Abstract
Designing efficient and secure cryptosystems has been a preoccupation for many scientists and engineers for a long time wherein they use chaotic systems to design new cryptosystems. While one dimensional (1-D) chaotic maps possess powerful properties compared to higher dimension ones, they are vulnerable to various attacks due to their small key space, chaotic discontinuous ranges, and degradation in chaotic dynamical behaviours. Moreover, when simulated on a computer, every such chaotic system produces a periodic cycle. Meanwhile, quantum random walks exhibit the potential for deployment in efficient cryptosystem design, which makes it an excellent solution for this problem. In this context, we present a new method for constructing substitution boxes (S-boxes) based on cascaded quantum-inspired quantum walks and chaos inducement. The performance of the proposed S-box scheme is investigated via established S-box evaluation criterion and outcomes suggest that the constructed S-box has significant qualities for viable applications information security. Further, we present an efficient scheme for pseudo-random numbers generation (PRNG) whose sustainability over long periods remedies the periodicity problem associated with traditional cryptographic applications. Furthermore, by combining the two mechanisms, an atypical image encryption scheme is introduced. Simulation results and analysis validate that the proposed image encryption algorithm will offer gains in many cryptographic applications.
Similar content being viewed by others
Introduction
Chaotic systems have attracted a great deal of attention across different scientific and engineering disciplines, especially in designing new cryptosystems and cryptanalysis. A chaotic system is an evolution map of a deterministic dynamical system that reconstructs the state of a system S0 to a new state S1 depending on the initial state of S0, a control parameter C, and time T1. Chaotic maps exhibit the desired properties of ergodicity, unpredictability, and sensitivity to their control parameter(s) and initial value(s) that satisfy the requirements for cryptosystem confusion-diffusion properties2,3,4. In fact, an inappropriate initial control parameter of a chaotic system can lead to non-chaotic behaviours, which implies the reduction in nonlinearity levels as well as circumvention of insecurity pitfalls5,6.
Currently, chaotic dynamical systems play a vital role in designing modern cryptographic applications, such as constructing S-boxes, generating pseudo-random numbers, designing image encryption algorithms and so on7,8,9,10,11,12,13,14,15,16, which are based on the unproven assumptions pertaining to computational complexity and that their constructions are based on mathematical models. However, with the development of quantum technologies, some of these traditional security mechanisms, and cryptographic applications may be effortlessly violated and abused17,18,19.
Among the computational models developed in quantum computation, quantum walks (QWs), which is a universal model of quantum computation that has been traditionally employed to develop modern quantum algorithms20,21. While physical quantum computing hardware are as yet unavailable, quantum inspired frameworks provide platforms for simulating pseudo-quantum algorithms, which, within the limits of bounds imposed by the capability of digital computers, can to execute some of the quantum mechanical properties ascribed for the potency of quantum computation22,23,24. Moreover, based on the rationale that computation of the position probability distribution of a quantum walker requires computation of probabilities of frequencies (i.e. the number of detections at a given graph vertex divided by the total number of detections). This requires sufficient number of repetitions of the experiment in order to retrieve the probability distribution. Among others, this has motivated the use of quantum-inspired discrete-time quantum walks have been presented as viable resources useful in designing chaotic system for image encryption algorithms25,26,27,28,29. This procedure allows us to consider a quantum-inspired discrete quantum walk Q as a nonlinear mapping \(Q:H\mapsto P\) where H is a Hilbert space in which the walker exists and P is a set of probability distributions. At this juncture, we note that our notion of a quantum-inspired approach implies use of probability distribution of a quantum walk obtained from numerical simulations using digital resources.
The nonlinear behaviour of quantum-inspired walks described above together with the deterministic nature of state growth via unitary operators as well as the high sensitivity of quantum walks to initial conditions support the treatment of quantum-inspired discrete quantum walks as discrete-time and discrete-value chaotic systems25,26,30.
Inspired by the excellent dynamical properties of quantum walks, the limitations of traditional cryptosystems can be ameliorated via design and construction state-of-the-art techniques for effective information security applications. In addition to other benefits, a main contribution of this study is to explore the integration of quantum-inspired of quantum walks into traditional cryptographic applications. Hence, we present a bi-level cascaded quantum walks protocol as a quantum-inspired random number generator with chaos inducement. The performance of the proposed S-box scheme is investigated using established criterions, results of which suggest that the constructed S-box is viable for multifaceted applications in information security. Similarly, the analyses of the proposed PRNG suggest its efficiency in generating sequences that remedy the periodicity problem associated with traditional cryptographic applications. Finally, we deploy the dual cascade quantum walks and chaos systems for applications in image encryption. Throughout, simulation-based validation is used to assess the performance of the proposed scheme. Outcomes from our applications for S-boxes construction, pseudo-random number generation, and image encryption validate the choice of cascaded quantum walks and chaos inducement for various cryptographic applications. At this point we clarify that this study is focused on exploiting properties of quantum walks for use in a quantum-inspired setting for potential applications in traditional cryptography. Hence, the quantum mechanical implementation of quantum walks is deemed outside the purview of this present work. Nevertheless, we enrich our bibliography by including interesting studies on such implementation19,20,31,32,33,34,35,36,37,38,39,40 from where interested readers can obtain further details.
