Content area
This research delves into the concerns raised by numerous researchers regarding the security of Baptista’s chaotic cryptosystem. The paper scrutinizes two fundamental issues in the Baptista algorithm: the imperfect distribution of chaotic data and the constraints of a single attractor. To address these issues, we propose a novel approach that leverages Parrondo’s paradox to switch between two chaotic attractors and integrates a more robust logistic map into the Baptista algorithm by introducing additional parameters to the secret key. The two innovative methods, Superior Baptista and alternated Superior Baptista cryptosystems, are proposed to yield improved chaotic data or two new chaotic attractors. Therefore, the security features of the cryptosystem are enhanced by increasing the number of system iterations used for encryption. Experimental evaluations show that the Superior Baptista Algorithm required iteration counts up to 2,823, while the Alternated variant reached 86,556 iterations for specific characters, significantly improving randomness and diffusion. Furthermore, the entropy values of these algorithms are calculated 67.35% and 42.86% higher than those of the Baptista algorithm, respectively. These findings demonstrate the superiority of the proposed cryptosystems over the base algorithm.
Introduction
Data security is becoming a significant concern to industries such as healthcare, finance, and military. Conventional cryptographic methods are not efficient in mitigating data security concerns due to the dynamic nature of threats1. Chaotic systems gained popularity for securing confidential data following the expansion of internet usage for data transmission and storage. Their inherent dynamical traits, sensitivity to initial conditions, exponential divergence, ergodicity, and mixing, make them well-suited for cryptographic purposes. Typically, a chaotic generator relies on uncomplicated nonlinear recursive equations. While such equations may appear tame, they defy convergence to any fixed point or invariant set, thus ensuring unpredictability even after countless iterations2.
Chaotic cryptography has since evolved into an active area of research. Scholars have adopted chaotic signals over the past forty years to protect analog and digital transmissions. The hallmark of such schemes is their dependency on initial states and system parameters, which produce sequences that mimic truly random noise. An observer can regenerate the sequence precisely if the secret parameters are identical. Among the many constructions, Baptista-type algorithms predominantly rely on the logistic map to obfuscate textual3, 4–5. However, Baptista’s cryptosystems struggle due to several vulnerabilities (for example, non-uniform ciphertext distribution and limited key space), which limit their practical utility and motivate improvements in chaotic encryption frameworks to meet modern security demands.
Motivation and contributions
The logistic maps are efficiently used to encrypt Baptista’s chaos-based chaotic cryptosystems. They suffer from notable limitations, such as non-uniform ciphertext distribution, limited key space, and susceptibility to known attack models4,6. These limitations prompted researchers to explore enhancements such as dynamic lookup tables and multi-dimensional chaotic systems7, 8–9. Yet, most of these models continued to rely on a single chaotic attractor, leaving them vulnerable to key recovery and entropy-based attacks due to predictable orbit patterns or non-uniform distribution10. Furthermore, improvements often neglect the trade-off between encryption strength and computational feasibility. These gaps highlight the need for a system that balances enhanced security, improved randomness, and practical implementation.
To address these gaps, the proposed work builds upon Baptista’s foundational model. Still, it introduces two major innovations: (i) the integration of Superior logistic maps (via a Superior orbit mechanism), and (ii) the deterministic alternation of chaotic parameters inspired by Parrondo’s paradox. Superior orbits, defined by a tunable parameter β, yield a more uniformly distributed chaotic sequence and expand the secret key space, thereby directly mitigating the non-uniformity problem highlighted in literature4,6. The alternate Superior logistic map further enhances security by employing two logistic maps (r₁ and r₂) in an alternating sequence, adding unpredictability and increasing resistance to ciphertext-only and chosen-plaintext attacks11.
These mechanisms not only improve encryption complexity and robustness but also demonstrably increase iteration depth, effectively enhancing diffusion properties. Additionally, our approach retains computational feasibility while enhancing security performance against classical attack models, a feature that has been underexplored in earlier enhancements3,12,13. Summarizing, the key contributions of the present work can be highlighted as:
Proposes the use of Superior logistic maps with a tunable parameter β to improve the uniformity of the chaotic sequence and expand the key space, thus enhancing resistance against entropy- and distribution-based attacks.
Employs an alternating sequence of logistic maps (r1, r2) to increase randomness and unpredictability, inspired by Parrondo’s paradox. This method disrupts pattern formation and enhances security against ciphertext-only and chosen-plaintext attacks.
Strengthens the diffusion process by increasing the unpredictability and spread of ciphertext changes through deeper and more diverse orbit traversal through Superior orbits.
Provides a better balance between encryption strength and computational feasibility, making it suitable for deployment in real-time applications.
Conducts an extensive performance evaluation and comparison of the proposed scheme against the existing models in terms of security metrics, randomness, and computational complexity.
Organization
The remainder of this paper is organized as follows: In section “Related work”, we survey the literature on chaos-based cryptography, summarizing earlier techniques and their identified vulnerabilities. Section “Preliminaries” reviews the foundational material, presenting the logistic mapping, properties of chaotic dynamical systems, and the innovative Superior Orbit mechanism. Section “Proposed Baptista algorithm in superior orbit” formulates the Baptista Algorithm, endowed with a Superior Orbit, and explicates the underlying equations, key management, and the workflow from plaintext to ciphertext. Empirical findings, including entropy metrics, the adequate key space, and assessments of cryptanalytic resistance are reported in section “Results and discussions”. In section “The vulnerability analysis”, vulnerability analysis of Baptista and the proposed enhancements are discussed. Section “Limitations” presents the limitations of the proposed work. Finally, section “Conclusion” concludes the work with possible outlines for future investigation.
Related work
Motivated by the limitations described in section “Introduction”, we review previous work that attempted to enhance Baptista’s cryptosystem in this section. Baptista’s Chaotic System, utilizing Superior logistic maps, represents an exciting step forward in the field of cryptography, particularly in enhancing communication security. The chaotic nature of logistic maps is an ideal toolkit for generating pseudo-random sequences necessary for encryption. Recently, the benefits of using chaotic systems with cryptographic impact have been highlighted14,15. These features are significant for secure encryption due to their unpredictability and oversensitivity to changes in initial conditions. The application of chaotic maps, especially Superior logistic maps, has already significantly impacted the construction of cryptographic systems by enhancing the security and complexity of encryption algorithms. For example, it has been demonstrated that chaotic maps can improve the diffusion and confusion of the encryption schema, making it more robust against different types of cryptanalytic attacks16. More advanced chaotic systems enable the creation of sophisticated key streams that are more difficult to penetrate, thereby protecting both the data and its transmission. In addition, some selected empirical research has confirmed the use of Superior logistic maps in Baptista’s system. These studies demonstrate that the random behavior of logistic maps enhances the randomness of the generated keys, which is used to counter possible attacks, such as chosen plaintext or ciphertext attacks. These maps are also applied in telemedicine-related fields, such as medical image encryption and other sensitive communications. Moreover, the construction of hybrid encryption schemes that incorporate chaotic maps with other encryption techniques is quite promising and is currently under active research. For example, in16, chaotic maps were incorporated into DNA encoding to enhance security in digital healthcare applications. In17, the use of chaotic systems for novel and efficient encryption techniques was further explored, highlighting their efficacy in addressing new and complex threats to modern communication systems over time.
Baptista’s Chaotic Cryptosystem, employing Enhanced Logistic Maps, is a notable contribution to the field of cryptography, particularly in the areas of image encryption and data protection. The logistic map’s chaotic behavior is a robust method for generating pseudo-random sequences, which is critical for sophisticated cryptographic systems. Many researchers have recently focused on using chaotic maps in cryptography for their output’s discernible intricacies and unpredictability, making system undermining nearly impossible. For example,18 demonstrated that combining a perturbed one-dimensional logistic map with a logistic map significantly enhances the randomness and security of standard precision device algorithms, thereby mitigating some of the security weaknesses inherent in low-precision devices. In addition, such chaos-based encryption improved data transmission efficiency alongside the system’s security. The modifications to the Chacha20 algorithm using logistic maps have been demonstrated in19, which reveals that these chaotic systems can accelerate and enhance encryption security without compromising the balance between precision and execution time.
