Chebyshev Polynomial based ElGamal Encryption with Chaotic Greater Cane Algorithm for Secure Communication

Authors

  • N.V.S.S.Prabhakar
  • Talari Surendra GITAM
  • G. Narsimlu
  • Subrahmanya S Meduri
  • PSVS Sridhar

DOI:

https://doi.org/10.22399/ijcesen.1844

Abstract

Recently, the practice of Chebyshev polynomials in public-key system design has been recommended. In fact, they have certain satisfying chaotic features that make them appropriate for usage in cryptography. Thereby, various public-key cryptosystem employing Chebyshev polynomials has been focused however, the successive analysis has revealed its insecurity. In this paper, a novel Chebyshev polynomial based ElGamal Encryption with Diffie- Hellman Key Exchange (CPEE-CFGC) is proposed for guaranteeing security in various applications. The various steps involve in CPEE-CFGC algorithm are key generation, encryption and decryption with secure key exchange process.  In the key generation process, the private keys are generated using Fuzzy Logistic Tent Membership Function (FLMF) for each party engaging in the communication. Then, the optimal keys are selected using Greater Cane Rat Algorithm (GCRA). The Diffie Hellman key exchange mechanism is exchange the keys in an unsecure channel. Further, the encryption and decryption process are carried out using chebyshev polynomial based ElGamal encryption (CPEE) algorithm. The simulation of CPEE-CFGC algorithm is carried out using python programming language, and the performance is evaluated with dissimilar performance indicators. As a result, the CPEE-CFGC has obtained a better key generation time of 10256.25 ms, encryption time of 5160.78 ms, decryption time of 230.45 ms and total execution time of 12100.57ms by varying the bit size to 2048 bits than the existing algorithms.

References

[1] Khan M., Alanazi A. S., Khan L. S., & Hussain I. (2021). An efficient image encryption scheme based on fractal Tromino and Chebyshev polynomial. Complex & Intelligent Systems. 7(5);2751-2764. https://doi.org/10.1007/s40747-021-00460-4

[2] Thushara G. A. & Mary Saira Bhanu S. (2023). Chebyshev Chaotic Map with Attribute Based Encryption on Session Based Data Sharing in Fog Environment. Peer-to-Peer Networking and Applications. 18(1). https://doi.org/10.1007/s12083-024-01841-5

[3] Sun J., Zhang P., & Kong X. (2023). Identity Authentication Protocol of Smart Home IoT based on Chebyshev Chaotic Mapping. International Journal of Advanced Computer Science and Applications. 14(4). https://doi.org/10.14569/ijacsa.2023.0140461

[4] Yupapin P., Meshram C., Barve S. K., Ibrahim R. W., & Akbar M. A. (2023). An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems. Soft Computing. 27(10);6033-6047. https://doi.org/10.1007/s00500-023-07889-4

[5] Jiang M. & Yang H. (2023). Image Encryption Algorithm Using Multi-Level Permutation and Improved Logistic–Chebyshev Coupled Map. Information. 14(8);456. https://doi.org/10.3390/info14080456

[6] Singh S., Sharma P. K., Moon S. Y., & Park J. H. (2024). Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing. 1-18. https://doi.org/10.1007/s12652-017-0494-4

[7] Adeniyi A. E., Jimoh R. G., & Awotunde J. B. (2024). A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security. Computers and Electrical Engineering. 118;109330. https://doi.org/10.2139/ssrn.4683742

[8] Manikandaprabhu P. & Samreetha M. (2024). A Review of Encryption and Decryption of Text Using the AES Algorithm. International Journal of Scientific Research and Engineering Trends. 10(2);400-404. https://ijsret.com/wp-content/uploads/2024/03/IJSRET_V10_issue2_195.pdf

[9] Adeniyi E. A., Falola P. B., Maashi M. S., Aljebreen M., & Bharany S. (2022). Secure sensitive data sharing using RSA and ElGamal cryptographic algorithms with hash functions. Information. 13(10);442. https://doi.org/10.3390/info13100442

[10] El-Douh A. A., Lu S. F., Elkony A., & Amein A. S. (2022). A systematic literature review: The taxonomy of hybrid cryptography models. Advances in Information and Communication Conference. 714-721. https://doi.org/10.1007/978-3-030-98015-3_49

[11] Rawat A. & Tiwari A. A Review on Cryptography. (2023). Conference: International Conference on Recent Trends in Engineering & Technology (ICRTET 2023). https://www.researchgate.net/publication/381828530_A_Review_on_Cryptography

[12] Somsuk K. & Sanemueang C. (2021). Increasing security to public key cryptography for point-to-point communication. Journal of Discrete Mathematical Sciences and Cryptography. 1-15. https://doi.org/10.1080/09720529.2021.1930656

