        </p>
        <p>The NIST application consists 15 statistical tests: frequency, block
frequency, cumulative sums forward and reverse, runs, longest run of ones, rank,
spectral, non-overlapping templates, overlapping templates, universal, approximate
entropy, serial first and second, linear complexity, random excursion, and random
excursion variant. For the NIST tests, we generated 1000 diferent byte streams of
length 125,000 bytes each. The outputs from the tests are given in Table 1.</p>
        <p>The minimum pass rate for each statistical test with the exception of the
random excursion (variant) test is approximately = 980 for a sample size = 1000
byte streams. The minimum pass rate for the random excursion (variant) test is
approximately = 613 for a sample size = 627 byte streams. The designed
pseudorandom byte generation algorithm passed successfully all the NIST statistical
tests.</p>
        <p>
          The PractRand application [
          <xref ref-type="bibr" rid="ref9">21</xref>
          ] outputs 34 p-values and they are in the
appropriate (0,1] interval, Table 2 and Table 3. The proposed new pseudo-random
byte generator passed successfully all of PractRand tests.
        </p>
        <p>P-value
R= +0.0
R= -4.4
R= -1.4
R= -2.8
R= +2.1
R= -3.3
R= -3.3
R= -1.8
R= +0.8
R= +1.4
R= -0.4
R= -2.0
R= +0.0
R= +1.9
R= +0.9
P-value
R= +0.0
R= +0.0
R= +0.4
R= +0.7
R= -2.6
R= -1.4
R= -3.0
R= -1.2
R= -1.8
R= +0.0
R= -1.5
R= -0.0
R= +0.0
R= -5.2</p>
        <p>Pass rate
“pass”
p = 0.970
p = 0.715
p = 0.873
p = 0.190
p = 0.923
p = 0.925
p = 0.770
p = 0.335
p = 0.252
p = 0.499
p = 0.933</p>
        <p>“pass”
p = 0.171
p = 0.270
Pass rate
“pass”
p = 0.474
p = 0.401
p = 0.363
p = 0.868
p = 0.696
p = 0.925
p = 0.664
p = 0.906</p>
        <p>“pass”
p = 0.940
p = 0.493</p>
        <p>“pass”
p =1-9.6e-3</p>
        <p>
          The ENT software [
          <xref ref-type="bibr" rid="ref10">22</xref>
          ] is a set of 6 tests. The proposed pseudo-random byte
algorithm passed successfully ENT tests, Table 4.
        </p>
        <p>Result
7.999998 bits per byte
OC would reduce the size of this 125000000-byte file by 0 %
For 125000000 samples is 262.30, and randomly would
exceed this value 36.33 % of the time
127.5048 (127.5 = random)
3.3.141320114 (error 0.01 %)
-0.0000091 (totally uncorrelated = 0.0)</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. New algorithm of parallel encryption</title>
      <sec id="sec-3-1">
        <title>3.1. New parallel data encryption</title>
        <p>The new pseudo-random byte generator based on Tinkerbell and Ikeda
chaotic functions is used in the construction of the parallel encryption algorithm. The
proposed parallel encryption algorithm consists of the next steps:
1. The input data file is divided into p fragments of the available cores
(threads).
2. The initial values of p pseudo-random generators (from Section 2.2)
based on Tinkerbell and Ikeda chaotic functions, 1 ≤ j ≤ p, x0j, y0j, z0j, and w0j
are determined.
3. The p diferent chaotic pseudo-random generators are iterated each one
on a thread, and as a result p diferent pseudo-random bytes are obtained
simultaneously.
4. Perform XOR operation between the p pseudo-random bytes and p bytes
from each part of the fragmented input data file.
5. Return to Step 3 until the input byte parts are encrypted.</p>
        <p>6. The encrypted parts from all threads are merged in output file.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Performance evaluation</title>
        <p>In case of parallel encryption, the initial key space is a set of p diferent ini
tial keys of p byte generation algorithms, Section 2.2. Consequently, the overall
key space of the parallel scheme is p × 204 bits. For example, when 8 threads are
used, the initial seed will be equal to 1632 bits.</p>
        <p>
          For the performance evaluation in the parallel case, tests with diferent thread
numbers are performed. The laptop CPU in the experiment is Intel(R) Core(TM)
i7-8550U CPU@1.80 GHz 2.00 GHz, 4 cores, 8 threads, hyper-threading
activated; RAM: 8 GB; cache: 8 MB. The speed-up S(p) on p threads of the presented
parallel algorithm is given by the equation [
          <xref ref-type="bibr" rid="ref11">23</xref>
          ]:
        </p>
        <p>T(1)
E = ––––– (6)</p>
        <p>T(p)´</p>
        <p>Table 5 presents the encryption results and speed-up as the number of threads
increase. The encryption is conducted with p initial keys, as p separate parts are
encrypted with a diferent key. Apparently, that with 8 cores the proposed algo
rithm achieves its maximum speed-up. The experiments were performed with
9.92 MB data file.</p>
        <p>The results of the security and execution outputs are summarized in Table 6.
