Literature DB >> 32029798

Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications.

Ahmed A Abd El-Latif1,2,3, Bassem Abd-El-Atty4, Mohamed Amin4, Abdullah M Iliyasu5,6,7.   

Abstract

Designing efficient and secure cryptosystems has been a preoccupation for many scientists and engineers for a long time wherein they use chaotic systems to design new cryptosystems. While one dimensional (1-D) chaotic maps possess powerful properties compared to higher dimension ones, they are vulnerable to various attacks due to their small key space, chaotic discontinuous ranges, and degradation in chaotic dynamical behaviours. Moreover, when simulated on a computer, every such chaotic system produces a periodic cycle. Meanwhile, quantum random walks exhibit the potential for deployment in efficient cryptosystem design, which makes it an excellent solution for this problem. In this context, we present a new method for constructing substitution boxes (S-boxes) based on cascaded quantum-inspired quantum walks and chaos inducement. The performance of the proposed S-box scheme is investigated via established S-box evaluation criterion and outcomes suggest that the constructed S-box has significant qualities for viable applications information security. Further, we present an efficient scheme for pseudo-random numbers generation (PRNG) whose sustainability over long periods remedies the periodicity problem associated with traditional cryptographic applications. Furthermore, by combining the two mechanisms, an atypical image encryption scheme is introduced. Simulation results and analysis validate that the proposed image encryption algorithm will offer gains in many cryptographic applications.

Entities:  

Year:  2020        PMID: 32029798      PMCID: PMC7005306          DOI: 10.1038/s41598-020-58636-w

Source DB:  PubMed          Journal:  Sci Rep        ISSN: 2045-2322            Impact factor:   4.379


Introduction

Chaotic systems have attracted a great deal of attention across different scientific and engineering disciplines, especially in designing new cryptosystems and cryptanalysis. A chaotic system is an evolution map of a deterministic dynamical system that reconstructs the state of a system S0 to a new state S1 depending on the initial state of S0, a control parameter C, and time T[1]. Chaotic maps exhibit the desired properties of ergodicity, unpredictability, and sensitivity to their control parameter(s) and initial value(s) that satisfy the requirements for cryptosystem confusion-diffusion properties[2-4]. In fact, an inappropriate initial control parameter of a chaotic system can lead to non-chaotic behaviours, which implies the reduction in nonlinearity levels as well as circumvention of insecurity pitfalls[5,6]. Currently, chaotic dynamical systems play a vital role in designing modern cryptographic applications, such as constructing S-boxes, generating pseudo-random numbers, designing image encryption algorithms and so on[7-16], which are based on the unproven assumptions pertaining to computational complexity and that their constructions are based on mathematical models. However, with the development of quantum technologies, some of these traditional security mechanisms, and cryptographic applications may be effortlessly violated and abused[17-19]. Among the computational models developed in quantum computation, quantum walks (QWs), which is a universal model of quantum computation that has been traditionally employed to develop modern quantum algorithms[20,21]. While physical quantum computing hardware are as yet unavailable, quantum inspired frameworks provide platforms for simulating pseudo-quantum algorithms, which, within the limits of bounds imposed by the capability of digital computers, can to execute some of the quantum mechanical properties ascribed for the potency of quantum computation[22-24]. Moreover, based on the rationale that computation of the position probability distribution of a quantum walker requires computation of probabilities of frequencies (i.e. the number of detections at a given graph vertex divided by the total number of detections). This requires sufficient number of repetitions of the experiment in order to retrieve the probability distribution. Among others, this has motivated the use of quantum-inspired discrete-time quantum walks have been presented as viable resources useful in designing chaotic system for image encryption algorithms[25-29]. This procedure allows us to consider a quantum-inspired discrete quantum walk Q as a nonlinear mapping where H is a Hilbert space in which the walker exists and P is a set of probability distributions. At this juncture, we note that our notion of a quantum-inspired approach implies use of probability distribution of a quantum walk obtained from numerical simulations using digital resources. The nonlinear behaviour of quantum-inspired walks described above together with the deterministic nature of state growth via unitary operators as well as the high sensitivity of quantum walks to initial conditions support the treatment of quantum-inspired discrete quantum walks as discrete-time and discrete-value chaotic systems[25,26,30]. Inspired by the excellent dynamical properties of quantum walks, the limitations of traditional cryptosystems can be ameliorated via design and construction state-of-the-art techniques for effective information security applications. In addition to other benefits, a main contribution of this study is to explore the integration of quantum-inspired of quantum walks into traditional cryptographic applications. Hence, we present a bi-level cascaded quantum walks protocol as a quantum-inspired random number generator with chaos inducement. The performance of the proposed S-box scheme is investigated using established criterions, results of which suggest that the constructed S-box is viable for multifaceted applications in information security. Similarly, the analyses of the proposed PRNG suggest its efficiency in generating sequences that remedy the periodicity problem associated with traditional cryptographic applications. Finally, we deploy the dual cascade quantum walks and chaos systems for applications in image encryption. Throughout, simulation-based validation is used to assess the performance of the proposed scheme. Outcomes from our applications for S-boxes construction, pseudo-random number generation, and image encryption validate the choice of cascaded quantum walks and chaos inducement for various cryptographic applications. At this point we clarify that this study is focused on exploiting properties of quantum walks for use in a quantum-inspired setting for potential applications in traditional cryptography. Hence, the quantum mechanical implementation of quantum walks is deemed outside the purview of this present work. Nevertheless, we enrich our bibliography by including interesting studies on such implementation[19,20,31-40] from where interested readers can obtain further details.