Furthermore, the effectiveness of chaotic maps for cryptosystems was evaluated by developing a fast color image encryption algorithm that relies on S-boxes and hyperchaotic maps20. It is worth mentioning that the chaos traits in logistic maps often aid in the diffusion processes, which form an intricate part of the confusion processes and are essential in cryptographic algorithms. Many researchers have pointed out that medical image encryption has benefited from chaos due to the strength it lends to encryption techniques through the use of chaos maps. These have immense relevance to fields such as medicine and finance, where data protection is a focal point. The Superior logistic maps at Baptista’s Chaotic Cryptosystem are used to build a high-level security system for encryption. The integration of chaotic systems into traditional systems enhances security, which addresses the complexity issues associated with non-standard encryption techniques. In chaotic cryptography, the plaintext is converted into a ciphertext-like code21. The primary property of chaos, which makes it useful in cryptography, is its sensitive dependence on initial conditions. The first application of a chaotically synchronized circuit was proposed by22. They linked two identical chaotic systems using standard signals and employed this concept to construct a chaotic synchronizing circuit. This idea further helped Baptista in the encryption of messages. Baptista-type algorithms are one of the chaos-based cryptographic algorithms among many proposed chaotic cryptosystems6,23. A comparative analysis of key schemes and improvements based on Baptista’s original approach is summarized in Table 1.
Table 1. Comparative analysis of baptista’s chaos-based cryptosystem.
References | Model | Pros | Cons | Finding |
|---|---|---|---|---|
2 | Superior iteration with extended logistic range | Stabilizes chaotic behavior | More computation per iteration | Improves logistic map behavior through two-step feedback |
3 | Modified Baptista using a square invertible matrix key | Better security against a one-time pad attack | Matrix inversion may increase cost | Protects against OTP and improves security robustness |
4 | Improved pseudo- random generation | Reduced vulnerability; enhanced randomness | No solution for the speed issue | Strengthens randomness using larger pseudo- random numbers |
5 | Security analysis of Baptista’s model | Identified weaknesses: critical evaluation | No new method proposed | Revealed vulnerability from X0 and high computational cost |
6 | Coupled 1D chaotic maps with the Baptista model | Increases unpredictability | Needs synchronization for coupled maps | Enhances encryption strength through coupling |
7 | Hybrid map system: logistic + tent + cubic + exponential + sine | High complexity, enhanced confusion, and diffusion | Computational overhead increases | Enriches encryption complexity by combining multiple chaotic maps |
9 | Dynamic lookup table in the Baptista algorithm | Faster execution; mitigates the lookup time problem | Slight increase in complexity | Addressed speed limitation by replacing static lookup with a dynamic one |
12 | Modulo-2 sum of the Baptista output and the logistic map | Fixes the non- uniform ciphertext issue | Implementation overhead | Addresses statistical imbalance in output |
13 | The gray ordering number used for chaos orbit analysis | Improves attack impact understanding | Limited to analysis only | Aids in understanding periodicity and attack influence |
23 | Chaos-based cryptography using the logistic map and static lookup table | Simple model; uses sensitivity and ergodicity of chaos | Vulnerable due to fixed initial condition (X0); slow computation due to static lookup | More secure than non-chaotic models, but has significant limitations |
24 | Attack analysis on the original Baptista model | Comprehensive vulnerability testing (entropy, OTP) | No countermeasures offered | Confirms high susceptibility to various attacks |
Proposed Work | Modified Baptista with Parrondo’s paradox & Superior logistic map | Increased key space, uniform chaos, improved security | More parameters to manage | Overcomes non- uniformity and single-attractor limitation; resists various attacks |
Preliminaries
Baptista algorithm
The original Baptista algorithm utilizes one-dimensional chaotic logistic map f(x) = r x (1 - x), where x ∈ [0, 1], for encryption23. For some initial value of X0, the map can be iterated as (1):
1
Figure 1 shows the scheme of representing an attractor with division into S sites. Here, the size of each site is ε = (Xmax - Xmin)/S, where Xmin and Xmax encompass some portions of the attractor under consideration. Baptista chose S = 256 sites18. So, S (a finite set of 256 elements) is represented as S = {S1, S2, S3, ., Si, ., S255, S256}, where each Si denotes the ASCII value of the corresponding character. The interval for each Si = (Xmin + Si−1ε, Xmin + Siε). Also, Xmin = 0.2 and Xmax = 0.8.
Fig. 1 [Images not available. See PDF.]
Scheme of representing an attractor with division into S sites, each site is of size ε = (Xmax - Xmin)/ S, where Xmin and Xmax cover some portion (or the whole) of the attractor.
Let us consider that the plain text is T = {T1, T2, ., Ti, .}, where each Ti represents the ASCII value of a character, and the corresponding Ciphertext is C = {C1, C2, ., Ci, .}, where each Ci is a positive integer. Based on the above notations, the following is the original chaotic cryptographic scheme (Algorithm 1) due to Baptista23.
Parrondo’s paradox
Parrondo’s paradox is a counterintuitive concept originating from game theory, where two losing strategies, when combined in a specific alternating sequence, can result in an overall winning outcome. This phenomenon was first described by physicist Juan M.R. Parrondo in 1996 and is conceptually linked to the flashing Brownian ratchet in statistical mechanics25.
Consider two games:
Game A: A biased coin toss that leads to an expected loss (e.g., win with probability 0.49, lose otherwise).
Game B: A more complex game, often involving multiple biased coins, also results in a losing expectation when played individually.
Surprisingly, the expected outcome can be positive when Games A and B are played in a particular alternating sequence (e.g., A-B-B-A-B…). Further, even though and hold true, is also possible.
In the context of chaotic systems and cryptography, Parrondo’s paradox can be exploited by alternating between two ordered (non-chaotic) systems (e.g., two logistic maps with non-chaotic parameters) to produce chaotic dynamics, a behavior known as anti-control of chaos.
This mechanism enhances unpredictability in cryptographic schemes, as demonstrated in our Alternated Superior Baptista Algorithm, where we integrate two Superior logistic maps in an alternating manner. By leveraging Parrondo’s paradox in this way, the proposed method strengthens security through increased key complexity and improved randomness properties.
Problems in Baptista’s algorithm
The Baptista algorithm, although foundational in chaos-based cryptography, exhibits several limitations that affect its practicality and security. One major drawback is the disproportionate length of the ciphertext compared to the plaintext, resulting in inefficient data transmission and storage. Additionally, the key space is relatively small, which makes the algorithm vulnerable to brute-force attacks. Security analyses have demonstrated that the Baptista algorithm is susceptible to various types of cryptanalytic attacks, including key recovery, entropy-based attacks, and weaknesses in the one-time pad. These vulnerabilities primarily arise from the deterministic nature of the underlying chaotic system. Another concern is performance. The encryption process requires a fixed number of iterations for convergence, making it significantly slower than conventional cryptosystems. This limitation is particularly critical when encrypting large multimedia files, where speed is essential. The reliance on a single chaotic attractor further reduces security, as it lacks the complexity and unpredictability that multiple attractors offer. Moreover, the non-uniform density function of the logistic map introduces statistical bias in the ciphertext, making it easier to analyze and break. Finally, the ciphertext distribution is often poor due to low iteration counts, resulting in patterns that reduce entropy and compromise confidentiality.
The following is a summary of various issues identified by4,6,9,24.
The ciphertext is significantly longer than the plaintext and has a smaller key space.
It is insecure against key recovery, entropy, and one-time pad attacks.
The encryption process is slower than traditional ciphers due to the fixed number of iterations. Therefore, it is not ideal for securing large multimedia files.
A single chaotic attractor is less secure than multiple chaotic attractors.
The non-uniformity of density functions in a single chaotic map makes it vulnerable.
The resultant ciphertext is obtained after a smaller number of iterations. Therefore, the distribution of ciphertext is not sufficiently secure.
Definition 1
(Picard orbit): Let X be a non-empty subset of numbers and f: X → X. For an initial point X0 in X, the Picard orbit (generally called the orbit of f) is the set of all the iterates of a point X0, as shown in (2).
2
The orbit O(f, X0) of f at the point X0 is the sequence {fn(X0)}2.
Definition 2
(Superior orbit) Let X be a non-empty subset of numbers, and f: X→X. For an initial point X0, a sequence {Xn} is constructed as described by (3).
3
where 1 ≥ βn > 0 and {βn} is convergent to a non-zero number.
The above-constructed sequence {Xn} is a Superior sequence of iterates, denoted by SO(f, X0, βn), which reduces to O(f, X0) at βn = 12,26. The present work considers βn = β for simplicity; however,27 provides a detailed study for reference.