Results
S-box construction
Designing powerful S-boxes is an important critereon for realisation of secure cryptosystems and it is a major component of nonlinear transformations, which are the fulcrum of confusion and diffusion analysis for assessing well-designed ciphers41. Therefore, designing S-boxes based on secure mechanisms plays an important part in modern cryptographic tasks42,43. Consequently, it is widely investigated. For example, in a recent effort EL-Latif el al.30 explored construction of secure S-boxes based on one-dimensional two-walker QWs on a circle. Inspired by the potency of quantum technologies, in this section, we propose a mechanism to augment some shortcomings of standard S-box construction and integrate our upgraded design into a cascaded QW and chaos inducement system for designing efficient cryptographs.
The following steps outline the construction of an M-length S-box.
Step 1: Choose initial seed for x0 and a value for the control parameter λ, to iterate the logistic-sine map over N times needed to generate sequence \(\{{X}_{i}\}\).
Step 2: Choose initial conditions and key parameters (\(v,t,{\alpha }_{1},{\alpha }_{2},{\beta }_{1},{\beta }_{2}\)) for running QWs on a circle with v vertices to produce a probability matrix \({P}_{v\times v}\), where v is odd number, \({\alpha }_{1},{\alpha }_{2},{\beta }_{1},{\beta }_{2}\in [0,\pi ]\) and t is the number of steps for running QWs. Hence, the coin operator \(\hat{C}\) constructed by the key parameters \({\beta }_{1}\) and \({\beta }_{2}\), while the initial states of the two walkers are \({H}_{C1}=\,\cos \,{\alpha }_{1}|0\rangle +\,\sin \,{\alpha }_{1}|1\rangle \) and \({H}_{C2}=\,\cos \,{\alpha }_{2}|0\rangle +\,\sin \,{\alpha }_{2}|1\rangle \), respectively.
Step 3: Resize P to QWN, where N is the number of iterated chaos map. Here, we recall that mathematically no error arises from scaling a matirix with fixed dimentions several times. Targeting such a property, in this step, we make use of the bicubic interpolation resizing44, which has zero error during the scalling process etc. This attribute allows it to accommodate prolonged iterations in the chaos map generation.
Step 4: Convert the sequences \(\{{X}_{i}\}\), and \(\{Q{W}_{i}\}\) into integer values via Eqs. (1) and (2).
Step 5: Perform the bitwise XOR operation on the sequences \(\{S{X}_{i}\}\), and \(\{SQ{W}_{i}\}\) to produce the sequence \(\{{S}_{i}\}\) with range from 0 to M-1.
Step 6: Collate the first M dissimilar elements from the sequence \(\{{S}_{i}\}\) to construct the desired S-box.
The performance of the S-box construction technique is investigated using a workstation equipped with Intel® core™ i5-2450M CPU 2.5 GHz and 6 GB RAM with a preinstalled MATLAB software. The initial values for running QWs are set as \(v=17\), \(t=57\), \({\alpha }_{1}=0\), \({\alpha }_{2}=\pi /2\), \({\beta }_{1}=\pi /6\), \({\beta }_{2}=\pi /6\), while initial values used to iterate the logistic-sine map are set as \({L}_{0}=0.4\), \(\lambda =3.82\).
The constructed 16 × 16 S-box costructed based on the aforesaid initial conditions and control parameters is presented in Table 1, while Table 2 provides comparison of the performance of the constructed S-box alongside those some published schemes alongside the proposed one in terms of standard parameters of strict avalanche (SAC), nonlinearity, bit independence (BIC), as well as differential (DP) and linear (LP) approximation probabilities.
PRNG generator
Pseudo-random number generation (PRNG) plays a fundamental role in creating powerful cryptographic schemes and, as such, they attract a great deal of attention from many cryptographers and engineers. The key feature of PRNG is to provide long streams of numbers embedded with randomness features. PRNG has a vital impact on the robustness of cryptographic tasks and in mitigating attempts to violate, tamper with, or regenerate the secret information being protected. The common approach employed in designing PRNG generators is based on using chaos maps, which is a simple (in terms of definition), yet disorienting approach intended to circumvent infractions to sensitive information9,11. Previous efforts, such as45, profit from the utility of quantum walks to overcome established limitations of traditional chaos maps. Furthermore, Yang et al.45 proposed a novel PRNG mechanism based on quantum walks.
Motivated by the effort in45, in this section, we discuss our proposed mechanism for PRNG sequence generation whose outline is presented in Fig. 1 and execution is accomplished via the five steps enumerated in the sequel.
