
@Article{iasc.2024.059691,
AUTHOR = {Haider H. Al-Mahmood, Saad N. Alsaad},
TITLE = {Innovative Lightweight Encryption Schemes Leveraging Chaotic Systems for Secure Data Transmission},
JOURNAL = {Intelligent Automation \& Soft Computing},
VOLUME = {40},
YEAR = {2025},
NUMBER = {1},
PAGES = {53--74},
URL = {http://www.techscience.com/iasc/v40n1/59278},
ISSN = {2326-005X},
ABSTRACT = {In secure communications, lightweight encryption has become crucial, particularly for resource-constrained applications such as embedded devices, wireless sensor networks, and the Internet of Things (IoT). As these systems proliferate, cryptographic approaches that provide robust security while minimizing computing overhead, energy consumption, and memory usage are becoming increasingly essential. This study examines lightweight encryption techniques utilizing chaotic maps to ensure secure data transmission. Two algorithms are proposed, both employing the Logistic map; the first approach utilizes two logistic chaotic maps, while the second algorithm employs a single logistic chaotic map. Algorithm 1, including a two-stage mechanism that uses chaotic maps for both transposition and key generation, is distinguished by its robustness, guaranteeing a secure encryption method. The second technique utilized a single logistic chaotic map eliminating the second chaotic map decreases computing complexity while maintaining security. The efficacy of both algorithms was evaluated by subjecting them to NIST randomness tests following testing on text files of varying sizes. The findings demonstrate that the double chaotic map method regularly achieves elevated unpredictability and resilience. Conversely, the singular chaotic algorithm markedly lowers the duration necessary for encryption and decryption. These data suggest that while both algorithms are effective, their choice may be contingent upon specific security and processing speed requirements in practical applications.},
DOI = {10.32604/iasc.2024.059691}
}