Definition 3
(Superior Logistic Map): Iterating the logistic map in SO defines the Superior Logistic Map as follows (4).
4
Where β, r, and Xn are all real values, 0 < β ≤ 1.
Different forms of the logistic map have been integrated with Parrondo’s paradox in a deterministic and random manner17,28, 29–30. According to Parrondo’s paradox, the two discrete dynamical systems are combined alternately while being iterated. The resulting dynamics may be cases of anti-control of chaos and control of chaos. The parameter switching (PS) algorithm, a generalized form of Parrondo’s paradox, has been applied to the Lorenz attractor, Rossler attractor, Chua attractor, etc., in a random and deterministic manner31,32.
Definition 4
(Alternate Superior logistic map): Let us consider two Superior logistic maps L1 = Xn = r1Xn−1 (1 - Xn−1) β + (1 - β) Xn−1, and L2 = Xn = r2Xn−1 (1 - Xn−1) β + (1 - β) Xn−1, Iterating L1 and L2 alternatively defines the alternate Superior logistic map as follows.
L1L2 = r1Xn−1 (1 - Xn−1) β + (1 - β) Xn−1, when n is odd; and r2Xn−1 (1 - Xn−1) β + (1 - β) Xn−1, when n is even.
Classical Attack models comprise four different attack models24,33. These attack models describe the information available to the attacker when he attempts the attack. They can be categorized into four distinct groups.
Ciphertext Only attack: The attacker possesses the ciphertext string.
Known Plain text attack: The attacker possesses a series of plain text and corresponding ciphertext.
Chosen Plain text attack: In this attack model, the attacker gets temporary access to the encryption machine. Thus, the attacker can choose any plaintext and get its corresponding ciphertext.
Chosen Ciphertext attack: The attacker gets temporary access to the decryption machinery in this attack model. Thus, the attacker can choose any ciphertext and construct its plaintext.
In each of the above cases, the aim is to determine the used key, allowing the attacker to decrypt the targeted string.
Proposed Baptista algorithm in superior orbit
Superior Baptista algorithm
We implement the Baptista algorithm using the Superior logistic map. Here, SO adds parameter β to the secret key. Thus, the length of the key space increases. The logistic map produces chaotic data for a suitable choice of (β, r) 2. The complete algorithm, called the Superior Baptista Algorithm (Algorithm 2), is as follows.
Alternate superior Baptista algorithm
Now, we use the alternate Superior logistic map in the Baptista algorithm. There are certain instances of a triplet (β, r1, r2) for which order1 + order2 = chaos. Such instances of (β, r1, r2) may be helpful in the Baptista algorithm. In Algorithm 3, the key space further increases due to the inclusion of r1 and r2 in the secret key. The algorithm may be referred to as an alternating Superior Baptista Algorithm.
Table 2. Comparative summary of Baptista algorithm variants.
Algorithm | Key parameters | Key space size | Encryption time | Chaotic behavior | Security strength |
|---|---|---|---|---|---|
Baptista | X₀, r, S | Low | Fast | Moderate | Weak |
Superior Baptista | X₀, r, β, S | Moderate | Moderate | High | Strong |
Alternated Superior Baptista | X₀, r₁, r₂, β, S | High | Slower | Very High | Very Strong |
A comparative overview of all three algorithms is provided in Table 2, highlighting the trade-offs in complexity, key space, encryption speed, and security. Furthermore, suppose L denotes the length of the message and N_avg represents the average number of iterations required to achieve the desired chaotic interval. In that case, the complexity of all the algorithms can be defined as O (L × N_avg).
Examples.
We take two examples to compare the security aspects of Algorithms 1, 2, and 3 based on the iteration numbers. In Algorithm 1, we choose X0 = 0.23232300000000 and r = 3.78 for the secret key as taken by23 for the sake of comparison. In Algorithm 2, we choose (β, r) = (0.9, 4.1) to produce a chaotic sequence. In both algorithms, Xmin and Xmax are chosen as 0.2 and 0.8, respectively23.
For Algorithm 3, an example of anti-control of chaos is picked up from the work of34, in which two ordered systems give rise to a chaotic system. They showed that for r1 = 4.76, r2 = 4.8034, and β = 0.7, there is a situation of order1 + order2 = chaos (anti-control of chaos)26. Here, we choose Xmin = 0.32 and Xmax = 0.98.
Example 1
Consider the encryption of a message “hello,” for example.
T = {104, 101, 108, 108, 111} (ASCII values of “hello”).
Intervals for the T are as follows:
For ‘h’ [0.44140625000000, 0.44375000000000),
for ‘e’ [0.43437500000000, 0.43671875000000),
for ‘l’ [0.45078125000000, 0.45312500000000),
and for ‘o’ [0.45781250000000, 0.46015625).
Secret key:
In Algorithm 1 (Baptista algorithm): X0 = 0.23232300000000, r = 3.78, S (ASCII-values set of all 256 characters).
In Algorithm 2 (Superior Baptista Algorithm): X0 = 0.23232300000000, r = 4.1, β = 0.9, S.
In Algorithm 3 (alternated Superior Baptista Algorithm): X0 = 0.23232300000000, r1 = 4.76, r2 = 4.8034, β = 0.7, S.
The first symbol is s2 because the s1 value is zero in the Baptista and Superior Baptista Algorithms. However, this is not the case with the Alternate Superior Algorithm. In the case of the Baptista encryption scheme, the s1 value becomes zero three times while the s2 value is non-zero, i.e., 100% of the s2 value in those instances, which is prone to attack. A similar case was once seen in the Superior Baptista Algorithm. Alternate Superior Baptista encryption has no such case. However, some unpredictability is inevitable since the input sequence is not fixed.
In the Baptista encryption scheme, the s2 value becomes zero thrice while the s1 value is non-zero, i.e., 100% of s1 is at instances prone to attack. A similar case occurs twice and thrice in Superior Baptista encryption and alternate Superior Baptista encryption schemes, respectively. However, the cases are not fixed due to the random input sequence, thus keeping the scope of unpredictability.
Further, there are instances where both s1 and s2 are zero, which means that at that particular iteration, the functional value is in [0, 0.2] or [0.8, 1] in the case of Baptista and alternate Superior algorithms and [0, 0.32] or [0.98, 1] in case of alternate Superior Baptista Algorithm. In the Baptista algorithm, the symbols s1 and s2 became zero at two instances. Such a situation arises once and 7 times in Superior Baptista and alternate Superior Baptista encryption methods, respectively.
Thus, in all three algorithms, the alternate Superior Baptista Algorithm showed unusual behavior compared to the other two, which makes it less prone to attack and more secure.
Corresponding to r_even = 4.8034, the c value is -3.366, and to r_odd = 4.76, the c value is -3.2844.
The range of c for the alternate Superior algorithm is [− 2.85, 2.85], so the values in (i) are out of range.
Since there are 2 c values, we can get two separate ranges for the ambiguous X0 value.
As shown in Table 3, encryption using the Superior Baptista Algorithm requires a higher number of iterations compared to encryption using the standard Baptista algorithm. Furthermore, the alternating Superior Baptista Algorithm requires the highest number of iterations for encryption.
Table 3. The ciphertext (number of iterations) for the plaintext “hello.”
Plaintext | ASCII-values of Plaintext (T) | Baptista algorithm | Superior Baptista Algorithm | Alternated Superior Baptista Algorithm |
|---|---|---|---|---|
h | 104 | 890 | 938 | 527 |
e | 101 | 1095 | 1218 | 39,294 |
l | 108 | 569 | 915 | 21,140 |
l | 108 | 910 | 1313 | 17,984 |
o | 111 | 285 | 649 | 97 |
Example 2
Let us consider another example of encryption for the message “jaishreeramgyangunsagarjaikapistihulokujagarja,” containing 46 letters. We take the same initial condition and secret keys as in Example 1. Ciphertexts obtained from Baptista, Superior Baptista, and alternated Superior Baptista Algorithms for the input plaintext are given in Table 4. Figure 2 shows that the Superior Baptista Algorithm takes more iterations for encryption, and the alternate Superior Baptista Algorithm takes an extremely high number of iterations for encryption.