Step 1: Select initial seed for \({x}_{0}\) and a value for the control parameter \(\lambda \), to iterate the logistic-sine map over N times needed to generate sequence \(\{{X}_{i}\}\).
Step 2: Select initial conditions and key parameters (\(v,t,{\alpha }_{1},{\alpha }_{2},{\beta }_{1},{\beta }_{2}\)) for running QWs on a circle with v vertices to produce a probability matrix \({P}_{v\times v}\), where v is odd number, \({\alpha }_{1},{\alpha }_{2},{\beta }_{1},{\beta }_{2}\in [0,\pi ]\) and t is the number of steps for running QWs. Hence, the coin operator \(\hat{C}\) constructed by the key parameters \({\beta }_{1}\) and \({\beta }_{2}\), while the initial states of the two walkers are \({H}_{C1}=\,\cos \,{\alpha }_{1}|0\rangle +\,\sin \,{\alpha }_{1}|1\rangle \) and \({H}_{C2}=\,\cos \,{\alpha }_{2}|0\rangle +\,\sin \,{\alpha }_{2}|1\rangle \), respectively.
Step 3: Resize \(P\) to \(Q{W}_{N}\), where N is the number of iterations for the chaos map as well as the length of desired PRNG sequence.
Step 4: Convert the sequences \(\{{X}_{i}\}\), and \(\{Q{W}_{i}\}\) into integer values as follows:
Step 5: Perform bitwise XOR operation on the sequences \(\{S{X}_{i}\}\), and \(\{SQ{W}_{i}\}\) to generate a PRNG sequence, S of length N.
To investigate the randomness property of the generated PRNG sequence S, we applied NIST SP 800-22 specified tests. These tests comprise of fifteen (15) assessments that are performed on a generated sequence of 106 bits length. We used the same initial values and control parameters for constructing S-box to generate the PRNG sequence whose results are presented in Table 3. As seen therefrom, the sequence generated via the proposed mechanism excelled in all tests carried out; thus, confirming its utility across various cryptographic applications.
Application of proposed cascade protocol in image encryption
The intuition to utilise chaos systems in image encryption is not new, including many employing one-dimensional or higher dimension chaotic systems to generate a sequence of random numbers for construction of a cipher image that have been broached in12,13,14,15,16. However, most of these approaches produce images that are vulnerable to various attacks due to their narrow key-space allowance and imprecise mathematical construction. Consequently, to ameliorate this, some interesting image encryption algorithms based on the dynamical properties of QWs were proposed in25,26 and27.
In this section, we exploit the potency of quantum computing technologies to ameliorate some established shortcomings inherent to existing chaos systems. Our proposed image encryption technique utilises the S-box construction and PRNG sequence generation methods presented in earlier sections of this study to substitute and permutate each pixel of a plain image and construct its encrypted version. These procedures and their perfomance analysis are further elucidated in the remainder of this section.
The general framework for the proposed image encryption technique is illustrated in Fig. 2, while the encryption procedures are outlined in the following steps.
-
1.
Select initial values for generating two S-boxes SH and SW of lengths h and w respectively, where the size of the original image is h × w.
-
2.
Select initial values for generating one PRNG sequence K of length h × w (or h × w × 3 for colour images) where the size of the original image is h × w.
-
3.
Perform bitwise XOR operation on original image and matrix K to obtain an Xored image.
-
4.
Permutate the Xored image using the constructed S-boxes as outlined in Algorithm 1.
Performance analysis
To validate the proposed strategy, we simulated implementation of the image encryption algorithm using a dataset comprising of three greyscale (Bridge, Boat and Baboon) and three colour images (Sailboat, Tree and House) sourced from the Signal and Image Processing Institute dataset46 and each of 256 × 256 dimensions. These test images are presented in Fig. 3(a–f). Initial values for running the QWs to construct S-boxes and generate PRNG sequences were set at \(v=19\), \(t=25\), \({\alpha }_{1}=0\), \({\alpha }_{2}=\pi /2\), \({\beta }_{1}=\pi /6\), \({\beta }_{2}=\pi /4\), while initial values used to iterate the logistic-sine map are set as \({L}_{0}=0.7524\), \(\lambda =3.8245\).
The resulting encrypted versions of the test images are presented in Fig. 3(g–m) and based on the pairing of each original and encrypted image pair we undertook a retinue of statistical analysis whose results are presented and discussed in subsequent subsections.
Correlation of adjacent pixels
Correlation coefficient, Cxy, is used to measure concordance between two adjacent pixels X and Y in an image. Theoretically, a pristine, i.e. unencrypted, image should have Cxy values close to 1 in each direction (horizontal, vertical and diagonal) whereas a well encrypted image should have values close to 047,48,49. To compute Cxy for the encrypted and original images in each direction, we randomly selected 10,000 pairs of neighbouring pixels and used (3) to quantify their correlation.
where \({x}_{i}\) and \({y}_{i}\) are values of adjacent pixels and M is the total number of adjacent pixel pairs in each direction. Tables 4 and 5 present the values of Cxy for the encrypted and corresponding original images, where the encrypted images have Cxy values close to 0. The distribution of neighbouring pixel pairs in each direction of Bridge image are graphed in Fig. 4, while those for the R, G, and B channels of the Sailboat colour image are presented in Figs. 5, 6 and 7, respectively. The results in Tables 4 and 5 as well as those in Figs. 4, 5, 6 and 7 suggest that for the three pairs reported there is no relation between the encrypted images and their original versions.
