Implementing the Chaotic Permutation Multicircular Cryptography Technique using Asymmetric Key
In digital computing, cryptographic methods considers performance in both speed and security. This study aims to explore and improve a permutation-based symmetric chaotic cryptography technique called Chaotic Permutation Multicircular (CPMC). In this study, a method is proposed to implement asymmetric key system from CPMC technique by generating a reverser key for reverting the permutation result of CPMC encryption back to its original arrangement using the same function as encryption. The reverser key alongside the CPMC key act as encryption and decryption key pair. The pair key generation and cryptographic function utilizes the encryption function of CPMC technique dubbed CPMC Shrinking algorithm. Asymmetric implementation can simplify CPMC technique by also using CPMC Shrinking algorithm for decryption, therefore enabling it as a single function for encryption and decryption. The asymmetric single function cryptography test show improvement in speed from faster cryptographic speed in decryption compared to initial implementation by average of 75.87%
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike International License (CC-BY-SA 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Copyright without Restrictions
The journal allows the author(s) to hold the copyright without restrictions and will retain publishing rights without restrictions.
The submitted papers are assumed to contain no proprietary material unprotected by patent or patent application; responsibility for technical content and for protection of proprietary material rests solely with the author(s) and their organizations and is not the responsibility of the ULTIMATICS or its Editorial Staff. The main (first/corresponding) author is responsible for ensuring that the article has been seen and approved by all the other authors. It is the responsibility of the author to obtain all necessary copyright release permissions for the use of any copyrighted materials in the manuscript prior to the submission.