Chaos Based Text Encryption Using Image Encryption Algorithm
Chaos Based Text Encryption Using Image Encryption Algorithm
Submission Information
Result Information
Similarity 2%
1 10 20 30 40 50 60 70 80 90
Ref/Bib
Journal/ 3.93%
Publicatio
n 2.0%
A-Satisfactory (0-10%)
B-Upgrade (11-40%)
2 3 A C-Poor (41-60%)
D-Unacceptable (61-100%)
SIMILARITY % MATCHED SOURCES GRADE
EXCLUDED PHRASES
11 department of humanities and social sciences, birla institute of technology and science, pilani
12 department of electrical and electronics engineering, birla institute of technology and science,
pilani
13 department of economics and finance, birla institute of technology and science, pilani
14 department of computer science and information systems, birla institute of technology and science,
pilani
By
Utkarsh Bajpai
2019B5A80552P
ID No. : 2019B5A80552P
ABSTRACT :
Embarking on an intellectual quest to redefine the realm of text encryption, this thesis introduces a
pioneering approach that synergizes the intricate mechanisms of DNA sequence operations with the
unpredictability of chaotic maps. This novel methodology is predicated on the notion of
transforming plaintext into images, thereby leveraging the complexities of image encryption to
secure textual data. At the heart of this exploration lies the innovative use of DNA-based encoding,
applied to the pixel values of these images, mirroring the intricate and dense information storage
capabilities found in biological DNA sequences. This process is further augmented by the dynamic
integration of chaotic maps, specifically the logistic map, known for its sensitive dependence on
initial conditions and chaotic behavior.
The research journey entails a meticulous application of this novel encryption process, beginning
with the conversion of text to an image format—a pivotal step that bridges the traditional text
encryption methodologies with advanced image encryption techniques. Following this
transformation, the encryption algorithm embarks on encoding the image's pixel values into DNA
sequences, employing a set of predefined rules that translate the digital information into the
language of nucleotides. These sequences are then intricately manipulated using principles derived
from chaotic maps, infusing an element of unpredictability and complexity into the encrypted data.
Subsequently, the encrypted image undergoes a decryption process, wherein the DNA sequences are
decoded back into their original pixel values, reconstructing the image, which is then adeptly
converted back into plaintext. This entire process not only ensures the secure transmission of the
encrypted text but also maintains the integrity and confidentiality of the data.
A significant facet of this thesis is the comprehensive security analysis underpinning the research.
This analysis delves into the algorithm's resilience against a spectrum of cryptographic attacks,
supplemented by a rigorous statistical evaluation of the encrypted outputs. The behavior of the
logistic map, a cornerstone in the encryption process, is scrutinized to ensure its non-periodicity and
randomness—attributes that are paramount to the efficacy and security of the encryption technique.
The culmination of this research presents a compelling case for the DNA-based image encryption
method, reinforced by chaotic mapping, as a formidable and innovative solution in the
cryptographic landscape. The method’s robustness against conventional and advanced
cryptographic attacks, coupled with its innovative use of DNA sequences and chaos theory,
positions it as a promising avenue for securing sensitive textual data in an increasingly digital
world. This thesis not only contributes significantly to the field of cryptography but also opens new
horizons for future research, advocating for continued exploration into the realms of bio-inspired
cryptography and chaos theory.
1. Introduction
In the ever-evolving digital landscape where data reigns supreme, the art of concealing and
safeguarding textual information has burgeoned into an essential facet of cybersecurity. The advent
of sophisticated cyber threats has rendered traditional cryptographic methodologies increasingly
vulnerable, compelling a paradigm shift toward more intricate and resilient encryption techniques.
This thesis embarks on an intellectual odyssey to explore and refine such a technique, weaving
together the intricate complexities of DNA sequence operations with the unpredictability and
dynamism of chaotic maps to forge a groundbreaking text encryption methodology.
The impetus behind this exploration is the recognition that existing cryptographic methods, while
robust in their own right, are often found lacking in the face of advanced cryptanalytic assaults. In
response, this research delves into the uncharted territories of bio-inspired cryptography and the
enigmatic realms of chaos theory. By harnessing the structural intricacies of DNA – the very
blueprint of life – and the bewildering behavior of chaotic systems, particularly exemplified by the
logistic map, this thesis posits a novel and multifaceted approach to text encryption.
At its heart, the thesis unfolds a meticulously crafted DNA-based text encryption algorithm. This
algorithm transcends conventional boundaries by first transforming plaintext into a visual format –
an image – thus bridging the gap between textual and visual data encryption. The pixels of this
image are then encoded into DNA sequences, drawing inspiration from the vast and complex realm
of biological information storage. The chaotic map, specifically the logistic map known for its
dynamic and sensitive nature, is then employed to infuse a layer of unpredictability into the
encryption process. The interplay of DNA encoding with chaotic mapping not only amplifies the
security levels but also introduces a degree of complexity that challenges even the most
sophisticated cryptanalytic techniques.