Pixel change rate
Another tool used to evaluate the effect of changing pixel values in an original image on its corresponding encrypted one is number of pixel change rate (NPCR), which is computed using (4).
where M denotes total number of pixels in the image. The fact that, as reported in Table 6, all the test images (in Fig. 3(a–f)) produced NPCR values of approximately 99.60% shows that the proposed encryption strategy is very sensitive to small changes in pixel values in the original image.
Histogram analysis
Histogram analysis is another widely used measure in image analysis that reflects the frequency distribution of pixel values in an image. A well-designed image encryption algorithm should have uniform histograms for different encrypted images, which is an indication of resistance against statistical attacks. Figures 8 and 9 present histograms for the original and encrypted versions of the greyscale images (in Fig. 3(a–c)) as well as the coloured colour Sailboat image in Fig. 3(d). Interpreting these plots, we deduce similarity in the distribution for the encrypted images. This is an affirmation that the encrypted images consist of flat-out noise. Meanwhile, the variability in the histograms of the original images indicate the presence of different levels of detail in those images. From the histogram analysis there is no relation between the encrypted image and its original one. Therefore, the proposed image encryption mechanism could resist histogram analysis attacks.
Information entropy
Information entropy, E(X), is an important tool to evaluate the efficiency of an image encryption algorithm. As expressed in (5), E(X) is a statistical measure of the distribution of pixel values for each level in an image.
where \(p({x}_{i})\) is the probability of obtaining \({x}_{i}\). Greyscale images have 28 possible values based on which the ideal theoretical entropy value should be 8 bits27. Consequently, for an efficient encryption mechanism, the entropy value for the encrypted images should be close to 8. Table 7 presents the entropy values for the pristine and corresponding encrypted images used in our experiments (i.e. Fig. 3). As targeted, the information entropies for almost all the pairings is expected to be 8 bits (Table 7). This certifies the viability of the proposed algorithm to withstand entropy-based attacks.
Key space analysis
Theoretically, quantum-inspired quantum walks have an infinite key space25,26,45, but due to the finite precision of digital computers, the key space is limited. Therefore, the key space size is evaluated relative to the 10−16 precision of digital computers, which is acceptable for quantum insipired numerical simulation of quantum walks on digital computers50,51. However, it is highly unrealistic for actual physical implementation of a quantum walk, which would be the goal of future quantum technologies. Nevertheless, such simulation would suffice for classical-based quantum inspired simulation of our proposed random number generator.
A well-designed encryption algorithm should have adequate key space allowance to withstand brute-force and other attacks intended to violate its integrity. In our algorithm, a plain-image is substituted with a PRNG sequence (from the presented PRNG mechanism), while the proposed S-box mechanism is used to permutate each pixel of the substituted image, which combined coalesces as the encrypted image. Therefore, in addition to possessing key parameters for generating PRNG, the proposed algorithm is ingrained with key space needed for constructing the S-boxes (key parameters are used both for generating PRNG sequence and constructing S-box). Since both the PRNG sequence generation and S-box construction schemes are components of the proposed cascade quantum-inspired quantum walks on a circle and logistic-sine map technique, which both possess key parameters (\(v,t,{\alpha }_{1},{\alpha }_{2},{\beta }_{1},{\beta }_{2},{x}_{0},\lambda \)), then the key space for generating PRNG or constructing S-boxes is 10128 and, therefore, the key space allowance for the image encryption algorithm presented earlier is 10256, which is adequate for any encryption algorithm. Table 8 provides a comparison of key spaces for the proposed mechanism in comparison with similar approaches. Outcomes therefrom demonstrate our proposed mechanism has a superior key space allowance.
As suggested by the guideline in52 key space must be greater than \({2}^{100}\simeq {10}^{30}\) for it to exhibit sufficient security against brute-force attacks. In our case, the proposed approach has a key space of 10256 which consists of all possible keys. Consequently, to mitigate against the exhaustive search-attacks, a good cipher should have a key space size of \(k > {10}^{98}\). This conforms with earlier guidelines in25,26,45. Based on the proposed approach, we can conclude that key size 10256 is adequate to forestall brute-force attacks in today’s and near future’s computers.
Key sensitivity analysis
To test the key sensitivity of the proposed image encryption algorithm, we demonstrate the decryption process for the encrypted Bridge and Sailboat images using several keys for constructing S-boxes and generating PRNG sequences. The results obtained therefrom are presented in Figs. 10 and 11, where Figs. 10(a) and 11(a) demonstrate near zero error during the scaling process for the probability matrix P.
