Open Access
ARTICLE
Innovative Lightweight Encryption Schemes Leveraging Chaotic Systems for Secure Data Transmission
1 Informatics Institute for Postgraduate Studies, Iraqi Commission for Computers and Informatics, Baghdad, 10069, Iraq
2 Department of Computer Science, College of Science, University of Mustansiriyah, Baghdad, 10052, Iraq
* Corresponding Author: Haider H. Al-Mahmood. Email:
Intelligent Automation & Soft Computing 2025, 40, 53-74. https://doi.org/10.32604/iasc.2024.059691
Received 15 October 2024; Accepted 10 December 2024; Issue published 10 January 2025
Abstract
In secure communications, lightweight encryption has become crucial, particularly for resource-constrained applications such as embedded devices, wireless sensor networks, and the Internet of Things (IoT). As these systems proliferate, cryptographic approaches that provide robust security while minimizing computing overhead, energy consumption, and memory usage are becoming increasingly essential. This study examines lightweight encryption techniques utilizing chaotic maps to ensure secure data transmission. Two algorithms are proposed, both employing the Logistic map; the first approach utilizes two logistic chaotic maps, while the second algorithm employs a single logistic chaotic map. Algorithm 1, including a two-stage mechanism that uses chaotic maps for both transposition and key generation, is distinguished by its robustness, guaranteeing a secure encryption method. The second technique utilized a single logistic chaotic map eliminating the second chaotic map decreases computing complexity while maintaining security. The efficacy of both algorithms was evaluated by subjecting them to NIST randomness tests following testing on text files of varying sizes. The findings demonstrate that the double chaotic map method regularly achieves elevated unpredictability and resilience. Conversely, the singular chaotic algorithm markedly lowers the duration necessary for encryption and decryption. These data suggest that while both algorithms are effective, their choice may be contingent upon specific security and processing speed requirements in practical applications.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.