HASIL ANALISIS STATISTIK, DIFERENSIAL, DAN KUALITAS CITRA TERHADAP KOMPOSISI LOGISTIC CIRCLE MAP
DOI:
https://doi.org/10.56127/juit.v2i1.456Keywords:
bifurcation, lyapunov, exponentAbstract
The problem of data security is still a matter of concern in the digital era like today. An effective security method is needed and it is difficult to break into. Encryption is an effective method of ensuring data security. The encryption algorithm is built using a chaotic cipher base so that performance in securing data and information increases. The new chaotic composition resulting from two chaotic maps will have better randomness. Logistic Map and Circle Map were chosen because they have good randomness. The new chaotic composition is called the Logistic Circle Map (LC Map). By bifurcation diagram test, Lyapunov Exponent, and NIST random test, the best density occurs at X_0=0.9 , K = 1000, r = 3.7 and Ω = 0.4. The new chaotic composition parameters have passed all 16 NIST (National Institute of Standards and Technology) tests. There are four parameters used in this study in order to obtain a sufficiently high key space, namely 1.296 ×〖 10〗^84 combinations and having a high level of lock sensitivity of 10−17. The image encryption algorithm of the LC Map function has high resistance against various attacks. This can be proven by carrying out key space tests, sensitivity tests for key spaces, histogram tests, entropy, correlation coefficients, and differential tests using the UACI NPCR. The test results on digital image decryption using the Mean Square Error (MSE) show a result of 0 and the Peak Signal to Noise Ratio (PSNR) shows a result of ∞. That is, the encrypted image is similar to the original image.
References
Menezes, A. J. (2018), Van Oorschot, P. C. & Vanstone, S. A., Handbook of applied cryptography, CRC press,
P. Stallings, W. (2014) , Cryptography and network security, 4/E, Pearson Education India
Boyland, P. L. (1986) ‘Bifurcations of circle maps: Arnol’d tongues, bistability and rotation intervals’, Communications in Mathematical Physics 106(3), 353–381,
Munir, R (2006), ‘Kriptografi. bandung’, Informatika 1(7).,
Varberg D, Purcel E and Rigdon KS (1998), Calculus (9th Edition) PDF
Wolf A, et al., (1985), Determining Lyapunov exponents from a time series,
Kocarev L and Lian S, (2011) , Chaos-Based Cryptography: Theory, Algorithm and Applications, Berlin: Springer-Verlag.
Andrew Rukhin, Juan Soto, et.all, (2010), A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22 Revision 1a,
Fu, C., Chen, J.-j., Zou, H., Meng, W.-h., Zhan, Y.-f. & Yu, Y.-w. (2012), ‘A Chaos-based digital image encryption scheme with an improved diffusion strategy’, Optics express 20(3), 2363–2378,
Munir, R. (2012), ‘Analisis keamanan algoritma enkripsi citra digital menggunakan kombinasi dua chaos map dan penerapan teknik selektif’, Jurnal Ilmiah Teknologi Informasi 10(2), 89–95.