Discussion
Discrete-time quantum random walks are regarded as nonlinear mappings between quantum states and position probability distributions. They provide an imprint of chaotic behaviour, which are mathematical properties that can be exploited in constructing robust cryptographic applications. The study presented explores the potential for deploying quantum-inspired quantum random walks (QiQw) in the design of efficient cryptosystems. We have presented three quantum-inspired mechanisms that cascade quantum walks as a random number generators with logistic-sine map to ameliorate problems of periodicity in chaotic ranges, narrow key space and chaotic discontinuous ranges that are associated with traditional cryptosystems. First, we presented a mechanism for constructions of S-boxes with prospects for wide-ranging applications in security technologies. Second, we proposed a scheme to generate PRNG sequences that remedy the periodicity problem encountered in cryptographic applications. Third, we coalesced the two strategies into a cascaded quantum walks on a circle with logistic-sine map and implemented it as an image encryption algorithm. Based on simulations of our proposed schemes, we undertook extensive statistical analysis to validate the efficiency, reliability and utility of our proposed techniques alongside established methods employed in different cryptographic applications. With further improvements, the study presented provides useful insights to integrate state-of-the-art quantum-inspired quantum resources into building efficient, secure, and robust future cryptography technologies.
Methods
Rudimentary background required for basic understanding of the proposed cascade quantum-inspired quantum walks and chaos system are highlighted in this section. Furthermore, a succinct overview on the execution of discrete-time quantum walks on a circle as well as the utility of logistic-sine map as a chaos system are expounded.
Discrete-time quantum walks on a circle
Unlike in classical (i.e. digital or non-quantum) walks, the state of a quantum walk is a coherent superposition of several positions (quantum superposition of quantum walks)53, but much like their classical (i.e. digital) equivalents, there are two categories of quantum walks: discrete-time quantum walks and continuous-time quantum walks20. In this study, we focus on discrete-time quantum walks (or simply QWs), which have shown viability in wide-ranging cryptographic applications18,19,25,26,28,30,45,54,55,56,57,58. QWs have two basic parts: the walker space Hp and the coin particle \({H}_{c}=\,\cos \,\alpha |0\rangle +\,\sin \,\alpha |1\rangle \), which permeates a Hilbert space \(|\psi {\rangle }_{0}={H}_{p}\otimes {H}_{c}\). The initial state of the system \(|\psi {\rangle }_{0}\) can be transformed into another state via application of the evolution operator \(\hat{U}\) for the whole quantum system
where \(\hat{S}\) refers to the shift operator that depends on the coin state of the particle, which can be defined on a circle with v vertices as presented in Eq. (7).
The operator \(\hat{C}\) refers to a 2 × 2 coin operator, whose general case can be defined in (8).
Hence, the final state \(|\psi {\rangle }_{r}\) after t steps can be expressed as
The probability of finding the walker at position x after t steps can be stated as
where \(|\psi {\rangle }_{0}\) is the initial state of the quantum system, \(P(x,t)\in [0,1]\) and \({\sum }_{x=0}^{v}\,P(x,r)=1\).
Another attractive characteristic of multi-walker quantum random walks is that, in the case of interacting walkers, the dimension of the Hilbert space of an n-particle quantum walk (composed of distinguishable walkers) increases exponentially with the number of walkers, a property that supports increased entanglement. These properties are unattainable in classical random walks. Consequently, in our proposed model, the impetus for use of two instead of one quantum walker is its offer of increased keyspace allowance, which is crucial for designing efficient cryptosystems. Further details on interacting two quantum walks on a circle can be obtained from19,59.
In our proposed model of quantum walks, two coins \(|coin{\rangle }_{1}\), \(|coin{\rangle }_{2}\) and two walkers \(|walker{\rangle }_{1}=\,\cos \,{\alpha }_{1}|0\rangle +\,\sin \,{\alpha }_{1}|1\rangle \), \(|walker{\rangle }_{2}=\,\cos \,{\alpha }_{2}|0\rangle +\,\sin \,{\alpha }_{2}|1\rangle \) will be used. The combined shift operator for the system is \(\hat{S}={\hat{S}}_{1}\otimes {\hat{S}}_{2}\)19,25,26, where \({\hat{S}}_{1}\) and \({\hat{S}}_{2}\) are shift operators for \(|walker{\rangle }_{1}\) and \(|walker{\rangle }_{2}\), respectively. Following the same rationale, we shall use two coin operators, one for each coin \(|coin{\rangle }_{1}\), \(|coin{\rangle }_{2}\). Therefore, the combined coin operator is a Unitary operator that can be written as an order 4 matrix19,25,26. In this study, we have chosen the coin matrices presented in Eq. 11.