The alternate Superior logistic map is indeed an enhanced extension of the Superior logistic map, designed to increase the system’s chaotic behavior and key space by introducing an additional control parameter in the form of a second bifurcation value, . While this results in a more complex and secure encryption process, it also significantly increases the computational overhead due to the alternating nature of parameter switching. Therefore, we first present the Superior Baptista Algorithm to show incremental improvement over the original Baptista approach, establishing the impact of introducing the Superior orbit (via parameter ) alone. Subsequently, the alternate Superior Baptista Algorithm is introduced as a further generalization that leverages anti-control of chaos and enhances key unpredictability.
Table 4. The ciphertext (number of iterations) for the plaintext “jaishreeramgyangunsagarjaikapistihulokujagarja”.
Plaintext | ASCII-values of Plaintext (T) | Baptista algorithm | Superior Baptista Algorithm | Alternated Superior Baptista Algorithm |
|---|---|---|---|---|
j | 106 | 1902 | 1839 | 1007 |
a | 97 | 622 | 262 | 250 |
i | 105 | 811 | 2817 | 30,766 |
s | 115 | 2225 | 2721 | 14,992 |
h | 104 | 643 | 1278 | 11,902 |
r | 114 | 932 | 1278 | 23,682 |
e | 101 | 362 | 279 | 45,070 |
e | 101 | 197 | 2128 | 2376 |
r | 114 | 1488 | 415 | 15,506 |
a | 97 | 1364 | 1036 | 366 |
m | 109 | 1178 | 530 | 40,452 |
g | 103 | 830 | 701 | 31,226 |
y | 121 | 2139 | 1094 | 1656 |
a | 97 | 1981 | 431 | 796 |
n | 110 | 324 | 914 | 18,922 |
g | 103 | 514 | 661 | 22,808 |
u | 117 | 1800 | 710 | 46,832 |
n | 110 | 325 | 2315 | 44,724 |
s | 115 | 716 | 312 | 32,282 |
a | 97 | 799 | 301 | 264 |
g | 103 | 737 | 873 | 32,498 |
a | 97 | 269 | 2080 | 386 |
r | 114 | 1266 | 699 | 31,072 |
j | 106 | 1930 | 441 | 56,164 |
a | 97 | 531 | 5709 | 324 |
i | 105 | 905 | 272 | 86,556 |
k | 107 | 2731 | 2211 | 35,140 |
a | 97 | 477 | 1855 | 384 |
p | 112 | 755 | 600 | 2328 |
i | 105 | 1394 | 665 | 15,598 |
s | 115 | 2197 | 2227 | 22,128 |
t | 116 | 792 | 1498 | 21,600 |
i | 105 | 1219 | 544 | 48,826 |
h | 104 | 415 | 2823 | 3150 |
u | 117 | 987 | 2422 | 2200 |
l | 108 | 443 | 1139 | 3898 |
o | 111 | 658 | 318 | 10,968 |
k | 107 | 1508 | 640 | 538 |
u | 117 | 393 | 876 | 20,760 |
j | 106 | 315 | 277 | 22,244 |
a | 97 | 390 | 1443 | 254 |
g | 103 | 2073 | 540 | 14,034 |
a | 97 | 388 | 266 | 448 |
r | 114 | 505 | 944 | 12,658 |
j | 106 | 604 | 325 | 4664 |
a | 97 | 836 | 431 | 268 |
Theoretical justification of the proposed enhancements
Security implications of superior orbits
In the standard Baptista algorithm, the logistic map is iterated as shown in Eq. (1), which constitutes the classical chaotic orbit. In the proposed Superior Baptista Algorithm, we utilize the Superior orbit as defined in (4). This convex combination induces a weighted influence of the prior state and the chaotic output, enhancing complexity and unpredictability. When β < 1, the resultant system introduces nonlinearity and memory, increasing the system’s sensitivity to initial conditions. Additionally, since the parameter β is now part of the secret key, the key space expands from (5):
5
This increase in dimensionality directly enhances cryptographic strength, offering more robust resistance against key recovery and brute-force attacks. The Superior logistic map exhibits chaotic behavior over a broader range of parameters, enabling more flexible and secure configurations.
Parrondo’s paradox and the alternated superior logistic map
Parrondo’s paradox in dynamical systems suggests that alternating between two deterministic or regular (i.e., ordered) systems can result in globally chaotic dynamics. Inspired by this paradox, we define the Alternated Superior logistic map by alternating two Superior logistic maps f1 and f2 as follows (6) and (7):
6
7
Here, r1 and r2 are chosen such that each map may be near the edge of chaotic behavior, but their combination results in increased unpredictability, a case of anti-control of chaos. This strategy aligns with Parrondo’s principle, wherein “order + order = chaos.
Results and discussions
The Baptista algorithm had specific problems, which have been addressed one by one.
Larger key space: The Superior Baptista Algorithm has a more expansive key space due to the addition of the β parameter to the secret key. The alternative Superior Baptista Algorithm allows the use of two chaotic attractors. Table 3 illustrates the ciphertext in terms of iteration counts required to encrypt the plaintext “hello” using the original Baptista algorithm, the Superior Baptista Algorithm, and the Alternated Superior Baptista Algorithm. Each character of the plaintext is first converted into its corresponding ASCII value, which serves as the target for the chaotic map during encryption. The original Baptista algorithm produces relatively moderate iteration counts for each character, such as 104 for ‘h’ and 111 for ‘o’. The Superior Baptista Algorithm, which introduces an additional secret parameter (β) to expand the key space, typically yields higher iteration counts, indicating increased complexity and enhanced security. Notably, the Alternated Superior Baptista Algorithm, which uses two chaotic attractors instead of one, yields significantly varied and often much higher iteration values, for instance, 101 for ‘e’ and 108 for ‘l’. This indicates a higher level of diffusion and randomness, enhancing resistance to statistical analysis and cryptographic attacks. Overall, the comparison demonstrates that the proposed enhanced algorithms improve the unpredictability and cryptographic strength of the original scheme by leveraging additional parameters and dual chaotic dynamics.
The Alternated Superior Baptista Algorithm, which alternates between two distinct chaotic attractors (e.g., different logistic map parameters), exhibits the most pronounced variability and encryption strength. This is evident in several instances, such as the character ‘i’ again appearing with an iteration count of 86556, or ‘u’ (ASCII 117) producing 46,832 and 20,760 iterations at different positions. These large and non-linear ciphertext values underscore the high sensitivity to initial conditions and character positions, core properties of chaos theory that enhance confusion and diffusion in encryption. Furthermore, the table illustrates how the same character can yield different ciphertexts in different positions within the plaintext. This reflects the dynamic nature of the chaotic process and the key evolution of the characters. For instance, the character ‘a’ appears multiple times with widely varying ciphertexts under each algorithm: 622, 1364, 1981, 799, 269, 531, 477, etc. in the original Baptista algorithm, each distinct due to the chaotic dependency on previous states.
Use of multiple chaotic attractors: Alternate Superior Baptista Algorithm uses two chaotic attractors: Xn = r1Xn−1 (1- Xn−1) β + (1 - β) Xn−1 and Xn = r2Xn−1 (1 - Xn−1) β + (1 - β) Xn−1, Xn [0, 1]. Although the use of both chaotic attractors in the alternate Superior Baptista Algorithm does not produce a uniform distribution of chaotic data, it does result in a more secure encryption. However, the algorithm requires an extremely high number of iterations for encryption, which is a drawback. It can be seen from Table 4 that, in some cases, the number of iterations exceeds the maximum limit of 65,532 (specifically for the 26th plaintext).
Fig. 2 [Images not available. See PDF.]
Comparison of several iterations for Baptista, Superior Baptista, and alternate Superior Baptista Algorithms.
Fig. 3 [Images not available. See PDF.]
Distribution of chaotic values in the logistic map in different cases.
High number of iterations: Encryption should take a significant number of iterations to make the resultant ciphertext more secure. The Superior Baptista Algorithm takes a higher number of iterations, and the alternate Superior Baptista Algorithm takes an extremely high number of iterations.
Encryption of large multimedia files: A larger number of iterations increases the encryption process’s complexity. Though this is good for security, the process is slower. None of the algorithms is suitable for securing large multimedia files. r2, along with β, are included in the secret key.
Uniform distribution of chaotic data: Let us examine the values of the secret keys used in our examples. In the Superior Baptista Algorithm, r = 4.1 and β = 0.9 are in the secret key. The alternate Superior Baptista Algorithm uses r1 = 4.76, r2 = 4.8034, and β = 0.7 in the secret key. The logistic map in Picard orbit produces chaotic data for r = 3.78. Refer to Fig. 3 to see the distribution of chaotic values in all three cases. The logistic map in SO has a more uniform distribution of chaotic values than that of the Picard orbit. Due to more uniformly distributed chaotic data, a Superior logistic map takes more iterations for encryption.