This thesis navigates through the conceptualization, implementation, and exhaustive analysis of the
proposed encryption method. It rigorously evaluates the security implications of DNA sequence
operations combined with chaotic maps, probing the depths of their potential to reshape the
cryptographic landscape. Through theoretical exploration and empirical analysis, the research
delineates the algorithm's efficacy in resisting various forms of cryptographic attacks while
maintaining efficiency and computational practicality.
The culmination of this research presents not just a novel method for text encryption but a
significant leap in the field of cryptography. It is a testament to the innovative integration of DNA
computing and chaos theory, heralding a new era in the quest for impenetrable text encryption
methodologies. This thesis, therefore, stands as a pivotal contribution to the domain of information
security, paving the way for future explorations and innovations in cryptographic science.
2. Methodology
2.1 Overview of the Approach
Text Encryption Using DNA Sequence Operations and Chaotic Maps
This research introduces a novel methodology for text encryption, uniquely combining DNA
sequence operations with the principles of chaotic maps. The method is distinguished by its
interdisciplinary approach, leveraging concepts from biology, mathematics, and computer science to
enhance the security and complexity of text encryption.
Methodology Highlights:
1. Text-to-Image Conversion: The journey begins with transforming plaintext messages into
images, a pivotal step that bridges traditional text encryption with our novel approach.
2. DNA Sequence Encoding: Each pixel of the converted image is encoded into a DNA
sequence, emulating biological DNA where information is stored in sequences of
nucleotides.
3. Chaotic Map Integration: Chaotic behavior, inherent in maps like the logistic map, is
harnessed next. This step infuses dynamism and unpredictability into the encryption process.
4. Encryption Process: The manipulated DNA sequences are reformed into pixel values,
crafting an encrypted image that, despite its derivation from text, exhibits heightened
security owing to the DNA sequences' complexity and the chaotic map's unpredictability.
5. Decryption and Text Retrieval: The final act involves reversing the encryption process.
The DNA sequences of the encrypted image are decoded back, reconstructing the original
image, which is then converted back into plaintext.
2.2 Text-to-Image Conversion
Read Text Message into Buffer: The text message is first loaded into a buffer for processing.
1. UTF-8 Encoding of Characters: Each character in the text message is encoded using UTF-
8, which converts them into numbers ranging from 0 to 65535.
1
2. Conversion to Positional System with Base 256: The UTF-8 encoded numbers are then
transformed into a positional system with base 256. This is done by representing each
number ti as ti=ai⋅256+bi, where ai and bi are coefficients.
3. Calculation of Image Size: The dimensions of the image (height and width) are calculated
using a specific formula that considers the length of the transformed text.
4. Padding and Random Value Addition: If necessary, the data is padded with an “End-of-
Text” character and random values to meet the size requirements for the conversion.
5. Formation of Pixel Array: The processed data is then arranged into a three-dimensional
array that represents the pixel values of the image.
6. Saving as PNG File: Finally, this array is treated as an image and saved in PNG format.
Using the DNA mapping scheme for binary to nucleotide that converts pixel values to DNA
sequences, the image is encoded as:
00 A
01 C
10 G
11 T
Mapping Scheme
Image after Mapping
A pseudo-random sequence is generated, simulating the output from a chaotic map like the logistic
map. For our example, this sequence is: 1, 3, 2, 0, 1, 2, 3, 1, 0. The DNA sequences are then
changed according to the chaotic sequence. In this example, the manipulation involves shifting the
sequences. The result is the encrypted image represented by the new DNA sequences:
Encrypted Image
The final encrypted image, represented by the altered DNA sequences, significantly differs from the
original image, demonstrating the effectiveness of the encryption.
The analysis of encrypted imagery, derived from the texts "!Hello, World" and "?Hello, World,"
accentuates the profound impact of a solitary character's metamorphosis. Upon visual scrutiny, the
encrypted incarnations of these texts exhibit stark disparities, a testament to the encryption's
acumen in capturing even the most nuanced of textual variations.
Quantitative Analysis
• Difference Percentage: A quantitative dissection reveals that the disparity between the two
encrypted images is a staggering 837.04% relative to the total image size. This pronounced
deviation, elicited by a mere flicker of change in the plaintext, speaks volumes about the
encryption's ability to transmute minor textual fluctuations into major visual contrasts.
Implications
• High Sensitivity: The encryption algorithm demonstrates high sensitivity to changes in the
input text. A small alteration in the plaintext results in a significantly different encrypted
image, which is a desirable property for encryption algorithms as it enhances security
against differential cryptanalysis.
• Resistance to Differential Attacks: This level of sensitivity suggests that the algorithm
would be resistant to differential cryptanalysis, where an attacker attempts to exploit the
effects of differences in plaintext on the ciphertext.
3.2 Chosen - Plaintext Attack Analysis
We'll choose plain texts with varying lengths and characters to see how they are encrypted
differently.
The encrypted images of various chosen plain texts are displayed above. Each image corresponds to
a different plain text, ranging from short texts to longer ones, including numerical and special
characters.
Observations
• Visual Patterns: There are no immediately discernible patterns or consistencies across the
encrypted images. Each image appears visually distinct, with no obvious correlation to the
length or content of the plaintext.