An example illustrating the probability distributions of running one-dimensional two-particle quantum walks on a circle with 11 vertices is presented in Fig. 12, where the initial position is \(|0{\rangle }_{p}\) and the initial coin operator \(\hat{C}\) constructed by \({\beta }_{1}=\pi /6\) and \({\beta }_{2}=\pi /3\) in formats stated in Eq. 11. It is obvious that, for a circle with only odd v nodes, the probability is nonzero in any position if the number of steps t is greater than or equal to the number of nodes v. In this study, we utilised the probability distribution generated from using quantum-inspired two-walker quantum walks in the cascading system whose construction is based on the coherent superposition of several positions of quantum walks rather than constructions from a mathematical model as obtains in chaotic maps. Like other quantum measurement operations, measurements to recover states of quantum walks, involve retrieval of probability distributions by repeating the measurement process many times, which is not completely accurate. Meanwhile, as clarified in our introductory commentary, our notion of quantum-inspired quantum walks entails the use of probability distributions that are obtained via numerical simulations using digital resources. Nevertheless, like any cryptographic mechanism, if the key parameters of the quantum-inspired quantum walk are disclosed, then anyone can access the probability distribution with appreciable precision. On the other hand, if the parameters are unknown, but a part of the probability distribution is disclosed, then it is very difficult to estimate the key parameters or the recover the probability distribution because our quantum-inspired quantum walk is a one-way mechanism18,19,26. Consequently, it is envisioned that the suggested cryptographic applications would offer additional layers of tamper-proof security within the precepts of quantum-inspired quantum walks.
Discrete-time chaotic systems
As argued in earlier sections of this study, one-dimensional chaotic maps are considered in this study because they offer enhanced periodicity in chaotic ranges, narrow key space and chaotic discontinuous ranges when it is used in cryptographic systems60. However, the same one-dimensional chaotic maps exhibit powerful benefits in terms of high-speed processing, easy design and simple structure.
A widely used one-dimensional chaotic map is logistic-sine map16, which is expressed mathematically as
where \(\lambda \in [0,4]\) is the control parameter, and x0 is the initial condition.
Depending on the set of times T, chaotic dynamical systems can be divided into two classes, i.e. either continuous-time dynamical system (i.e. when T = R) or discrete-time dynamical system (if T = Z). Our study focuses on applying chaotic dynamical systems defined in discrete time, since they possess low computational complexity and do not need synchronization as in continuous-time dynamical system1,2,3.
References
Li, C., Feng, B., Li, S., Kurths, J. & Chen, G. Dynamic analysis of digital chaotic maps via state-mapping networks. IEEE Trans. Circuits Syst. I: Regul. Pap. 66, 2322–2335 (2019).
Matthews, R. On the derivation of a âchaoticâ encryption algorithm. Cryptologia 13, 29–42 (1989).
Kocarev, L. & Lian, S. Chaos-based cryptography: Theory, algorithms and applications, vol. 354 (Springer Science & Business Media, 2011).
Jallouli, O., El Assad, S., Chetto, M. & Lozi, R. Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques. Multimed. tools Appl. 77, 13391–13417 (2018).
Li, C., Lin, D., Lü, J. & Hao, F. Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimed. 25, 46–56 (2018).
Li, C., Lin, D., Feng, B., Lü, J. & Hao, F. Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access. 6, 75834–75842 (2018).
Zhou, Y., Hua, Z., Pun, C.-M. & Chen, C. P. Cascade chaotic system with applications. IEEE Trans. Cybern. 45, 2001–2012 (2014).
Lv, X., Liao, X. & Yang, B. A novel pseudo-random number generator from coupled map lattice with time-varying delay. Nonlinear Dyn. 94, 325–341 (2018).
Murillo-Escobar, M., Cruz-Hernández, C., Cardoza-Avendaño, L. & Méndez-Ramrez, R. A novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dyn. 87, 407–425 (2017).
Sahari, M. L. & Boukemara, I. A pseudo-random numbers generator based on a novel 3d chaotic map with an application to color image encryption. Nonlinear Dyn. 94, 723–744 (2018).
Lambić, D. Security analysis and improvement of the pseudo-random number generator based on quantum chaotic map. Nonlinear Dyn. 94, 1117–1126 (2018).
El-Latif, A. A. A., Li, L., Wang, N., Han, Q. & Niu, X. A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal. Process. 93, 2986–3000 (2013).
Belazi, A., El-Latif, A. A. A. & Belghith, S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal. Process. 128, 155–170 (2016).
Li, L., Abd-El-Atty, B., El-Latif, A. A. A. & Ghoneim, A. Quantum color image encryption based on multiple discrete chaotic systems. In 2017 Federated Conference on Computer Science and Information Systems (FedCSIS), 555–559 (IEEE, 2017).
Luo, Y., Zhou, R., Liu, J., Cao, Y. & Ding, X. A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dyn. 93, 1165–1181 (2018).
El-Latif, A. A. A., Abd-El-Atty, B. & Talha, M. Robust encryption of quantum medical images. IEEE Access. 6, 1073–1081 (2017).