Results

S-box construction

Designing powerful S-boxes is an important critereon for realisation of secure cryptosystems and it is a major component of nonlinear transformations, which are the fulcrum of confusion and diffusion analysis for assessing well-designed ciphers[41]. Therefore, designing S-boxes based on secure mechanisms plays an important part in modern cryptographic tasks[42,43]. Consequently, it is widely investigated. For example, in a recent effort EL-Latif el al.[30] explored construction of secure S-boxes based on one-dimensional two-walker QWs on a circle. Inspired by the potency of quantum technologies, in this section, we propose a mechanism to augment some shortcomings of standard S-box construction and integrate our upgraded design into a cascaded QW and chaos inducement system for designing efficient cryptographs. The following steps outline the construction of an M-length S-box. Step 1: Choose initial seed for x0 and a value for the control parameter λ, to iterate the logistic-sine map over N times needed to generate sequence . Step 2: Choose initial conditions and key parameters () for running QWs on a circle with v vertices to produce a probability matrix , where v is odd number, and t is the number of steps for running QWs. Hence, the coin operator constructed by the key parameters and , while the initial states of the two walkers are and , respectively. Step 3: Resize P to QW, where N is the number of iterated chaos map. Here, we recall that mathematically no error arises from scaling a matirix with fixed dimentions several times. Targeting such a property, in this step, we make use of the bicubic interpolation resizing[44], which has zero error during the scalling process etc. This attribute allows it to accommodate prolonged iterations in the chaos map generation. Step 4: Convert the sequences , and into integer values via Eqs. (1) and (2). Step 5: Perform the bitwise XOR operation on the sequences , and to produce the sequence with range from 0 to M-1. Step 6: Collate the first M dissimilar elements from the sequence to construct the desired S-box. The performance of the S-box construction technique is investigated using a workstation equipped with Intel® core™ i5-2450M CPU 2.5 GHz and 6 GB RAM with a preinstalled MATLAB software. The initial values for running QWs are set as , , , , , , while initial values used to iterate the logistic-sine map are set as , . The constructed 16 × 16 S-box costructed based on the aforesaid initial conditions and control parameters is presented in Table 1, while Table 2 provides comparison of the performance of the constructed S-box alongside those some published schemes alongside the proposed one in terms of standard parameters of strict avalanche (SAC), nonlinearity, bit independence (BIC), as well as differential (DP) and linear (LP) approximation probabilities.
Table 1

16 × 16 S-box constructed via proposed scheme.

2055193103621981992241491147548132102142125
20417325323180652455020811811712115638152138
193128243127105964154762511961699512019098
21117917518881219418421819520015324820936207
301571836714319413513364236333254864979
2272402491041632501157874681781716215912139
1811164191612358718122211310822610622137241
29177174262029992184158172171024221528
40518921420624165110261552461411123023752
691825912219723111623456351671310112627210
4211991601472161668920311253557112439130
85317219451851681501869022212115107141
14014477151131232238247136217233582114588225
1292282011462554632744827020974383134
1871023934471371092292522131619412317016063
8022057148916542510024473668176192223
Table 2

Evaluation of the performance of proposed S-box construction alongside other methods.

S-box schemeBIC-NLNonlinearityBIC-SACSACLPDP
Proposed103.931060.50230.49580.12500.0313
EL-Latif et al.[30]103.70106.250.50650.50370.10160.0391
Belazi et al. S-box[61]103.78105.500.49700.50000.12500.0468
Khan et al.[62]103.07103.250.48640.51510.15630.17187
Wang et al. S-box[63]103.36104.870.50170.49180.13280.0391
Tang et al. et al.[64]103.00105.000.50440.49710.13280.0391
Özkaynak et al.[65]103.14104.620.49420.49820.14060.0391
Belazi et al.[66]103.80105.250.49960.49560.15620.0391
Hussain et al.[67]104.29103.250.50210.50560.12890.04609
16 × 16 S-box constructed via proposed scheme. Evaluation of the performance of proposed S-box construction alongside other methods.