Using the given experimental findings, we can complete that the novel parallel
scheme, based on the Tinkerbell and Ikeda maps, has acceptable statistical
properties and provide suficient data security. One such use of our novel algorithm in
the image and audio encryption techniques. More blocks of the encryption image
can be processed at the same time. Another possible application is the real-time
selective video encryption. More sensitive layers can be encrypted in parallel
with our proposed scheme.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Summary</title>
      <p>We have proposed a novel pseudo-random byte generation scheme based on
the Tinkerbell and Ikeda functions. The parallel algorithm is created with a data
parallel method. The experimental outputs show that the parallel encryption
presents more eficient outputs against the serial execution of the algorithm.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Acknowledgments</title>
      <p>This work is partially supported by the Scientific research fund of University
of Shumen, Bulgaria, under the grant No. RD-08-110/22.02.2022.</p>
    </sec>
    <sec id="sec-6">
      <title>6. References</title>
      <p>scheme for sensor data using a novel logarithmic chaotic map, Journal of
Information Security and Applications 47 (2019) 320–328. doi:10.1016/j.
jisa.2019.05.017.
[8] P. R. Krishna, C. Surya Teja, R. D. S., T. V., A chaos based image
encryption using tinkerbell map functions, in: 2018 Second International
Conference on Electronics, Communication and Aerospace Technology (ICECA),
2018, pp. 578–582. doi:10.1109/ICECA.2018.8474891.
[9] J. Liu, D. Song, Y. Xu, A parallel encryption algorithm for dual-core
processor based on chaotic map, in: S. S. Mahmoud, Z. Zeng, Y. Li (Eds.),
Fourth International Conference on Machine Vision (ICMV 2011):
Computer Vision and Image Analysis; Pattern Recognition and Basic
Technologies, volume 8350, International Society for Optics and Photonics, SPIE,
2012, pp. 73 – 79. doi:10.1117/12.920226.
[10] W. Wang, X. Wang, D. Song, A parallel chaotic cryptosystem for dual-core
processor, in: The 2nd International Conference on Information Science
and Engineering, 2010, pp.920–923. doi:10.1109/ICISE.2010.5689747.
[11] J. Liu, H. Zhang, D. Song, G. Sun, W. Bi, M. K. Buza, A parallel encryption
algorithm of the logistic map for multicore with openmp, in: Ifost, volume
2, 2013, pp. 47–50. doi:10.1109/IFOST.2013.6616857.
[12] D. Burak, Parallelization of the block encryption algorithm based on
logistic map, Przegląd Elektrotechniczny 88 (2012) 198–200.
[13] M. J. Rostami, A. Shahba, S. Saryazdi, H. Nezamabadi-pour, A novel
parallel image encryption with chaotic windows based on logistic map,
Computers &amp; Electrical Engineering 62 (2017) 384–400.
doi:10.1016/j.compeleceng.2017.04.004.
[14] Ü. Çavuşoğlu, S. Kaçar, A novel parallel image encryption algorithm based
on chaos, Cluster Computing 22 (2019) 1211–1223.
doi:10.1007/s10586018-02895-w.
[15] K. T. Alligood, T. D. Sauer, J. A. Yorke, D. Chillingworth, Chaos: an
introduction to dynamical systems, Springer, New York, 1996.
[16] K. Ikeda, Multiple-valued stationary state and its instability of the
transmitted light by a ring cavity system, Optics Communications 30 (1979)
257–261. doi:10.1016/0030-4018(79)90090-7.
[17] K. Ikeda, H. Daido, O. Akimoto, Optical turbulence: Chaotic behavior of
transmitted light from a ring cavity, Physical Review Letters 45 (1980)
709–712. doi:10.1103/PhysRevLett.45.709.
[18] F.-P. W. Group, IEEE standard for floating-point arithmetic, IEEE Std
754-2019 (Revision of IEEE 754-2008) (2019) 1–84. doi:10.1109/
IEEESTD.2019.8766229.