Kiktenko, E. O. et al. Quantum-secured blockchain. Quantum Sci. Technol. 3, 035004 (2018).
EL-Latif, A. A. A., Abd-El-Atty, B., Venegas-Andraca, S. E. & Mazurczyk, W. Efficient quantum-based security protocols for information sharing and data protection in 5g networks. Future Gener. Computer Syst. 100, 893–906 (2019).
Li, D. et al. Discrete-time interacting quantum walks and quantum hash schemes. Quantum Inf. Process. 12, 1501–1513 (2013).
Venegas-Andraca, S. E. Quantum walks: a comprehensive review. Quantum Inf. Process. 11, 1015–1106 (2012).
Melnikov, A. A., Fedichkin, L. E. & Alodjants, A. Detecting quantum speedup by quantum walk with convolutional neural networks. arXiv preprint arXiv:1901.10632 (2019).
Zhang, G. Quantum-inspired evolutionary algorithms: a survey and empirical study. J. Heuristics 17, 303–351 (2011).
Arrazola, J. M., Delgado, A., Bardhan, B. R. & Lloyd, S. Quantum-inspired algorithms in practice. arXiv preprint arXiv:1905.10415 (2019).
Montiel, O., Rubio, Y., Olvera, C. & Rivera, A. Quantum-inspired acromyrmex evolutionary algorithm. Sci. Rep. 9, 1–10 (2019).
Yang, Y.-G., Pan, Q.-X., Sun, S.-J. & Xu, P. Novel image encryption based on quantum walks. Sci. Rep. 5, 7784 (2015).
Yang, Y.-G., Xu, P., Yang, R., Zhou, Y.-H. & Shi, W.-M. Quantum hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci. Rep. 6, 19788 (2016).
Abd-El-Atty, B., EL-Latif, A. A. A. & Venegas-Andraca, S. E. An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quantum Inf. Process. 18, 272 (2019).
EL-Latif, A. A. A., Abd-El-Atty, B., Abou-Nassar, E. M. & Venegas-Andraca, S. E. Controlled alternate quantum walks based privacy preserving healthcare images in internet of things. Optics & Laser Technology 105942 (2019).
EL-Latif, A. A. A., Abd-El-Atty, B. & Venegas-Andraca, S. E. Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Physica A: Statistical Mechanics and its Applications (2019).
EL-Latif, A. A. A., Abd-El-Atty, B. & Venegas-Andraca, S. E. A novel image steganography technique based on quantum substitution boxes. Opt. Laser Technol. 116, 92–102 (2019).
Schmitz, A. T. Quantum walks: Theory, application, and implementation (2016).
Zeng, M. & Yong, E. H. Discrete-time quantum walk with phase disorder: localization and entanglement entropy. Sci. Rep. 7, 12024 (2017).
Souza, A. & Andrade, R. Coin state properties in quantum walks. Sci. Rep. 3, 1976 (2013).
Wang, J. & Manouchehri, K. Physical implementation of quantum walks (Springer, 2013).
Du, J. et al. Experimental implementation of the quantum random-walk algorithm. Phys. Rev. A 67, 042316 (2003).
Douglas, B. & Wang, J. Efficient quantum circuit implementation of quantum walks. Phys. Rev. A 79, 052335 (2009).
Goyal, S. K., Roux, F. S., Forbes, A. & Konrad, T. Implementation of multidimensional quantum walks using linear optics and classical light. Phys. Rev. A 92, 040302 (2015).
Qiang, X. et al. Efficient quantum walk on a quantum processor. Nat. Commun. 7, 11511 (2016).
Qi, F., Wang, Y., Ma, Q. & Zheng, W. Experimentally simulating quantum walks with self-collimated light. Sci. Rep. 6, 28610 (2016).
Jeong, Y.-C., Di Franco, C., Lim, H.-T., Kim, M. & Kim, Y.-H. Experimental realization of a delayed-choice quantum walk. Nat. Commun. 4, 2471 (2013).
Lai, X. & Massey, J. L. A proposal for a new block encryption standard. In Workshop on the Theory and Application of of Cryptographic Techniques, 389–404 (Springer, 1990).
Zhang, W. & Pasalic, E. Highly nonlinear balanced s-boxes with good differential properties. IEEE Trans. Inf. Theory 60, 7970–7979 (2014).
Blondeau, C. & Nyberg, K. Perfect nonlinear functions and cryptography. Finite fields their Appl. 32, 120–147 (2015).
Bicubic interpolation resize procedure, https://www.mathworks.com/help/matlab/ref/imresize.html (Accessed: 12-13-2019).
Yang, Y.-G. & Zhao, Q.-Q. Novel pseudo-random number generator based on quantum random walks. Sci. Rep. 6, 20362 (2016).
Sipi image database-misc, http://sipi.usc.edu/database/database.php?volume=misc (Accessed: 7-22-2019).