PRNG generator

Pseudo-random number generation (PRNG) plays a fundamental role in creating powerful cryptographic schemes and, as such, they attract a great deal of attention from many cryptographers and engineers. The key feature of PRNG is to provide long streams of numbers embedded with randomness features. PRNG has a vital impact on the robustness of cryptographic tasks and in mitigating attempts to violate, tamper with, or regenerate the secret information being protected. The common approach employed in designing PRNG generators is based on using chaos maps, which is a simple (in terms of definition), yet disorienting approach intended to circumvent infractions to sensitive information[9,11]. Previous efforts, such as[45], profit from the utility of quantum walks to overcome established limitations of traditional chaos maps. Furthermore, Yang et al.[45] proposed a novel PRNG mechanism based on quantum walks. Motivated by the effort in[45], in this section, we discuss our proposed mechanism for PRNG sequence generation whose outline is presented in Fig. 1 and execution is accomplished via the five steps enumerated in the sequel.
Figure 1

Outline of the proposed PRNG sequence generation mechanism.

Outline of the proposed PRNG sequence generation mechanism. Step 1: Select initial seed for and a value for the control parameter , to iterate the logistic-sine map over N times needed to generate sequence . Step 2: Select initial conditions and key parameters () for running QWs on a circle with v vertices to produce a probability matrix , where v is odd number, and t is the number of steps for running QWs. Hence, the coin operator constructed by the key parameters and , while the initial states of the two walkers are and , respectively. Step 3: Resize to , where N is the number of iterations for the chaos map as well as the length of desired PRNG sequence. Step 4: Convert the sequences , and into integer values as follows: Step 5: Perform bitwise XOR operation on the sequences , and to generate a PRNG sequence, S of length N. To investigate the randomness property of the generated PRNG sequence S, we applied NIST SP 800-22 specified tests. These tests comprise of fifteen (15) assessments that are performed on a generated sequence of 106 bits length. We used the same initial values and control parameters for constructing S-box to generate the PRNG sequence whose results are presented in Table 3. As seen therefrom, the sequence generated via the proposed mechanism excelled in all tests carried out; thus, confirming its utility across various cryptographic applications.
Table 3

Results for NIST SP 800-22 tests.

Test-NameP-ValueResult
Overlapping templates0.215108Passed
No overlapping templates0.079004Passed
DFT0.304052Passed
Frequency0.291883Passed
Block-frequency0.693686Passed
Universal0.612656Passed
Rank0.058737Passed
Long runs of ones0.137157Passed
Runs0.384907Passed
Serial 10.914512Passed
Serial 20.971079Passed
Random excursions variant x = 10.506620Passed
Random excursions x = 10.125622Passed
Linear complexity0.107102Passed
Cumulative sums (reverse)0.065686Passed
Cumulative sums (forward)0.520534Passed
Approximate entropy0.012095Passed
Results for NIST SP 800-22 tests.

Application of proposed cascade protocol in image encryption

The intuition to utilise chaos systems in image encryption is not new, including many employing one-dimensional or higher dimension chaotic systems to generate a sequence of random numbers for construction of a cipher image that have been broached in[12-16]. However, most of these approaches produce images that are vulnerable to various attacks due to their narrow key-space allowance and imprecise mathematical construction. Consequently, to ameliorate this, some interesting image encryption algorithms based on the dynamical properties of QWs were proposed in[25,26] and[27]. In this section, we exploit the potency of quantum computing technologies to ameliorate some established shortcomings inherent to existing chaos systems. Our proposed image encryption technique utilises the S-box construction and PRNG sequence generation methods presented in earlier sections of this study to substitute and permutate each pixel of a plain image and construct its encrypted version. These procedures and their perfomance analysis are further elucidated in the remainder of this section. The general framework for the proposed image encryption technique is illustrated in Fig. 2, while the encryption procedures are outlined in the following steps.
Figure 2

General framework for the proposed image encryption technique.

Select initial values for generating two S-boxes SH and SW of lengths h and w respectively, where the size of the original image is h × w. Select initial values for generating one PRNG sequence K of length h × w (or h × w × 3 for colour images) where the size of the original image is h × w. Perform bitwise XOR operation on original image and matrix K to obtain an Xored image. Permutate the Xored image using the constructed S-boxes as outlined in Algorithm 1. Image encryption algorithm. General framework for the proposed image encryption technique.

