Professional Documents
Culture Documents
Shreyash Hatkar1
1 Introduction
Data encryption is crucial in today’s digital world, as it plays a vital role in
safeguarding sensitive content across various fields and domains across the in-
ternet. In this context, encryption techniques have emerged as essential tools for
2 FractalCrypt: Secure Data Encryption using Chaos Game Algorithm
Fractals are self-similar patterns. The so-called chaos game (also called a random
iteration algorithm) is a method to generate iterative fractals with the help of
polygons.
The rules are simple and will be explained using the example of a triangle.
It has the corner points A, B and C. You start the chaos game at a random
point P1 within the triangle. To calculate the next position P2, you choose one
of the three corner points of the triangle at random and place P2 in the middle
of the route between point P1 and the randomly selected corner point. Repeat
this process.
This concept can be applied to various shapes and polygons and defining new
rules of traversals affecting complexity and efficiency of algorithm.
Fig. 1. Sierpinski triangle: 7 steps of the chaos game for the corner points ACABBCB.
Existing Encryption techniques are efficient but comes with their own shortcom-
ings like AES, RSA and ECC. Some of the common limitations include,
FractalCrypt: Secure Data Encryption using Chaos Game Algorithm 3
2 Literature Review
for larger data sizes. The computational complexity of FractalCrypt has shown
potential for efficient resource utilization, particularly in resource-constrained
environments.
Effective key management is crucial for any encryption algorithm, and Frac-
talCrypt is no exception. Research in this area has explored key generation,
distribution, and storage techniques. Robust key management practices are es-
sential to ensure the confidentiality and integrity of encryption keys and protect
against unauthorized access.
Addressing these limitations necessitates ongoing research and development
efforts. Novel cryptographic solutions, such as lattice-based cryptography or ho-
momorphic encryption, are emerging as potential alternatives to overcome the
shortcomings of existing encryption techniques. These advancements aim to pro-
vide stronger security guarantees, enhanced efficiency, and adaptability to evolv-
ing threats.
FractalCrypt holds potential for practical applications in scenarios where
efficient encryption of smaller data sizes and resource-constrained environments
are paramount.
3 Methodology
In the first part of the methodology, the FractalCrypt algorithm will be imple-
mented using the Chaos Game Algorithm in Python. The implementation will
involve several key steps to ensure the proper functioning of the algorithm:
Define the Alphabet: The first step is to define the alphabet that will be used
for encryption. This includes all the characters that can be encrypted (letters,
numbers, characters, etc.). The size of the alphabet will determine the number
of vertices of the polygon used in the Chaos Game Algorithm.
Define the Polygon Vertices: Based on the number of characters in the al-
phabet and the vertices of the polygon will be defined based on technique and
FractalCrypt: Secure Data Encryption using Chaos Game Algorithm 5
seed value stored. Each vertex represents a character from the alphabet. The
Chaos Game Algorithm requires the coordinates of these vertices to generate
the encrypted coordinates.
Implement the Chaos Game Function: The chaos-game() function will be
implemented to generate the pseudo-random iterations based on the seed value.
This function will use the random module in Python to generate random numbers
that will determine the next vertex for each iteration. The function will yield
the x and y coordinates for each iteration which gives each character code.
Develop the Encryption Function: The encrypt-text() function will encrypt
the input text using the FractalCrypt algorithm. This function will take the
input text and the seed value. It will iterate through each character in the input
text, generate the pseudo-random iterations using the chaos-game() function,
and calculate the encrypted coordinates for each character.
Ensure Secure Coding Practices: Throughout the implementation, secure
coding practices should be followed to ensure the integrity and security of the
FractalCrypt algorithm. This includes avoiding common vulnerabilities such as
buffer overflows, input validation issues, and secure handling of sensitive infor-
mation like encryption keys.
A range of input text sizes will be selected for performance evaluation. This
includes both small and large data sizes to assess the scalability of FractalCrypt.
The selected input texts should cover a variety of real-world scenarios. The
encryption speed of FractalCrypt will be measured by encrypting the selected
input texts using the implemented algorithm. The execution time for each en-
cryption operation will be recorded, and the encryption speed will be calculated
in terms of characters per second. This measurement will provide insights into
how efficiently FractalCrypt can encrypt data. The computational complexity of
FractalCrypt will be analyzed by considering the execution time and resource
utilization during the encryption process. This analysis will help assess the effi-
ciency and scalability of FractalCrypt for different input text sizes. It will also
provide insights into the algorithm’s feasibility for resource-constrained environ-
ments.