Zhou, Y., Cao, W. & Chen, C. P. Image encryption using binary bitplane. Signal. Process. 100, 197–207 (2014).
Tsafack, N. et al. Design and implementation of a simple dynamical 4-d chaotic circuit with applications in image encryption. Inf. Sci. 515, 191–217 (2020).
Nestor, T. et al. A multidimensional hyperjerk oscillator: Dynamics analysis, analogue and embedded systems implementation, and its application as a cryptosystem. Sens. 20, 83 (2020).
Chiang, C.-F., Nagaj, D. & Wocjan, P. Efficient circuits for quantum walks. arXiv preprint arXiv:0903.3465 (2009).
Genske, M. et al. Electric quantum walks with individual atoms. Phys. Rev. Lett. 110, 190601 (2013).
Alvarez, G. & Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. chaos 16, 2129–2151 (2006).
Melnikov, A. A. & Fedichkin, L. E. Quantum walks of interacting fermions on a cycle graph. Sci. Rep. 6, 34226 (2016).
Li, D., Yang, Y.-G., Bi, J.-L., Yuan, J.-B. & Xu, J. Controlled alternate quantum walks based quantum hash function. Sci. Rep. 8, 225 (2018).
Yang, Y.-G., Bi, J.-L., Li, D., Zhou, Y.-H. & Shi, W.-M. Hash function based on quantum walks. Int. J. Theor. Phys. 58, 1861–1873 (2019).
Yang, Y.-G. et al. Simple hash function using discrete-time quantum walks. Quantum Inf. Process. 17, 189 (2018).
Cao, W.-F. et al. Constructing quantum hash functions based on quantum walks on johnson graphs. Quantum Inf. Process. 17, 156 (2018).
El-Latif, A. A. A. et al. Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Physica A: Statistical Mechanics and its Applications 123687 (2019).
Li, D., Zhang, J., Ma, X.-W., Zhang, W.-W. & Wen, Q.-Y. Analysis of the two-particle controlled interacting quantum walks. Quantum Inf. Process. 12, 2167–2176 (2013).
Zhou, Y., Bao, L. & Chen, C. P. A new 1d chaotic system for image encryption. Signal. Process. 97, 172–182 (2014).
Belazi, A. & El-Latif, A. A. A. A simple yet efficient s-box method based on chaotic sine map. Opt. 130, 1438–1444 (2017).
Khan, M. & Asghar, Z. A novel construction of substitution box for image encryption applications with gingerbreadman chaotic map and s 8 permutation. Neural Comput. Appl. 29, 993–999 (2018).
Wang, Y., Wong, K.-W., Li, C. & Li, Y. A novel method to design s-box based on chaotic map and genetic algorithm. Phys. Lett. A 376, 827–833 (2012).
Tang, G., Liao, X. & Chen, Y. A novel method for designing s-boxes based on chaotic maps. Chaos, Solitons Fractals 23, 413–419 (2005).
Özkaynak, F., Çelik, V. & Özer, A. B. A new s-box construction method based on the fractional-order chaotic chen system. Signal, Image Video Process. 11, 659–664 (2017).
Belazi, A., Khan, M., El-Latif, A. A. A. & Belghith, S. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn. 87, 337–361 (2017).
Hussain, I., Shah, T. & Gondal, M. A. A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyn. 70, 1791–1794 (2012).
Acknowledgements
This study is sponsored by the Prince Sattam Bin Abdulaziz University, Saudi Arabia via the Deanship for Scientific Research funding for the Advanced Computational Intelligence & Intelligent Systems Engineering (ACIISE) Research Group Project Number 2019/01/9862. Also, A.A. Abd El-Latif acknowledges the support of TYSP-Talented Young Scientist Program (China) and Menoufia University (Egypt).
Author information
Authors and Affiliations
Contributions
A.A. Abd El-Latif and B. Abd-El-Atty conceived and conducted the experiments, A.A. Abd El-Latif, M. Amin and A.M. Iliyasu analysed the results and wrote the manuscript. All authors reviewed and approved the manuscript.
Corresponding authors
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Abd El-Latif, A.A., Abd-El-Atty, B., Amin, M. et al. Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci Rep 10, 1930 (2020). https://doi.org/10.1038/s41598-020-58636-w
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-020-58636-w
This article is cited by
-
Improved Stability and Passivity Results for Discrete Time-Delayed Systems with Saturation Nonlinearities and External Disturbances
Circuits, Systems, and Signal Processing (2024)
-
Stability of Interfered Discrete-Time System with Concatenations of Quantization and Overflow
Circuits, Systems, and Signal Processing (2024)
-
CLSM-IEA: a novel cosine-logistic-sine map and its application in a new image encryption scheme
Signal, Image and Video Processing (2024)
-
Constructing a non-degeneracy 3D hyperchaotic map and application in image encryption
Multimedia Tools and Applications (2024)
-
Design of highly nonlinear confusion component based on entangled points of quantum spin states
Scientific Reports (2023)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.