Performance analysis

To validate the proposed strategy, we simulated implementation of the image encryption algorithm using a dataset comprising of three greyscale (Bridge, Boat and Baboon) and three colour images (Sailboat, Tree and House) sourced from the Signal and Image Processing Institute dataset[46] and each of 256 × 256 dimensions. These test images are presented in Fig. 3(a–f). Initial values for running the QWs to construct S-boxes and generate PRNG sequences were set at , , , , , , while initial values used to iterate the logistic-sine map are set as , .
Figure 3

Test images (a–f), their encrypted (in (g–l)), and decrypted (in (m–r)) versions.

Test images (a–f), their encrypted (in (g–l)), and decrypted (in (m–r)) versions. The resulting encrypted versions of the test images are presented in Fig. 3(g–m) and based on the pairing of each original and encrypted image pair we undertook a retinue of statistical analysis whose results are presented and discussed in subsequent subsections.

Correlation of adjacent pixels

Correlation coefficient, C, is used to measure concordance between two adjacent pixels X and Y in an image. Theoretically, a pristine, i.e. unencrypted, image should have C values close to 1 in each direction (horizontal, vertical and diagonal) whereas a well encrypted image should have values close to 0[47-49]. To compute C for the encrypted and original images in each direction, we randomly selected 10,000 pairs of neighbouring pixels and used (3) to quantify their correlation.where and are values of adjacent pixels and M is the total number of adjacent pixel pairs in each direction. Tables 4 and 5 present the values of C for the encrypted and corresponding original images, where the encrypted images have C values close to 0. The distribution of neighbouring pixel pairs in each direction of Bridge image are graphed in Fig. 4, while those for the R, G, and B channels of the Sailboat colour image are presented in Figs. 5, 6 and 7, respectively. The results in Tables 4 and 5 as well as those in Figs. 4, 5, 6 and 7 suggest that for the three pairs reported there is no relation between the encrypted images and their original versions.
Table 4

Correlation coefficients for adjacent pixel pairing for greyscale images (in Fig. 3(a–c)).

ImageDirection
HorizontalVerticalDiagonal
Original (Bridge)0.91600.94160.8845
Encrypted (Bridge)0.00020.0026−0.0003
Original (Boat)0.94360.92460.8811
Encrypted (Boat)−0.0034−0.0043−0.0012
Original (Baboon)0.83040.87760.7963
Encrypted (Baboon)−0.00500.00010.0006
Table 5

Correlation coefficients for adjacent pixel pairing for colour images (in Fig. 3(d–f)).

ImageDirection
HorizontalVerticalDiagonal
RGBRGBRGB
Original (Sailboat)0.95520.95550.96440.95820.95670.96060.93110.92490.9373
Encrypted (Sailboat)−0.0003−0.0082−0.0003−0.0022−0.00200.00470.00130.00040.0010
Original (Tree)0.93920.94850.94380.95840.96960.96150.92210.93390.9308
Encrypted (Tree)−0.0029−0.0048−0.0023−0.0013−0.0012−0.0050−0.00070.0012−0.0061
Original (House)0.93570.96360.97640.96780.98120.98240.91070.94900.9641
Encrypted (House)0.0027−0.0081−0.0009−0.00230.00050.0030−0.00400.0007−0.0029
Figure 4

Correlation distribution for neighbouring pixel pairs along horizontal, vertical and diagonal directions for Bridge image in Fig. 3(a).

Figure 5

Correlation distribution for neighbouring pixel pairs along horizontal, vertical and diagonal directions for red channel of Sailboat image in Fig. 3(d).

Figure 6

Correlation distribution for neighbouring pixel pairs along horizontal, vertical and diagonal directions for green channel of Sailboat image in Fig. 3(d).

Figure 7

Correlation distribution for neighbouring pixel pairs along horizontal, vertical and diagonal directions for blue channel of Sailboat image in Fig. 3(d).

Correlation coefficients for adjacent pixel pairing for greyscale images (in Fig. 3(a–c)). Correlation coefficients for adjacent pixel pairing for colour images (in Fig. 3(d–f)). Correlation distribution for neighbouring pixel pairs along horizontal, vertical and diagonal directions for Bridge image in Fig. 3(a). Correlation distribution for neighbouring pixel pairs along horizontal, vertical and diagonal directions for red channel of Sailboat image in Fig. 3(d). Correlation distribution for neighbouring pixel pairs along horizontal, vertical and diagonal directions for green channel of Sailboat image in Fig. 3(d). Correlation distribution for neighbouring pixel pairs along horizontal, vertical and diagonal directions for blue channel of Sailboat image in Fig. 3(d).