Table 1 contains the speed benchmarks for some of the most commonly used
cryptographic algorithms. All were coded in C++, compiled with Microsoft Vi-
sual C++ .NET 2003 (whole program optimization, optimize for speed, P4 code
generation), and ran on a Pentium 4 2.1 GHz processor under Windows XP SP
1. 386 assembly routines were used for multiple-precision addition and subtrac-
tion. SSE2 intrinsic were used for multiple-precision multiplication. It can be
noticed from the table that not all the modes have been tried for all the algo-
rithms. Nonetheless, these results are good to have an indication about what the
presented comparison results should look like.
To evaluate the performance of FractalCrypt in context, a comparison will be
made with widely used encryption algorithms like AES and RSA. The encryption
speed and computational complexity of FractalCrypt will be compared to those
of AES and RSA for the same input text sizes. This comparison will shed light
on FractalCrypt’s relative strengths and weaknesses in terms of performance.
The collected data on encryption speed and computational complexity will be
analyzed and interpreted. The results will provide insights into the performance
characteristics of FractalCrypt and its suitability for different use cases. Factors
such as data size, resource constraints, and real-time constraints will be taken
FractalCrypt: Secure Data Encryption using Chaos Game Algorithm 7
4 Conclusion
FractalCrypt: Secure Data Encryption using Chaos Game Algorithm presents a
novel approach to data encryption by leveraging the Chaos Game Algorithm and
fractal geometry. Throughout this research paper, we have explored the imple-
mentation, performance analysis, security analysis, key management, and poten-
tial applications of FractalCrypt. The implementation of FractalCrypt demon-
strated the successful integration of the Chaos Game Algorithm into a data en-
cryption algorithm. The algorithm effectively encrypted data using self-repeating
structures known as fractals, showcasing its unique encryption methodology. The
performance analysis revealed that FractalCrypt exhibits competitive encryption
speeds for smaller data sizes. However, encryption speed may decrease for larger
data sizes, requiring further optimization. The algorithm demonstrated promis-
ing computational complexity, making it suitable for resource-constrained en-
vironments. The security analysis highlighted FractalCrypt’s resistance against
common cryptographic attacks. The Chaos Game Algorithm’s pseudo-random it-
erations enhanced its robustness against brute-force attacks, differential attacks,
and chosen-plaintext attacks. While the algorithm showcased strong security
properties, further research is needed to identify potential vulnerabilities and
ensure its resilience against sophisticated attacks. The key management aspect
of FractalCrypt emphasized the importance of robust key generation, secure key
distribution, proper key storage, key rotation, and access control mechanisms.
Effective key management practices play a crucial role in maintaining the confi-
dentiality and integrity of encryption keys. FractalCrypt’s potential applications
were explored, showcasing its suitability for scenarios requiring efficient encryp-
tion of smaller data sizes and resource-constrained environments. Its competitive
encryption speeds and efficient resource utilization make it applicable to domains
such as Internet of Things (IoT) devices and edge computing.
References
1. Nadeem A. & Javed M. Y. (2005, August). A performance comparison of data
encryption algorithms. In 2005 international Conference on information and com-
munication technologies (pp. 84-89). IEEE.
FractalCrypt: Secure Data Encryption using Chaos Game Algorithm 11
2. Ahmad, M., Agarwal, S., Alkhayyat, A., Alhudhaif, A., Alenezi, F., Zahid, A. H., &
Aljehane, N. O. (2022). An image encryption algorithm based on new generalized
fusion fractal structure. Information Sciences, 592, 1-20.
3. Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Trans-
actions on Information Theory, 22(6), 644-654.
4. Barnsley, M. F. (1988). Fractals Everywhere. Academic Press.
5. Jeffrey, H. J. (1992). Chaos game visualization of sequences. Computers & Graph-
ics, 16(1), 25-33.
6. Talatahari, S., & Azizi, M. (2021). Chaos game optimization: a novel metaheuristic
algorithm. Artificial Intelligence Review, 54, 917-1004.
7. Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A comprehen-
sive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish.
Procedia Computer Science, 78, 617-624.
8. Fumy, W., & Landrock, P. (1993). Principles of key management. IEEE Journal on
selected areas in communications, 11(5), 785-793.
9. Anandkumar, R., & Kalpana, R. (2020). A review on chaos-based image encryption
using fractal function. Examining Fractal Image Processing and Analysis, 23-37.
10. Dakate, D. K., & Dubey, P. (2012). Performance comparison of symmetric data
encryption techniques. IDEA, 128, 58.
11. https://www.cse.wustl.edu/ jain/cse567-06/ftp/encryption-perf/
12. https://beltoforion.de/en/recreational-mathematics/chaos-game.php