The alternate Superior logistic map is less uniform than the logistic map in the Picard orbit. An interesting observation here is that the chaotic data is in the inter-interval (0.3, 0.1), unlike other cases of logistic maps. Therefore, we choose Xmin = 0.32 and Xmax = 0.98 in the alternate Superior Baptista Algorithm.
The vulnerability analysis
The Baptista algorithm struggles against one-time pad attacks, entropy attacks, and key recovery attacks35. In all the attacks, there is a general assumption that the cryptanalyst knows everything about the cryptosystem, i.e., its design and operation, except for the secret key24. Here, our primary goal is to obtain the encryption key. To simplify analysis, we use symbols of the form 2i, where i = 1, 2, 3, ., 8. Symbols are nothing but plain text. Here we assume that in Baptista-type algorithms, N0 = 0, η = 0, and the source emits two symbols S2 = {s1, s2}. The secret keys in algorithms (Algorithm 1, Algorithm 2, and Algorithm 3) are used as given by 23,35. Secret keys are (X0, r, S) = (0.232323, 3.78, 256), (X0, r, S, β) = (0.232323, 4.1, 256, 0.9), (X0, r1, r2, S, β) = (0.232323, 4.76, 4.8034, 256, 0.7) in Baptista, Superior Baptista and alternate Superior Baptista Algorithms respectively. Also, in Algorithms 1 and 2 (Xmin, Xmax) = (0.2, 0.8) and Algorithm 3 (Xmin, Xmax) = (0.32, 0.98). The range is different in Algorithm 3 due to the nature of chaotic attractors35.
One-time pad attack
The one-time pad was an encryption scheme33. Let’s understand the attack with an example. For a set of two symbols, source S = {s1, s2}. In Algorithms 1 and 2, ε = (0.8–0.2) / 2 = 0.3 (see Fig. 1). So, symbol s1 is in the interval [0.2, 0.5], and symbol s2 is in the interval [0.5, 0.8]. While in Algorithm 3, ε = (0.98 − 0.32) / 2 = 0.33. So the symbol s1 is in the interval [0.32, 0.65] and symbol s2 is in the interval [0.65, 0.98].
In the chosen plain text attack, we apply Baptista-type algorithms on plain texts P1 = (s1s1s1s1s1s1s1s1s1s1…) and P2 = (s2s2s2s2s2s2s2s2s2s2…). Thus when we apply Baptista Algorithm on plain texts, we get ciphertexts C1 = (5, 3, 2, 2, 2, 3, 2, 3, 2, 2, …) and C2 = (1, 2, 3, 9, 5, 7, 5, 1, 1, 1, .) respectively. The cumulative sum of C1 = {5, 8, 10, 12, 14, 17, 19, 22, 24, 26, …} and C2 = {1, 3, 6, 15, 20, 27, 32, 33, 34, 35, …}. So the one-time pad is O = xs2xs2xs1s2xs1xs1xs1xs1s2xs1xs1s2xs1xs1xs1s2…., where the first x represents x0 and the rest x are outside the interval [0.2, 0.8]. This is the one-time pad, which is equivalent to the key. Now, any ciphertext can be decrypted. For example, if C = (3, 5, 2, 2, 8), P would be (s2s1s1s1s2).
Similarly, in case of Superior Baptista Algorithm, C1 = (8, 6, 2, 3, 4, 3, 2, 8, 6, 5 ) and C2 = ( 1, 2, 3, 3, 1, 1, 1, 3, 4, 3 ), and the cumulative sum of C1 = {8, 14, 16, 19, 23, 26, 28, 36, 42, 49,…} and C2 = {1, 3, 6, 9, 10, 11, 12, 17, 21, 24,…}. So, the one-time pad.
In case of alternate Superior Baptista Algorithm, C1 = (3, 2, 2, 2, 4, 2, 2, 2, 2, 2 ) and C2 = (1, 1, 2, 2, 4, 1, 1, 2, 2, 4 ). Cumulative sum of C1 = {3, 5, 7, 9, 13, 15, 17, 19, 21, 23,…} and C2 = {1, 2, 4, 6, 10, 11, 12, 14, 16, 20,…}. So, the one-time pad.
Similarly, for the four symbols S = {s1, s2, s3, s4}, the parameter ε is 0.15 for Algorithms 1 and 2 and 0.165 for Algorithm 3. The symbols s1, s2, s3, and s4 have sites [0.2, 0.35], [0.35, 0.5], [0.5, 0.65], and [0.65, 0.8], respectively, for Algorithms 1 and 2. The symbols s1, s2, s3, and s4 have sites [0.32, 0.485], [0.485, 0.65], [0.65, 0.815], and [0.815, 0.98], respectively, for Algorithm 3. Table 5 shows the results when Algorithm 1, Algorithm 2, and Algorithm 3 are applied to the plaintexts P1 = (s1s1s1s1s1s1s1s1…), P2 = (s2s2s2s2s2s2s2s2…), P3 = (s3s3s3s3s3s3s3s3…), and P4 = (s4s4s4s4s4s4s4s4…) to get the corresponding ciphertexts and one-time pad.
Table 5. Results of algorithm 1, algorithm 2, and algorithm 3 on plaintexts P1, P2, P3, and P4.
Baptista Algorithm | Superior Baptista Algorithm | Alternate Superior Baptista Algorithm | |
|---|---|---|---|
Ciphertext C1 | 5, 9, 5, 3, 4, 5, 10, 13, 13, 4, … | 8, 8, 3, 4, 5, 8, 6, 7, 6, 18, … | 3, 2, 4, 4, 2, 4, 4, 2, … |
Ciphertext C2 | 8, 2, 2, 5, 7, 5, 10, 20, 27, 5… | 14, 12, 42, 9, 19, 2, 5, 10, 6 12… | 7, 10, 4, 8, 6, 6, 6, 6, … |
Ciphertext C3 | 3, 3, 14, 7, 10, 15, 5, 6, 3, 4, … | 3, 3, 11, 4, 10, 3, 6, 4, 3, 6, … | 1, 10, 22, 6, 6, 6, 6, 6, … |
Ciphertext C4 | 1, 14, 17, 1, 1, 1, 1, 6, 1, 1, … | 1, 8, 1, 1, 1, 12, 5, 8, 13, 1, … | 2, 2, 2, 4, 2, 2, 2, 4, … |
Cumulative sum of C1 | 5, 14, 19, 22, 26, 31, 41, 54, 61, 65, … | 8, 16, 19, 23, 28, 36, 42, 49, 55, 73, … | 3, 5, 9, 13, 15, 19, 23, 25, 27, 31, … |
Cumulative sum of C2 | 8, 10, 12, 17, 24, 29, 39, 59, 86, 91, … | 14, 26, 68, 77, 96, 98, 103, 113, 119, 131 … | 7, 17, 21, 29, 35, 41, 47, 53, … |
Cumulative sum of C3 | 3, 6, 20, 27, 37, 52, 57, 63, 66, 70, … | 3, 6, 17, 21, 31, 34, 40, 44, 47, 53, … | 1, 11, 33, 39, 45, 51, 57, 63, … |
Cumulative sum of C4 | 1, 15, 32, 33, 34, 35, 36, 42, 43, 44, … | 1, 9, 10, 11, 12, 24, 29, 37, 38, 50, 51, … | 2, 4, 6, 10, 12, 14, 16, 20, 22, 24, … |
One-time pad O | xs4xs3xs1s3xs2xs2xxxs1s4xs2xs1… | xs4xs3xxs3xs1s4s4s4s4xs2xs1s3xs1. | xs3s4s1s4s1s4s2xs1s4s3s4s1s4s1s4s2xs1s4… |
We can observe that the cryptanalyst can easily construct a one-time pad in all three algorithms. This is because each symbol is associated with a different site, and each site corresponds to some non-overlapped intervals in Baptista-type algorithms. Thus, there will be no overlapping of Xn values. Hence, non-overlapped ciphertexts are obtained.
Entropy attack
Entropy is a mathematical measurement of information or uncertainty. It is computed as shown in Eq. (8).