Pixel change rate

Another tool used to evaluate the effect of changing pixel values in an original image on its corresponding encrypted one is number of pixel change rate (NPCR), which is computed using (4).where M denotes total number of pixels in the image. The fact that, as reported in Table 6, all the test images (in Fig. 3(a–f)) produced NPCR values of approximately 99.60% shows that the proposed encryption strategy is very sensitive to small changes in pixel values in the original image.
Table 6

NPCR test results.

ImageNPCR (%)
Bridge99.63837
Boat99.59717
Baboon99.61395
Sailboat99.61853
Tree99.61294
House99.60124
NPCR test results.

Histogram analysis

Histogram analysis is another widely used measure in image analysis that reflects the frequency distribution of pixel values in an image. A well-designed image encryption algorithm should have uniform histograms for different encrypted images, which is an indication of resistance against statistical attacks. Figures 8 and 9 present histograms for the original and encrypted versions of the greyscale images (in Fig. 3(a–c)) as well as the coloured colour Sailboat image in Fig. 3(d). Interpreting these plots, we deduce similarity in the distribution for the encrypted images. This is an affirmation that the encrypted images consist of flat-out noise. Meanwhile, the variability in the histograms of the original images indicate the presence of different levels of detail in those images. From the histogram analysis there is no relation between the encrypted image and its original one. Therefore, the proposed image encryption mechanism could resist histogram analysis attacks.
Figure 8

Histograms of original and encrypted greyscale images (in Fig. 3(a–c)).

Figure 9

Histograms of original and encrypted R, G, and B channels of the Sailboat image (in Fig. 3(d)).

Histograms of original and encrypted greyscale images (in Fig. 3(a–c)). Histograms of original and encrypted R, G, and B channels of the Sailboat image (in Fig. 3(d)).

Information entropy

Information entropy, E(X), is an important tool to evaluate the efficiency of an image encryption algorithm. As expressed in (5), E(X) is a statistical measure of the distribution of pixel values for each level in an image.where is the probability of obtaining . Greyscale images have 28 possible values based on which the ideal theoretical entropy value should be 8 bits[27]. Consequently, for an efficient encryption mechanism, the entropy value for the encrypted images should be close to 8. Table 7 presents the entropy values for the pristine and corresponding encrypted images used in our experiments (i.e. Fig. 3). As targeted, the information entropies for almost all the pairings is expected to be 8 bits (Table 7). This certifies the viability of the proposed algorithm to withstand entropy-based attacks.
Table 7

Information entropy of original and encrypted images.

ImageOriginalEncrypted
Bridge7.668477.99710
Boat7.158667.99734
Baboon7.227947.99729
Sailboat7.354087.99727
Tree7.181597.99700
House6.400677.99704
Information entropy of original and encrypted images.

Key space analysis

Theoretically, quantum-inspired quantum walks have an infinite key space[25,26,45], but due to the finite precision of digital computers, the key space is limited. Therefore, the key space size is evaluated relative to the 10−16 precision of digital computers, which is acceptable for quantum insipired numerical simulation of quantum walks on digital computers[50,51]. However, it is highly unrealistic for actual physical implementation of a quantum walk, which would be the goal of future quantum technologies. Nevertheless, such simulation would suffice for classical-based quantum inspired simulation of our proposed random number generator. A well-designed encryption algorithm should have adequate key space allowance to withstand brute-force and other attacks intended to violate its integrity. In our algorithm, a plain-image is substituted with a PRNG sequence (from the presented PRNG mechanism), while the proposed S-box mechanism is used to permutate each pixel of the substituted image, which combined coalesces as the encrypted image. Therefore, in addition to possessing key parameters for generating PRNG, the proposed algorithm is ingrained with key space needed for constructing the S-boxes (key parameters are used both for generating PRNG sequence and constructing S-box). Since both the PRNG sequence generation and S-box construction schemes are components of the proposed cascade quantum-inspired quantum walks on a circle and logistic-sine map technique, which both possess key parameters (), then the key space for generating PRNG or constructing S-boxes is 10128 and, therefore, the key space allowance for the image encryption algorithm presented earlier is 10256, which is adequate for any encryption algorithm. Table 8 provides a comparison of key spaces for the proposed mechanism in comparison with similar approaches. Outcomes therefrom demonstrate our proposed mechanism has a superior key space allowance.
Table 8

Description of key space of our presented mechanism alongside those from similar methods.