[19] G. Alvarez, S. Li, Some basic cryptographic requirements for chaos-based
cryptosystems, International Journal of Bifurcation and Chaos 16 (2006)</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Katz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lindell</surname>
          </string-name>
          , Introduction to modern cryptography, CRC press,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Bernstein</surname>
          </string-name>
          ,
          <source>The Salsa20 Family of Stream Ciphers</source>
          , Springer Berlin Heidelberg, Berlin, Heidelberg,
          <year>2008</year>
          , pp.
          <fpage>84</fpage>
          -
          <lpage>97</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          - 68351-
          <issue>3</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Rogaway</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Coppersmith</surname>
          </string-name>
          ,
          <article-title>A software-optimized encryption algorithm</article-title>
          ,
          <source>J. Cryptol</source>
          .
          <volume>11</volume>
          (
          <year>1998</year>
          )
          <fpage>273</fpage>
          -
          <lpage>287</lpage>
          . doi:
          <volume>10</volume>
          .1007/ s001459900048.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N.</given-names>
            <surname>Munir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Hazzazi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Aljaedi</surname>
            ,
            <given-names>A. A. K.</given-names>
          </string-name>
          <string-name>
            <surname>Haj Ismail</surname>
            ,
            <given-names>A. R.</given-names>
          </string-name>
          <string-name>
            <surname>Alharbi</surname>
            ,
            <given-names>I. Hussain</given-names>
          </string-name>
          ,
          <article-title>Cryptanalysis of internet of health things encryption scheme based on chaotic maps</article-title>
          ,
          <source>IEEE Access 9</source>
          (
          <year>2021</year>
          )
          <fpage>105678</fpage>
          -
          <lpage>105685</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2021</year>
          .
          <volume>3099004</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>G.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Nie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>An improved image multidimensional chaos encryption algorithm based on cuda</article-title>
          ,
          <source>in: 2019 9th International Conference on Information Science and Technology (ICIST)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>183</fpage>
          -
          <lpage>187</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICIST.
          <year>2019</year>
          .
          <volume>8836920</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Luo</surname>
          </string-name>
          , H. Shi,
          <article-title>Research of chaos encryption algorithm based on logistic mapping</article-title>
          ,
          <source>in: 2006 International Conference on Intelligent Information Hiding and Multimedia</source>
          ,
          <year>2006</year>
          , pp.
          <fpage>381</fpage>
          -
          <lpage>383</lpage>
          . doi:
          <volume>10</volume>
          .1109/IIH-MSP.
          <year>2006</year>
          .
          <volume>265022</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>N.</given-names>
            <surname>Nesa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Ghosh</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Banerjee</surname>
          </string-name>
          ,
          <article-title>Design of a chaos-based encryption 2129-2151</article-title>
          . doi:
          <volume>10</volume>
          .1142/S0218127406015970.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rukhin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Soto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Nechvatal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Smid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Barker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Leigh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Levenson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vangel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Banks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Heckert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Dray</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Vo</surname>
          </string-name>
          ,
          <article-title>A statistical test suite for random and pseudorandom number generators for cryptographic application</article-title>
          ,
          <year>2010</year>
          . NIST Special Publication 800-22: Revision 1a,
          <string-name>
            <surname>Lawrence</surname>
            <given-names>E</given-names>
          </string-name>
          . Bassham III. doi:
          <volume>10</volume>
          .5555/2206233.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>C.</given-names>
            <surname>Doty-Humphrey</surname>
          </string-name>
          , Practrand: C+
          <article-title>+ library of pseudo-random number generators and statistical tests for rngs (</article-title>
          <year>2014</year>
          ). URL: http://pracrand.sourceforge.net.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>J.</given-names>
            <surname>Walker</surname>
          </string-name>
          ,
          <article-title>ENT: A pseudorandom number sequence test program</article-title>
          ,
          <year>2008</year>
          . URL: http:// www.fourmilab.ch/random/.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Amdahl</surname>
          </string-name>
          ,
          <article-title>Validity of the single processor approach to achieving large scale computing capabilities</article-title>
          ,
          <source>in: Proceedings of the April 18-20</source>
          ,
          <year>1967</year>
          , Spring Joint Computer Conference, AFIPS '
          <volume>67</volume>
          (Spring),
          <source>Association for Computing Machinery</source>
          , New York, NY, USA,
          <year>1967</year>
          , p.
          <fpage>483</fpage>
          -
          <lpage>485</lpage>
          . doi:
          <volume>10</volume>
          .1145/1465482.1465560.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>