Volume 12, Number 2, December 2016 - DOI: http://dx.doi.org/10.21700/ijcis.2016.274


Computing and Information Sciences is a peer reviewed journal that is committed to timely publication of original research, surveying and tutorial contributions on the analysis and development of computing and information science. The journal is designed mainly to serve researchers and developers, dealing with information and computing. Papers that can provide both theoretical analysis, along with carefully designed computational experiments, are particularly welcome. The journal is published 2-3 times per year with distribution to librarians, universities, research centers, researchers in computing, mathematics, and information science. The journal maintains strict refereeing procedures through its editorial policies in order to publish papers of only the highest quality. The refereeing is done by anonymous Reviewers. Often, reviews take four months to six months to obtain, occasionally longer, and it takes an additional several months for the publication process.

DOI: http://dx.doi.org/10.21700/ijcis.2016.126

Application of FPTRNG and Logistic Map in Cryptography

Hanaa Mohsin Ahmed      email: 110113@uotechnology.edu.iq

Department Department of Computer Science, Iraq University of Technology, Baghdad, Iraq


Received: 01 May 2016
Revised: 12 August 2016
Accepted: 10 September 2016
Published: 25 December 2016

Abstract: Recently, chaos theory has appeared as the core of many applications in cryptography, information hiding and forensics. One of these chaotic maps is the logistic map. Usually, the secret key (initial condition and control parameter), must be greater than 214 bytes to avoid any cryptographic attack. However, remembering such a long key proves impractical. An ID-based random number generator is used to generate TRNG or PRNG. In this work, I propose an FPTRNG to be used as the secret key for the logistic map. To address the design need, a symmetric logistic-map-based cryptographic system is implemented using confusion and diffusion. The design is tested with image data types. The experiment analyses the following parameters: key space, key sensitivity, sensitivity, autocorrelation, histograms, information entropy, randomness and execution speed. The results show the effectiveness of the proposed technique for secure image data and applicability to multimedia security.

Keywords: Cryptosystem Application, Chaos; Logistic Map; FPTRNG; Multimedia Security.

  • PDF (553 KB)
  • ZIP (540 KB)



    Prof. Jihad Mohamad Alja'am 
    Email: journal.editor.ijcis@gmail.com

    The Journal Secretary
    Eng. Dana Bandok
    Ontario, Canada 
    Email: sec.ijcis@gmail.com 

    Home Page »