[13] Zhang B. & Liu L. (2023). Chaos-based image encryption: Review, application, and challenges. Mathematics. 11(11);2585. https://doi.org/10.3390/math11112585

[14] Meshram A., Wazalwar N. M., & Meshram C. (2024). New Secure Password-based Authentication Procedure using Chebyshev Chaotic Maps. IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI). 2;1-6. https://doi.org/10.1109/iatmsi60426.2024.10503268

[15] Muhammad A. S. & Özkaynak F. (2021). SIEA: secure image encryption algorithm based on chaotic systems optimization algorithms and PUFs. Symmetry. 13(5);824. https://doi.org/10.3390/sym13050824

[16] Lu Q., Yu L., & Zhu C. (2022). Symmetric image encryption algorithm based on a new product trigonometric chaotic map. Symmetry. 14(2);373. https://doi.org/10.3390/sym14020373

[17] Dai W., Xu X., Song X., & Li G. (2021). Audio encryption algorithm based on chen memristor chaotic system. Symmetry. 14(1);17. https://doi.org/10.3390/sym14010017

[18] Alsaif H., Guesmi R., Kalghoum A., Alshammari B. M., & Guesmi T. (2023). A novel strong S-box design using quantum crossover and chaotic boolean functions for symmetric cryptosystems. Symmetry. 15(4);833. https://doi.org/10.3390/sym15040833

[19] Shahna K. U. (2023). Novel chaos based cryptosystem using four-dimensional hyper chaotic map with efficient permutation and substitution techniques. Chaos, Solitons & Fractals. 170;113383. https://doi.org/10.1016/j.chaos.2023.113383

[20] Rahul B., Kuppusamy K., & Senthilrajan A. (2023). Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function. Optik. 289;171253. https://doi.org/10.1016/j.ijleo.2023.171253

[21] Zhang C., Liang Y., Tavares A., Wang L., Gomes T., & Pinto S. (2024). An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA. Symmetry. 16(3);263. https://doi.org/10.3390/sym16030263

[22] Das S. & Namasudra S. (2022). A novel hybrid encryption method to secure healthcare data in IoT-enabled healthcare infrastructure. Computers and Electrical Engineering. 101;107991. https://doi.org/10.1016/j.compeleceng.2022.107991

[23] Reddy M. I., Reddy M. P., Reddy R. O., & Praveen A. (2024). Improved elliptical curve cryptography and chaotic mapping with fruitfly optimization algorithm for secure data transmission. Wireless Networks. 30(3);1151-1164. https://doi.org/10.1007/s11276-023-03554-8

[24] Rehman M. U. (2024). Quantum-enhanced chaotic image encryption: Strengthening digital data security with 1-D sine-based chaotic maps and quantum coding. Journal of King Saud University-Computer and Information Sciences. 36(3);101980. https://doi.org/10.1016/j.jksuci.2024.101980

[25] Vijayakumar M. & Ahilan A. (2024). An optimized chaotic S-box for real-time image encryption scheme based on 4-dimensional memristive hyperchaotic map. Ain Shams Engineering Journal. 15(4);102620. https://doi.org/10.1016/j.asej.2023.102620

[26] Imam R., Anwer F., & Nadeem M. (2022). An effective and enhanced RSA based public key encryption scheme (XRSA). International Journal of Information Technology. 14(5);2645-2656. https://doi.org/10.1007/s41870-022-00993-y

[27] Islam M. A., Islam M. A., Islam N., & Shabnam B. (2018). A modified and secured RSA public key cryptosystem based on "n" prime numbers. Journal of Computer and Communications. 6(03);78. https://doi.org/10.4236/jcc.2018.63006

[28] Thangavel M., Varalakshmi P., Murrali M., & Nithya K. (2015). An enhanced and secured RSA key generation scheme (ESRKGS). Journal of information security and applications. 20;3-10. https://doi.org/10.1016/j.jisa.2014.10.004

[29] Zhang C., Liang Y., Tavares A., Wang L., Gomes T., & Pinto S. (2024). An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA. Symmetry. 16(3);263. https://doi.org/10.3390/sym16030263

Downloads

Published

2025-05-09

How to Cite

N.V.S.S.Prabhakar, Talari Surendra, G. Narsimlu, Subrahmanya S Meduri, & PSVS Sridhar. (2025). Chebyshev Polynomial based ElGamal Encryption with Chaotic Greater Cane Algorithm for Secure Communication. International Journal of Computational and Experimental Science and Engineering, 11(2). https://doi.org/10.22399/ijcesen.1844

Issue

Section

Research Article