ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
Optimization Research of Hyperchaotic Model-Driven Encryption Algorithm in Network Security
PDF
HTML

Keywords

Hyperchaotic model
encryption algorithm
network security
performance optimization

How to Cite

[1]
P. . Zhansong, “Optimization Research of Hyperchaotic Model-Driven Encryption Algorithm in Network Security”, JCSANDM, vol. 14, no. 02, pp. 283–310, Jun. 2025.

Abstract

In the context of the rapid advancement of global informatization, network security is facing unprecedented challenges, among which encryption technology, as the core means to ensure data security, has become increasingly important. This study proposes an innovative solution to improve the security and efficiency of existing encryption technologies through an in-depth discussion of hyperchaos theory and its application in encryption algorithm design. In order to verify the effectiveness of the hyperchaotic model, this paper selects the classical Lorentz chaotic system as the basis, extends and upgrades it, and constructs a hyperchaotic environment with multiple variables and enhanced nonlinear strength. Then, we apply this model to the AES (Advanced Encryption Standard) standard encryption algorithm and form a new framework fusing hyperchaotic characteristics. Using the characteristics of initial value sensitivity and pseudo-random sequence generation ability of a hyperchaotic system, the dynamic key update and the uncertainty of data stream encryption are enhanced, thus improving the decryption difficulty and the ability to resist attacks. The experimental results show that under the same hardware environment, compared with the traditional AES without hyperchaos optimization, the new algorithm shows obvious advantages in the face of brute force cracking: when trying to use brute force cracking to parse the 128-bit key length, the average time required is extended from about 56 hours to more than 370 days; For 256-bit keys, it has risen from nearly 100 million years to a time range that is almost impossible to estimate. At the same time, during the encryption and decryption speed test, it was found that although there was a slight delay increase (the average data processing time per bit increased by about 1.2 milliseconds), the overall level could still be maintained at a relatively fast level, which was suitable for most real-life scenarios. The experimental results can prove that the hyperchaotic model can strengthen the security of the encryption algorithm and promote improving the network security level.

https://doi.org/10.13052/jcsm2245-1439.1422
PDF
HTML

References

S. X. Zhu, Q. K. Lu, Y. M. Feng, and D. F. Yan, “A 4D Entangled Memristor Hyperchaotic System and Its New Predefined-Time Sliding Mode Synchronization Control,” Ieee Access, vol. 12, pp. 145483–145495, 2024.

Y. H. Cao, C. Cai, X. Y. Xu, and X. G. Bi, “Cross-Channel Color Image Encryption Scheme Based on Discrete Memristive Coupled Neurons and DWT Compression,” Electronics, vol. 13, no. 13, 2024.

M. N. Hossain et al., “Design and Implementation of Secure CP-Less Multi-User OCDM Transceiver for 6G Wireless Communication Networks,” Ieee Access, vol. 12, pp. 79276–79296, 2024.

D. Clemente-López, J. M. Munoz-Pacheco, and J. D. Rangel-Magdaleno, “Experimental validation of IoT image encryption scheme based on a 5-D fractional hyperchaotic system and Numba JIT compiler,” Internet of Things, vol. 25, 2024.

M. Awais, M. A. Khan, and Z. Bashir, “Exploring the stochastic patterns of hyperchaotic Lorenz systems with variable fractional order and radial basis function networks,” Cluster Computing-the Journal of Networks Software Tools and Applications, vol. 27, no. 7, pp. 9031–9064, 2024.

D. H. Jiang, Z. T. Njitacke, J. D. Nkapkop, N. Tsafack, X. Y. Wang, and J. Awrejcewicz, “A New Cross Ring Neural Network: Dynamic Investigations and Application to WBAN,” Ieee Internet of Things Journal, vol. 10, no. 8, pp. 7143–7152, 2023.

N. R. Babu, P. Balasubramaniam, and E. M. Joo, “Video encryption via synchronization of a fractional order T-S fuzzy memristive hyperchaotic system,” Multimedia Tools and Applications, vol. 83, no. 9, pp. 26055–26088, 2024.

X. J. Tong, X. L. Liu, T. Pan, M. Zhang, and Z. Wang, “A visually meaningful secure image encryption algorithm based on conservative hyperchaotic system and optimized compressed sensing,” Multimedia Systems, vol. 30, no. 3, 2024.

H.-C. Lin, F.-Y. Chou, Y.-X. Hong, and Y.-W. Wang, “Fast Elevator Vibration Signal Cloud Collection System Using Data Compression and Encryption Algorithms,” Sensors and Materials, vol. 34, no. 6, pp. 2311–2324, 2022.