8
Here, P(si) denotes the probability of the symbol si, which can be calculated as a function of the probability distribution. The entropy should be 1 when encryption is applied to two inputs. Let us take an example of tossing a coin; the entropy will be one because, in one bit, we can encrypt it as 0 for a head and 1 for a tail33. If entropy is less than 1, it may lead to some security threats. In this attack, we associate each value with a particular range. In the case of two symbols, the range of Xn is [0.2, 0.5] and [0.5, 0.8] (for Algorithm 1 and Algorithm 2), and [0.32, 0.65] & [0.65, 0.98] (for Algorithm 3). The first symbol, s1, is associated with the range [0.2, 0.5], and s2has a range [0.5, 0.8] (for Algorithm 1 and Algorithm 2). While the symbol s1 is associated with the range [0.32, 0.65], s2 has a range [0.65, 0.98] (for Algorithm 3). We input a random message of 1000 length with s1 and s2 and iterate them individually. We record the number of times each symbol appears at every iteration. Based on this calculation, the symbol with maximum frequency is set as the most probable symbol at a given iteration number.
This is a ciphertext-only attack. In24, with the same r and x0 values, the Baptista algorithm can decrypt 70% of symbols, and the entropy value is much less than 1. The formula for computing the entropy of the encryption process is given by (9).
9
Where i is the number of iterations used to encrypt the symbol, N shows the maximum iteration, represents the symbol, and j = {1, 2} (in case of 2 symbols).
From Table 6, the following observations are made.
Table 6. Comparison of Baptista, superior Baptista, and alternate superior Baptista algorithms for s1 and s2 values (symbol 1 and symbol 2) after each iteration.
Iteration | In the case of Baptista algorithms | In the case of the Superior Baptista Algorithm | In the case of the Alternate Superior Baptista Algorithm | |||
|---|---|---|---|---|---|---|
s1 values | s2 values | s1 values | s2 values | s1 values | s2 values | |
01 | 00 | 73 | 00 | 203 | 129 | 274 |
02 | 377 | 24 | 187 | 75 | 212 | 75 |
03 | 62 | 132 | 43 | 82 | 59 | 102 |
04 | 34 | 36 | 76 | 42 | 29 | 42 |
05 | 21 | 122 | 71 | 41 | 18 | 00 |
06 | 05 | 00 | 42 | 17 | 22 | 00 |
07 | 04 | 45 | 38 | 23 | 00 | 00 |
08 | 01 | 00 | 27 | 01 | 38 | 00 |
09 | 00 | 13 | 10 | 04 | 00 | 00 |
10 | 00 | 00 | 04 | 00 | 00 | 00 |
11 | 02 | 16 | 04 | 02 | 00 | 00 |
12 | 01 | 00 | 00 | 00 | 00 | 00 |
13 | 00 | 32 | 01 | 02 | 00 | 00 |
14 | 00 | 00 | 03 | 00 | 00 | 00 |
Table 7 is the result of the frequency analysis of symbols by the Baptista algorithm. At the first iteration, the symbol s1 is zero, leading to the predictability of the very first symbol as s2. At iterations 10 and 14, the frequencies of s1 and s2 are zero. The entropy calculated here using Eq. (3) is 0.49, nearly half the ideal value of 1. There are cases where either of the frequencies is zero, and the other is not. This means the guessing of the non-zero frequency symbol is 100% correct. The actual frequency analysis depends on random inputs.
Table 7. After each iteration, the total frequency of s1 and s2 representing the highest value will be the most probable symbol for a given number of iterations s* by the Baptista Algorithm.
Iterate | Frequency | s1(Frequency) | s2(Frequency) | s* |
|---|---|---|---|---|
1 | 0.073 | 0.00 | 1.00 | 73(s2) |
2 | 0.401 | 0.94 | 0.06 | 377(s1) |
3 | 0.194 | 0.32 | 0.68 | 132(s2) |
4 | 0.070 | 0.49 | 0.51 | 36(s2) |
5 | 0.143 | 0.15 | 0.85 | 122(s2) |
6 | 0.005 | 1.00 | 0.00 | 5(s1) |
7 | 0.049 | 0.08 | 0.92 | 45(s2) |
8 | 0.001 | 1.00 | 0.00 | 1(s1) |
9 | 0.013 | 0.00 | 1.00 | 13(s2) |
10 | 0.000 | 0.00 | 0.00 | ---- |
11 | 0.018 | 0.11 | 0.89 | 16(s2) |
12 | 0.001 | 1.00 | 0.00 | 1(s1) |
13 | 0.032 | 0.00 | 1.00 | 32(s2) |
14 | 0.000 | 0.00 | 0.00 | ---- |
In Table 8, like Table 7, we see that the first symbol is s2 because s1 is zero. This is predictable. The entropy calculated here is 0.69 on the same random input. This indicates that the Superior Baptista Algorithm is more robust than the Baptista algorithm, as it exhibits greater unpredictability compared to the Baptista algorithm.
Table 8. The total frequency of s1 and s2 after each iteration, representing the highest value, will be the most probable symbol for a given number of iterations s* by the superior Baptista Algorithm.
Iterate | Frequency | s1(Frequency) | s2(Frequency) | s* |
|---|---|---|---|---|
1 | 0.203 | 0.00 | 1.0 | 203(s2) |
2 | 0.262 | 0.71 | 0.29 | 187(s1) |
3 | 0125 | 0.34 | 0.66 | 82(s2) |
4 | 0.118 | 0.64 | 0.36 | 76(s1) |
5 | 0112 | 0.63 | 0.37 | 71(s1) |
6 | 0059 | 0.71 | 0.29 | 42(s1) |
7 | 0.061 | 0.62 | 0.38 | 38(s1) |
8 | 0.028 | 0.96 | 0.04 | 27(s1) |
9 | 0.014 | 0.71 | 0.29 | 10(s1) |
10 | 0.004 | 1.00 | 0.00 | 04(s1) |
11 | 0.006 | 0.67 | 0.33 | 04(s1) |
12 | 0.000 | 0.00 | 0.00 | ---- |
13 | 0.003 | 0.33 | 0.67 | 02(s2) |
14 | 0.003 | 1.00 | 0.00 | 03(s1) |
Table 9 indicates that unpredictability is very high, as the data contains a high proportion of zeros. At the first iteration, s1 is non-zero, unlike the other two algorithms. The calculated entropy is 0.83 for the same random input, closer to the ideal value. However, all these frequencies depend on the values we have taken and the number of iterations we performed. To be sure, we consider another example of a string of 1,000 input symbols, consisting of the set s2. Again, we found that the Baptista algorithm is vulnerable to an entropy attack, as the entropy calculated is 0.53. The entropy calculated for the Superior and Alternate Superior Algorithms is 0.70 and 0.82, respectively. All the characteristics described above are the same.
Table 9. The total frequency of s1 and s2 after each iteration, representing the highest value, will be the most probable symbol for a given number of iterations, s*, by the alternate superior Baptista Algorithm.
Iterate | Frequency | s1(Frequency) | s2(Frequency) | s* |
|---|---|---|---|---|
1 | 0.403 | 0.3 | 0.7 | 274(s2) |
2 | 0.287 | 0.7 | 0.3 | 212(s1) |
3 | 0.161 | 0.4 | 0.6 | 102(s2) |
4 | 0.71 | 0.4 | 0.6 | 42(s2) |
5 | 0.018 | 1.00 | 0.00 | 18(s1) |
6 | 0.022 | 1.00 | 0.00 | 22(s1) |
7 | 0.00 | 0.00 | 0.00 | ---- |
8 | 0.038 | 1.00 | 0.00 | 38(s1) |
9 | 0.000 | 0.00 | 0.00 | ---- |
10 | 0.000 | 0.00 | 0.00 | ---- |
11 | 0.000 | 0.00 | 0.00 | ---- |
12 | 0.000 | 0.00 | 0.00 | ---- |
13 | 0.000 | 0.00 | 0.00 | ---- |
14 | 0.000 | 0.00 | 0.00 | ---- |
Thus, the entropy attack will not succeed in Algorithms 2 and 3.
Key recovery attacks
Initial value estimation
This cryptanalysis method is based on applying Gray codes, as shown in15. In this attack using gray codes, it is possible to estimate the initial X0 value. Since the chaotic values are sensitively dependent on initial values, revealing the X0 value could lead to the key and further the message. The attack uses (10) to obtain the Mandelbrot map.