AlgorithmDescriptionKey space
ProposedCascaded quantum walks as a quantum-inspired random generator and chaotic dynamics induction with its cryptographic applicationsKey parameters (v, t, α1, α2, β1, β2, x0, λ) are utilised to run QWs and iterate logistic-sine map. The encryption algorithm is based on the presented PRNG mechanism and S-box mechanism. Therefore, the key space of whole system is 10256.
Yang et al.[45]PRNG mechanism based on running 1-Dimensional 1-Particle quantum walks on a circleKey parameters (v, t, α, β, θ) are utilized for running QWs. The key space for key parameters and initial states is 1098.
Yang et al.[25]Image encryption algorithm based on running 1-Dimensional 2-Particle quantum walks on a circleThe key parameters (v, t, α1, β1, α2, β1, θ) are utilized for running QWs. The key space for key parameters is 1098.
Yang et al.[26]Quantum hash function based on controlled 1-Dimensional 2-Particle quantum walks on a circle with its application to image encryptionKey parameters (m, v, α1, β1, α2, β1) are utilized for running QWs. The key space for key parameters and initial states is 1098.
Abd-El-Atty et al.[27]Quantum greyscale image encryption algorithm based on controlled 1-Dimensional 1-Particle quantum walks on a circleKey parameters (m, v, t, α, β, θ1, θ2, θ3) are used for running QWs. The key space of whole system is roundly 10211.
Description of key space of our presented mechanism alongside those from similar methods. As suggested by the guideline in[52] key space must be greater than for it to exhibit sufficient security against brute-force attacks. In our case, the proposed approach has a key space of 10256 which consists of all possible keys. Consequently, to mitigate against the exhaustive search-attacks, a good cipher should have a key space size of . This conforms with earlier guidelines in[25,26,45]. Based on the proposed approach, we can conclude that key size 10256 is adequate to forestall brute-force attacks in today’s and near future’s computers.

Key sensitivity analysis

To test the key sensitivity of the proposed image encryption algorithm, we demonstrate the decryption process for the encrypted Bridge and Sailboat images using several keys for constructing S-boxes and generating PRNG sequences. The results obtained therefrom are presented in Figs. 10 and 11, where Figs. 10(a) and 11(a) demonstrate near zero error during the scaling process for the probability matrix P.
Figure 10

Decrypted Bridge image (in Fig. 3(g)) for several S-box keys.

Figure 11

Decrypted Sailboat image for several PRNG keys.

Decrypted Bridge image (in Fig. 3(g)) for several S-box keys. Decrypted Sailboat image for several PRNG keys.

Discussion

Discrete-time quantum random walks are regarded as nonlinear mappings between quantum states and position probability distributions. They provide an imprint of chaotic behaviour, which are mathematical properties that can be exploited in constructing robust cryptographic applications. The study presented explores the potential for deploying quantum-inspired quantum random walks (QiQw) in the design of efficient cryptosystems. We have presented three quantum-inspired mechanisms that cascade quantum walks as a random number generators with logistic-sine map to ameliorate problems of periodicity in chaotic ranges, narrow key space and chaotic discontinuous ranges that are associated with traditional cryptosystems. First, we presented a mechanism for constructions of S-boxes with prospects for wide-ranging applications in security technologies. Second, we proposed a scheme to generate PRNG sequences that remedy the periodicity problem encountered in cryptographic applications. Third, we coalesced the two strategies into a cascaded quantum walks on a circle with logistic-sine map and implemented it as an image encryption algorithm. Based on simulations of our proposed schemes, we undertook extensive statistical analysis to validate the efficiency, reliability and utility of our proposed techniques alongside established methods employed in different cryptographic applications. With further improvements, the study presented provides useful insights to integrate state-of-the-art quantum-inspired quantum resources into building efficient, secure, and robust future cryptography technologies.

Methods

Rudimentary background required for basic understanding of the proposed cascade quantum-inspired quantum walks and chaos system are highlighted in this section. Furthermore, a succinct overview on the execution of discrete-time quantum walks on a circle as well as the utility of logistic-sine map as a chaos system are expounded.