Y. Yang, X. Xiong, Z. Liu, S. Jin, and J. Wang, “High-Performance Encryption Algorithms for Dynamic Images Transmission,” Electronics, vol. 13, no. 1, 2024.

M. Alanzy, R. Alomrani, B. Alqarni, and S. Almutairi, “Image Steganography Using LSB and Hybrid Encryption Algorithms,” Applied Sciences-Basel, vol. 13, no. 21, 2023.

N. Gupta, R. Vijay, and H. K. Gupta, “Performance Evaluation of Symmetrical Encryption Algorithms with Wavelet Based Compression Technique,” Eai Endorsed Transactions on Scalable Information Systems, vol. 7, no. 28, 2020.

L. Li, “Secure encryption algorithms for wireless sensor networks based on node trust value,” International Journal of Internet Protocol Technology, vol. 13, no. 3, pp. 117–123, 2020.

P. Fang, H. Liu, C. Wu, and M. Liu, “A survey of image encryption algorithms based on chaotic system,” Visual Computer, vol. 39, no. 5, pp. 1975–2003, 2023.

P. Li and K.-T. Lo, “Survey on JPEG compatible joint image compression and encryption algorithms,” Iet Signal Processing, vol. 14, no. 8, pp. 475–488, 2020.

R. Hamza et al., “Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms,” Entropy, vol. 24, no. 4, 2022.

A. Bozorgchenani, C. C. Zarakovitis, S. F. Chien, T. O. Ting, Q. Ni, and W. Mallouli, “Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks,” Computer Networks, vol. 237, 2023.

V. S. Mai, R. J. La, and A. Battou, “Optimal Cybersecurity Investments in Large Networks Using SIS Model: Algorithm Design,” Ieee-Acm Transactions on Networking, vol. 29, no. 6, pp. 2453–2466, 2021.

H. Najafi Mohsenabad and M. A. Tut, “Optimizing Cybersecurity Attack Detection in Computer Networks: A Comparative Analysis of Bio-Inspired Optimization Algorithms Using the CSE-CIC-IDS 2018 Dataset,” Applied Sciences-Basel, vol. 14, no. 3, 2024.

J. Hou, F. Teng, W. Yin, Y. Song, and Y. Hou, “Preventive-Corrective Cyber-Defense: Attack-Induced Region Minimization and Cybersecurity Margin Maximization,” Ieee Transactions on Power Systems, vol. 39, no. 3, pp. 5324–5337, 2024.

R. Kirner and P. Puschner, “A qualitative cybersecurity analysis of time-triggered communication networks in automotive systems,” Journal of Systems Architecture, vol. 136, 2023.

A. Priyadarshini, S. P. Abirami, M. A. Ahmed, and B. Arunkumar, “Quantum-enhanced cybersecurity analysis and medical image encryption in cloud IoT networks,” Optical and Quantum Electronics, vol. 56, no. 4, 2024.

Z. Shi, H. Li, D. Zhao, and C. Pan, “Research on quality assessment methods for cybersecurity knowledge graphs,” Computers & Security, vol. 142, 2024.

T. D. Le, T. Le -Dinh, and S. Uwizeyemungu, “Search engine optimization poisoning: A cybersecurity threat analysis and mitigation strategies for small and medium-sized enterprises,” Technology in Society, vol. 76, 2024.

C. Chindrus and C. F. Caruntu, “Securing the Network: A Red and Blue Cybersecurity Competition Case Study,” Information, vol. 14, no. 11, 2023.

T. Schiller, B. Caulkins, A. S. Wu, and S. Mondesire, “Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing,” Information, vol. 14, no. 10, 2023.

D.-H. Lee, C.-M. Kim, H.-S. Song, Y.-H. Lee, and W.-S. Chung, “Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine,” Sensors, vol. 23, no. 3, 2023.

Z. Wang, H. Zhu, P. Liu, and L. Sun, “Social engineering in cybersecurity: a domain ontology and knowledge graph application examples,” Cybersecurity, vol. 4, no. 1, 2021.

J. F. Zhang, W. S. Zhang, and J. D. Xu, “StegEraser: Defending cybersecurity against malicious covert communications,” Journal of Computer Security, vol. 32, no. 2, pp. 117–139, 2024.

I. Kim, M. Park, H. J. Lee, J. Jang, S. J. Lee, and D. Shin, “A Study on the Multi-Cyber Range Application of Mission-Based Cybersecurity Testing and Evaluation in Association with the Risk Management Framework,” Information, vol. 15, no. 1, 2024.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Copyright (c) 2025 Journal of Cyber Security and Mobility

Downloads

Download data is not yet available.