10
The range of the variable c can be determined by |2/β|35. In the Baptista algorithm, the range of the c value is [-2, 2] as β = 1, while in the Superior algorithm where β = 0.9, the range is [-2.22, 2.22], and in the alternate Superior algorithm where β = 0.7, the range is [-2.85, 2.85]. In13, it is shown how 1D quadratic maps can be formulated using Gray codes. Here, the letters L, R, and C indicate whether each iteration falls to the left (Xi < 0), right (Xi > 0), or at the critical point (Xi = 0) of the map, respectively. Figure 4 shows an example of the Gray code obtained at c = -1.625413725 and X0 = 0. In the Attack, we associate the s1 symbol with the left region (L) and the s2 symbol with the correct region (R). So, the plain text containing two symbols will be iterated, and the orbit will be maintained based on the region obtained after each iteration. The number of iterations after which the expected region associated with the symbol occurs will become the cipher.
Fig. 4 [Images not available. See PDF.]
A 5-Periodic curve at c = -1.625413725, X0 = 0 and sequence CLRLL13.
To get the value, due to X0, the orbit will be converted into gray code g0 by changing 0 to R and 1 to L. Add and subtract one in the original Gray code to get two more Gray codes, g+ 1 and g− 1. Now let’s take the standard part in (g0, g+ 1) and (g0, g− 1) and then substitute zero by + and one by - and do the calculation on (√-c) as described in14. For example, 01 will be calculated as [+ √(-c-√-c)], and we get an upper limit and lower limit of X0.
We can equate the one-dimensional logistic map (1) with (7) by putting c = r * (2 - r) / 423. The value c = -1.8 can be estimated to be within the range of [-2, 2]. This c value corresponds to r = 3.87. However, as in the paper, we have chosen r = 3.78 for the Baptista algorithm. Therefore, we choose the corresponding c value, which is -1.68. For the Superior algorithm at β = 0.9, the c value will be -2.1525, corresponding to r = 4.10. In the case of the alternate Superior algorithm, for r_odd = 4.76, the value of c is -3.2844, and for r_even = 4.8034, the value of c is -3.36646.
Now, let us understand the attack with an example of the input string s1s2s2s1s1s1s1, and here we set X0 = 0.232323 in all the following examples.
Example 3
As in24, c = − 1.8 (so r = 3.87), and the resultant value of a range of X0 is (0.2254207616, 0.243441280).
Example 4
In the Baptista algorithm, by using r = 3.78 and c = -1.68, the orbit array O is (RLRLLLLRLRLRLL), and the resultant cipher array w is (1, 1, 5, 1, 2, 2, 1). To obtain the narrow range of X0 values, we generate the Gray code of O, which is (0, 1, 0, 1, 1, 1, 1, 0, 1, 0, 1, 0, 1, 1). Further, we construct g+ 1 and g− 1. Thus, we get the following.
The standard part in (g0, g+ 1) is 010111101010, and in (g0, g− 1) is 0101111010101. The rest of the calculation on the standard part in (g0, g+ 1) by substituting one by – and zero by + is as follows:
(-c-(-c + (-c-(-c-(-c-(-c-(-c + (-c-(-c + (-c-(-c + (-c)0.5)0.5)0.5)0.5)0.5)0.5)0.5)0.5)0.5)0.5)0.5)0.5
Also, by substituting, 1 by – and 0 by + in common part in (g0, g− 1), we get.
(-c-(-c + (-c-(-c-(-c-(-c-(-c + (-c-(-c + (-c-(-c + (-c-(-c)0.5)0.5)0.5)0.5)0.5)0.5)0.5)0.5)0.5)0.5)0.5)0.5)0.5
Thus, the estimated value of X0 is (0.23207892, 0.23462428). By adjusting the value of c, the range of X0 becomes narrower. Now, the Superior algorithm is applied to the exact input string. The cipher array is (1, 1, 5, 1, 2, 1, 1), and the orbit array is RLRLLLLRLRLLL. The corresponding Gray code g0 is 111,000,111,100, and g− 1 and g+ 1 are 111,000,111,101 and 111,000,110,100, respectively. The estimated value of X0 is (0.898187, 0.898423). But we took X0 as 0.232323. Therefore, this attack is unsuccessful in the case of the Superior Baptista Algorithm, as X0 does not fall within the calculated range.
Also, in the case of an alternate Superior Baptista Algorithm, we cannot perform this attack because.
Through a specific procedure, we can determine that the initial key, i.e., X0, can be easily estimated using the initial value attack on the ciphertext generated by the Baptista algorithm, provided that only some initial ciphertext is available. However, the attack is ineffective on ciphers obtained by the Superior and Alternate Superior Algorithms.
Parameter estimation
In this cryptanalysis, we assume that we know the value of X0 and are interested in knowing the value of c. The value of c is estimated using the method described in section “Initial value estimation” and through additional calculation steps. For example, to construct the sequence of a dynamical system for orbit = RL (Gray code would be 01) and estimate the value of c as follows14: + √(-c-√-c) = x0, -c = √(-c) + x02 by using the general formula mentioned in (11).
11
We can approximate the original c value by putting c0 = 0 and then iterating the (8). After a certain point, we get a saturation point where cn+1 = cn. Using (8), we get a c value of -1.801779 for the Baptista algorithm. Thus, the key is broken. For the Superior algorithm at β = 0.9, we obtain a c value of -1.4474, whereas the key c value was − 2.1525. The alternative Superior algorithm has two c values based on r_even and r_odd values, but only one X0. This attack does not apply to this algorithm.
Comparative analysis with state-of-the-art schemes
We compared our proposed algorithms with several cutting-edge chaotic encryption systems to confirm their efficacy. Essential features, including chaotic dynamics, entropy levels, iteration counts, and resistance to different cryptanalytic assaults, are compiled in Table 10. Evidently, the original Baptista algorithm, based on only one logistic map, has low entropy (0.49) that can be attacked using key recovery, high-entropy attacks, etc. Likewise, both the hybrid logistic-tent scheme and the 2D chaotic map-based scheme have a medium entropy value (~ 0.60–0.70) and have not been significantly compromised by any attacking technique, such as differential analysis. Conversely, the suggested Superior Baptista Algorithm combines the Superior logistic map with an 8-parameter model, has a greater entropy (0.70), broader key space, allows greater resistance towards entropy depreciation and key recovery attempts, and has a maximum iteration number of 2,823. The final security enhancement performed through the Alternated Superior Baptista Algorithm is the combination of two chaotic attractors and the inherent use of Parrondo’s Paradox, which allows for the highest entropy (0.82) and represents a significantly greater computational complexity, as demonstrated by the number of iterations, which is 86,556. It exhibits the highest level of resistance to all assessed vectors of attack. In summary, both of these proposed schemes present promising values in terms of encryption soundness and unpredictability compared to current practices.
Table 10. Comparison of proposed algorithms with state-of-the-art schemes.
Scheme | Chaotic dynamics used | Key space expansion | Entropy value | Max iterations | Resistance to attacks |
|---|---|---|---|---|---|
Baptista Algorithm23 | Single Logistic Map | Low | 0.49 | ~ 890 | Vulnerable to key recovery, entropy, and one-time pad attacks |
Hybrid Logistic-Tent16 | Combined chaotic maps | Moderate | ~ 0.60 | N/A | Weak against differential analysis |
2D Chaotic Maps19 | 2D Logistic or Arnold Cat Maps | Moderate | ~ 0.70 | N/A | Strong for images, weak for streams |
Superior Baptista (Proposed) | Superior Logistic Map + β | High | 0.70 | 2,823 | Resistant to entropy & key recovery |
Alternated Superior Baptista (Proposed) | Two Chaotic Attractors + Parrondo’s Paradox | Very High | 0.82 | 86,556 | Most substantial resistance to all tested attacks |
Limitations
The Superior Baptista and Alternated Superior Baptista Algorithms proposed in this work introduce improved chaotic properties, enlarged key spaces, and enhanced encryption complexity. However, these benefits come with certain limitations. Most notably, the increased number of iterations, particularly in the alternating version, results in higher computational overhead, thereby reducing efficiency in real-time or resource-constrained environments. Furthermore, the reliance on precise floating-point arithmetic can introduce implementation challenges on hardware platforms with limited precision or inconsistent numerical standards. The complexity of key structures involving multiple parameters (e.g., β, r1, r2) also increases the difficulty of key management and secure distribution. Synchronization between communicating parties can become sensitive to error propagation, especially in the presence of channel noise or transmission delays. Lastly, while the proposed methods strengthen resistance against classical attacks, comprehensive cryptanalysis under advanced attack models (such as differential, linear, or statistical cryptanalysis) remains an open area for further validation.