Discrete-time quantum walks on a circle

Unlike in classical (i.e. digital or non-quantum) walks, the state of a quantum walk is a coherent superposition of several positions (quantum superposition of quantum walks)[53], but much like their classical (i.e. digital) equivalents, there are two categories of quantum walks: discrete-time quantum walks and continuous-time quantum walks[20]. In this study, we focus on discrete-time quantum walks (or simply QWs), which have shown viability in wide-ranging cryptographic applications[18,19,25,26,28,30,45,54-58]. QWs have two basic parts: the walker space H and the coin particle , which permeates a Hilbert space . The initial state of the system can be transformed into another state via application of the evolution operator for the whole quantum systemwhere refers to the shift operator that depends on the coin state of the particle, which can be defined on a circle with v vertices as presented in Eq. (7). The operator refers to a 2 × 2 coin operator, whose general case can be defined in (8). Hence, the final state after t steps can be expressed as The probability of finding the walker at position x after t steps can be stated aswhere is the initial state of the quantum system, and . Another attractive characteristic of multi-walker quantum random walks is that, in the case of interacting walkers, the dimension of the Hilbert space of an n-particle quantum walk (composed of distinguishable walkers) increases exponentially with the number of walkers, a property that supports increased entanglement. These properties are unattainable in classical random walks. Consequently, in our proposed model, the impetus for use of two instead of one quantum walker is its offer of increased keyspace allowance, which is crucial for designing efficient cryptosystems. Further details on interacting two quantum walks on a circle can be obtained from[19,59]. In our proposed model of quantum walks, two coins , and two walkers , will be used. The combined shift operator for the system is [19,25,26], where and are shift operators for and , respectively. Following the same rationale, we shall use two coin operators, one for each coin , . Therefore, the combined coin operator is a Unitary operator that can be written as an order 4 matrix[19,25,26]. In this study, we have chosen the coin matrices presented in Eq. 11. An example illustrating the probability distributions of running one-dimensional two-particle quantum walks on a circle with 11 vertices is presented in Fig. 12, where the initial position is and the initial coin operator constructed by and in formats stated in Eq. 11. It is obvious that, for a circle with only odd v nodes, the probability is nonzero in any position if the number of steps t is greater than or equal to the number of nodes v. In this study, we utilised the probability distribution generated from using quantum-inspired two-walker quantum walks in the cascading system whose construction is based on the coherent superposition of several positions of quantum walks rather than constructions from a mathematical model as obtains in chaotic maps. Like other quantum measurement operations, measurements to recover states of quantum walks, involve retrieval of probability distributions by repeating the measurement process many times, which is not completely accurate. Meanwhile, as clarified in our introductory commentary, our notion of quantum-inspired quantum walks entails the use of probability distributions that are obtained via numerical simulations using digital resources. Nevertheless, like any cryptographic mechanism, if the key parameters of the quantum-inspired quantum walk are disclosed, then anyone can access the probability distribution with appreciable precision. On the other hand, if the parameters are unknown, but a part of the probability distribution is disclosed, then it is very difficult to estimate the key parameters or the recover the probability distribution because our quantum-inspired quantum walk is a one-way mechanism[18,19,26]. Consequently, it is envisioned that the suggested cryptographic applications would offer additional layers of tamper-proof security within the precepts of quantum-inspired quantum walks.
Figure 12

Probability distribution for running two-walker quantum walks on a circle with 11 vertices for 51 steps, where the initial coin particles are and . Here, it is deducible that for a circle with only odd v nodes, the probability has nonzero in any position if the number of steps t is greater than the number of nodes v.

Probability distribution for running two-walker quantum walks on a circle with 11 vertices for 51 steps, where the initial coin particles are and . Here, it is deducible that for a circle with only odd v nodes, the probability has nonzero in any position if the number of steps t is greater than the number of nodes v.

Discrete-time chaotic systems

As argued in earlier sections of this study, one-dimensional chaotic maps are considered in this study because they offer enhanced periodicity in chaotic ranges, narrow key space and chaotic discontinuous ranges when it is used in cryptographic systems[60]. However, the same one-dimensional chaotic maps exhibit powerful benefits in terms of high-speed processing, easy design and simple structure. A widely used one-dimensional chaotic map is logistic-sine map[16], which is expressed mathematically aswhere is the control parameter, and x0 is the initial condition. Depending on the set of times T, chaotic dynamical systems can be divided into two classes, i.e. either continuous-time dynamical system (i.e. when T = R) or discrete-time dynamical system (if T = Z). Our study focuses on applying chaotic dynamical systems defined in discrete time, since they possess low computational complexity and do not need synchronization as in continuous-time dynamical system[1-3].
  14 in total

1.  Electric quantum walks with individual atoms.

Authors:  Maximilian Genske; Wolfgang Alt; Andreas Steffen; Albert H Werner; Reinhard F Werner; Dieter Meschede; Andrea Alberti
Journal:  Phys Rev Lett       Date:  2013-05-07       Impact factor: 9.161

2.  Experimental realization of a delayed-choice quantum walk.

Authors:  Youn-Chang Jeong; Carlo Di Franco; Hyang-Tag Lim; M S Kim; Yoon-Ho Kim
Journal:  Nat Commun       Date:  2013       Impact factor: 14.919

3.  Cascade Chaotic System With Applications.

Authors:  Yicong Zhou; Zhongyun Hua; Chi-Man Pun; C L Philip Chen
Journal:  IEEE Trans Cybern       Date:  2014-10-30       Impact factor: 11.448

4.  Novel image encryption based on quantum walks.

Authors:  Yu-Guang Yang; Qing-Xiang Pan; Si-Jia Sun; Peng Xu
Journal:  Sci Rep       Date:  2015-01-14       Impact factor: 4.379