• Sensitivity to Text Length and Content: The encryption algorithm seems to handle varying
lengths and types of plaintexts without creating recognizable patterns, which is a positive
sign of security.
Implications
Implications
• Resistance to Statistical Attacks: The uniform and patternless distribution of pixel values
indicates that the encryption algorithm is likely resistant to statistical attacks. In statistical
attacks, attackers look for patterns or biases in the distribution of pixel values to extract
information. The lack of such patterns in these encrypted images suggests that gaining
insights from the distribution alone would be challenging.
• Randomness: The randomness indicated by these distributions is a key aspect of strong
encryption, as it means the encrypted image does not retain any visible characteristics of the
original image or text.
The corrected graph above shows the relationship between text length (number of characters) and
the total time required for the entire process, including text-to-image conversion, encryption,
decryption, and image-to-text conversion.
Insights
• Linear Relationship: The relationship between text length and total time appears to be
linear, indicating that the time complexity of the process scales proportionally with the
length of the text.
• Practical Implications: For shorter texts, the process is extremely quick, but for longer
texts, the time increases linearly, which is an important consideration for applications where
time efficiency is critical.
• Algorithm Efficiency: The linear trend also suggests that the algorithms used for each step
of the process have a time complexity that scales linearly with the size of the input data,
which is a desirable property in terms of scalability.
3.5 Key Space Analysis
The plotted sequences above represent the behavior of the logistic map for a range of r values in
the chaotic region and different initial x values.
Observations
• Non-Repeating Nature: The sequences do not show any evident repeating patterns, which
is indicative of non-periodicity. This is a key characteristic of chaos, as it implies
unpredictability and complexity.
• Variation with Parameters: The sequences vary significantly with changes in both the r
and x values. Each combination of r and x produces a distinct sequence, demonstrating the
sensitivity of the chaotic map to its initial conditions.
• Random-like Behavior: The values in each sequence fluctuate irregularly, resembling
random behavior. This lack of predictability is essential for the security of the encryption
algorithm.
Implications
• Robustness Against Prediction: The non-repeating and irregular nature of these sequences
contributes to the robustness of the encryption algorithm against prediction and analysis. An
attacker would find it challenging to predict future values of the sequence or to reverse-
engineer the initial conditions or the parameters.
• Sensitivity to Initial Conditions: The significant variation in sequences with different
initial conditions underscores the importance of securely choosing and managing the initial
parameters (r and x) in the encryption process.
4. Results and Discussions
The core innovation of the thesis rests upon the unique text-to-image conversion, followed by
DNA-based encryption using chaotic maps, resulting in a robust encryption technique. The research
meticulously evaluates the DNA sequence operations in tandem with the chaotic behavior of
logistic maps, offering a comprehensive analysis of security and efficiency aspects of text
encryption.
• Differential Cryptanalysis
• Significant Sensitivity: The differential cryptanalysis revealed that a minor
alteration in the plaintext led to an 837.04% difference in the encrypted images
compared to the original. This substantial change highlights the algorithm's high
sensitivity, which is crucial for cryptographic security.
• Resistance to Differential Attacks: The substantial alteration in encrypted images
due to minor changes in plaintext underscores the algorithm's resistance to
differential attacks, a critical attribute in cryptographic security.
• Chosen-Plaintext and Known-Plaintext Attack Analysis
• No Patterns Detected: The analyses for both chosen-plaintext and known-plaintext
attacks indicated no discernible patterns across encrypted images, affirming the
method's capability to manage varying text lengths and contents without security
compromise.
• Complexity and Unpredictability: The absence of patterns in encrypted images
enhances the method's resistance to such attacks, suggesting the encryption's inherent
complexity and unpredictability.
• Statistical Analysis
• Uniform and Patternless Distribution: The statistical analysis of pixel value
distribution in encrypted images showed a uniform and patternless spread. This
indicates strong resistance to statistical attacks.
• Randomness Ensured: The random-like behavior of pixel values in encrypted
images ensures that they do not retain characteristics of the original text or image,
contributing to the encryption's effectiveness.
• Efficiency and Key Space Analysis
• Computational Efficiency: The process demonstrated remarkable computational
efficiency, with each step, including text-to-image conversion (0.00020 seconds),
image encryption (0.00064 seconds), image decryption (0.00056 seconds), and
image-to-text conversion (0.00002 seconds), completing in less than a millisecond.
• Substantial Key Space: The key space analysis revealed a substantial key space of
approximately 430 billion, implying significant security against brute-force attacks.
• Management of Initial Conditions: The analysis also highlighted the importance of
managing initial conditions to prevent predictability, reinforcing the encryption's
overall security.
• Logistic Map Behavior in Key Space Analysis
• Non-Repeating and Sensitive Nature: The logistic map's behavior was explored,
emphasizing its non-repeating and sensitive nature to initial conditions. This aspect is
crucial for the encryption's robustness.
• Importance of Secure Parameter Selection: The sensitivity to initial conditions
underscores the significance of secure parameter selection in the encryption process,
further reinforcing its security.