5.  Novel pseudo-random number generator based on quantum random walks.

Authors:  Yu-Guang Yang; Qian-Qian Zhao
Journal:  Sci Rep       Date:  2016-02-04       Impact factor: 4.379

6.  Controlled Alternate Quantum Walks based Quantum Hash Function.

Authors:  Dan Li; Yu-Guang Yang; Jing-Lin Bi; Jia-Bin Yuan; Juan Xu
Journal:  Sci Rep       Date:  2018-01-09       Impact factor: 4.379

7.  A Multidimensional Hyperjerk Oscillator: Dynamics Analysis, Analogue and Embedded Systems Implementation, and Its Application as a Cryptosystem.

Authors:  Tsafack Nestor; Nkapkop Jean De Dieu; Kengne Jacques; Effa Joseph Yves; Abdullah M Iliyasu; Ahmed A Abd El-Latif
Journal:  Sensors (Basel)       Date:  2019-12-21       Impact factor: 3.576

8.  Efficient quantum walk on a quantum processor.

Authors:  Xiaogang Qiang; Thomas Loke; Ashley Montanaro; Kanin Aungskunsiri; Xiaoqi Zhou; Jeremy L O'Brien; Jingbo B Wang; Jonathan C F Matthews
Journal:  Nat Commun       Date:  2016-05-05       Impact factor: 14.919

9.  Quantum walks of interacting fermions on a cycle graph.

Authors:  Alexey A Melnikov; Leonid E Fedichkin
Journal:  Sci Rep       Date:  2016-09-29       Impact factor: 4.379

10.  Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption.

Authors:  Yu-Guang Yang; Peng Xu; Rui Yang; Yi-Hua Zhou; Wei-Min Shi
Journal:  Sci Rep       Date:  2016-01-29       Impact factor: 4.379

View more
  9 in total

1.  Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption's Substitution Box.

Authors:  Muhammad Fahad Khan; Khalid Saleem; Mohammad Mazyad Hazzazi; Mohammed Alotaibi; Piyush Kumar Shukla; Muhammad Aqeel; Seda Arslan Tuncer
Journal:  Comput Intell Neurosci       Date:  2022-06-21

2.  Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain.

Authors:  Muhammad Fahad Khan; Khalid Saleem; Tariq Shah; Mohammad Mazyad Hazzazi; Ismail Bahkali; Piyush Kumar Shukla
Journal:  Comput Intell Neurosci       Date:  2022-05-20

3.  A Novel Hybrid Secure Image Encryption Based on the Shuffle Algorithm and the Hidden Attractor Chaos System.

Authors:  Xin Jin; Xintao Duan; Hang Jin; Yuanyuan Ma
Journal:  Entropy (Basel)       Date:  2020-06-09       Impact factor: 2.524

4.  Image compression-encryption method based on two-dimensional sparse recovery and chaotic system.

Authors:  Aboozar Ghaffari
Journal:  Sci Rep       Date:  2021-01-11       Impact factor: 4.379

5.  Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold.

Authors:  Li Li; Ahmed A Abd El-Latif; Sajad Jafari; Karthikeyan Rajagopal; Fahimeh Nazarimehr; Bassem Abd-El-Atty
Journal:  Sensors (Basel)       Date:  2022-01-03       Impact factor: 3.576

6.  An efficient multi-biometric cancellable biometric scheme based on deep fusion and deep dream.

Authors:  Basma Abd El-Rahiem; Mohamed Amin; Ahmed Sedik; Fathi E Abd El Samie; Abdullah M Iliyasu
Journal:  J Ambient Intell Humaniz Comput       Date:  2021-11-01

7.  Color image encryption scheme based on alternate quantum walk and controlled Rubik's Cube.

Authors:  Jianwei Jiang; Tong Fang; Jingbo Zhao; Tian Zhang; Hongyang Ma
Journal:  Sci Rep       Date:  2022-08-22       Impact factor: 4.996

8.  A generalized framework for elliptic curves based PRNG and its utilization in image encryption.

Authors:  Sherif H AbdElHaleem; Salwa K Abd-El-Hafiz; Ahmed G Radwan
Journal:  Sci Rep       Date:  2022-08-02       Impact factor: 4.996

9.  A Robust Quasi-Quantum Walks-Based Steganography Protocol for Secure Transmission of Images on Cloud-Based E-healthcare Platforms.

Authors:  Bassem Abd-El-Atty; Abdullah M Iliyasu; Haya Alaskar; Ahmed A Abd El-Latif
Journal:  Sensors (Basel)       Date:  2020-05-31       Impact factor: 3.576

  9 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.