Conclusion
The paper examines the security issues of Baptista’s chaotic cryptosystem, which various researchers have raised. In this paper, we focus on two problems with the Baptista algorithm: the non-uniform distribution of chaotic data and the reliance on a single attractor. We integrate Parrondo’s paradox. The Superior orbit and the logistic map in the Baptista algorithm introduce additional parameters to the secret key, thereby increasing the key space in the cryptosystem. The two proposed methods utilize more uniform chaotic data and two chaotic attractors, respectively, thereby increasing the security of the Baptista cryptosystem by employing a high number of iterations for encryption. Experimental evaluation revealed that the Superior Baptista Algorithm required up to 2,823 iterations, while the Alternated Superior Baptista Algorithm reached as high as 86,556 iterations, indicating significantly enhanced encryption complexity and diffusion. Furthermore, it was observed that the original Baptista algorithm is vulnerable to key recovery attacks, including parameter estimation and initial value estimation, entropy attacks, and one-time pad attacks. Entropy analysis showed marked improvement, with the Alternated Superior variant achieving an entropy value of 0.82, compared to 0.49 in the original Baptista algorithm, confirming greater randomness and unpredictability. Security testing against key recovery, entropy, and one-time pad attacks demonstrated that both enhanced algorithms were resistant to parameter and initial value estimation, and the effectiveness of entropy attacks was substantially reduced. We applied all these attacks to the two proposed algorithms and found that they are not vulnerable to any of these attacks. Specifically, the algorithms are not susceptible to key recovery attacks, the entropy attack is not very successful, and they are vulnerable to a one-time pad attack. While the one-time pad attack remains a theoretical concern due to interval-based symbol mapping, the use of dual chaotic attractors in the alternated version makes such attacks significantly less practical. Finally, we conclude that the Superior Baptista Algorithm and the alternative Superior Baptista Algorithm perform substantially better, overcoming most of the limitations of the original Baptista algorithm, including enhanced security against attacks. The alternate Superior Baptista Algorithm performs the best. It produces considerably more secure encryption than the Baptista algorithm and is robust against various attacks.
The work in the paper naturally raises the following curiosity: In Parrondo’s paradox, we chose two chaotic logistic maps. It would be interesting to see the Baptista cryptosystem’s results in three or more chaotic maps (using the Parameter Switching algorithm), which will be addressed in the future.
Author contributions
Conceptualization: D.K.V., M.R., and H.G.; Methodology: D.K.V., R.D., and H.G.; Validation: H.G. and A.K.; Formal analysis: D.K.V., R.D. and A.K.; Writing—original draft preparation: D.K.V., R.D. and A.K.; Writing—review and editing: M.R. and H.G. All authors reviewed the manuscript.
Funding
Open access funding provided by Manipal Academy of Higher Education, Manipal.
Data availability
All data generated or analysed during this study are included in this published article.
Competing interests
The authors declare no competing interests.
List of symbols
X0Initial value of the chaotic map; part of the secret key
XnChaotic state value at the nth iteration
r, r1, r2Control parameters for the logistic map
βSuperior orbit parameter (0 < β ≤ 1)
SNumber of partitions for the attractor interval
SiIndividual partition/site in S representing a specific ASCII character
ΕLength of each partition/site
Xmin, XmaxMinimum and maximum bounds of the chaotic interval considered, respectively
T, TiPlaintext message and its i-th character in the ASCII value, respectively
C, CiCiphertext message and its i-th element, respectively
nIteration counter
O(f, X0)Picard orbit of function f starting at X0
SO(f, X0, βn)Superior orbit for map f, starting at X0, with weighting sequence βn
L1, L2Two logistic maps used alternately in the alternated Superior logistic map algorithm
ηAcceptance threshold used in probabilistic selection of chaotic values when multiple options exist.
N0, NmaxMinimum and maximum allowed values for ciphertext Ci, respectively
kRandom number between 0 and 1 used in encryption decision when η ≠ 0
LLength of the plaintext message
N_avgAverage number of iterations required to find the desired partition
H(S)Entropy of symbol set S
P(si)Probability of occurrence of symbol si
s1, s2, …Symbols used in entropy/key recovery analysis
cParameter in Mandelbrot/quadratic map used for key recovery attack analysis
OOrbit of the logistic map
g0, g+1,g-1Gray code sequences used in key recovery attack
wCipher array in key recovery attack
f(x)Chaotic function
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
1. Saeed, H., sobky, E., Diab, W. I. & Elsisi, M. A. T. O. Chaotic maps in cryptography. In International Telecommunications Conference (ITC-Egypt) 635–645 (2024). https://doi.org/10.1109/ITC-Egypt61547.2024.10620474.
2. Rani, M; Agarwal, R. A new experimental approach to study the stability of logistic map. Chaos Solitons Fractals; 2009; 41, pp. 2062-2066. [DOI: https://dx.doi.org/10.1016/j.chaos.2008.08.022]
3. Ariffin, MRK; Noorani, MSM. Modified Baptista type chaotic cryptosystem via matrix secret key. Phys. Lett. A; 2008; 372, pp. 5427-5430.24396921:CAS:528:DC%2BD1cXptVWitLw%3D [DOI: https://dx.doi.org/10.1016/j.physleta.2008.06.077]
4. Li, S; Mou, X; Cai, Y. Improving security of a chaotic encryption approach. Phys. Lett. A; 2001; 290, pp. 127-133.20459471:CAS:528:DC%2BD3MXot1Onsr0%3D [DOI: https://dx.doi.org/10.1016/S0375-9601(01)00612-0]
5. Li, S; Chen, G; Wong, KW; Mou, X; Cai, Y. Baptista-type chaotic cryptosystems: problems and countermeasures. Phys. Lett. A; 2004; 332, pp. 368-375.1:CAS:528:DC%2BD2cXptl2itrg%3D [DOI: https://dx.doi.org/10.1016/j.physleta.2004.09.028]
6. Kanso, A; Ghebleh, M; Noura, H. A variant of baptista’s encryption scheme. Secur. Commun. Netw.; 2015; 8, pp. 3701-3712. [DOI: https://dx.doi.org/10.1002/sec.1293]
7. Pareek, NK; Patidar, V; Sud, KK. Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul.; 2005; 10, pp. 715-723.2127967 [DOI: https://dx.doi.org/10.1016/j.cnsns.2004.03.006]
8. Wei, J; Liao, X; Wong, K; Zhou, T. Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul.; 2007; 12, pp. 814-822. [DOI: https://dx.doi.org/10.1016/j.cnsns.2005.06.001]
9. Wong, KW. A fast chaotic cryptographic scheme with dynamic look-up table. Phys. Lett. A; 2002; 298, pp. 238-242.19180661:CAS:528:DC%2BD38Xktleisbg%3D [DOI: https://dx.doi.org/10.1016/S0375-9601(02)00431-0]
10. Wang, X; Yu, C. Cryptanalysis and improvement on a cryptosystem based on a chaotic map. Comput. \& Math. Appl.; 2009; 57, pp. 476-482.2488619 [DOI: https://dx.doi.org/10.1016/j.camwa.2008.09.042]
11. Xiang, T; Liao, X; Tang, G; Chen, Y; Wong, K. A novel block cryptosystem based on iterating a chaotic map. Phys. Lett. A; 2006; 349, pp. 109-115.1:CAS:528:DC%2BD2MXhtlGmu77O [DOI: https://dx.doi.org/10.1016/j.physleta.2005.02.083]
12. Datcu, O., Hobincu, R., Stanciu, M. & Badea, R. A. Encrypting multimedia data using modified Baptista’s chaos-based algorithm. In International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures 185–190 (2017).
13. Alvarez, G; Romera, M; Pastor, G; Montoya, F. Gray codes and 1D quadratic maps. Electron. Lett.; 1998; 34, pp. 1304-1306. [DOI: https://dx.doi.org/10.1049/el:19980950]
14. Mortajez, S., Dehghan, M. J. & Azizi, A. Securing {DICOM} images with a novel chaotic encryption scheme utilizing wavelet transform and biometric fingerprint. Res. Square (2024).
15. Pal, S et al. A novel image encryption technique with four stage bit-interspersing and A 4D-hyperchaotic system. ECTI Trans. Comput. Inf. Technol.; 2023; 17, pp. 105-116.
16. Selvakumar, B., Abinaya, P., Lakshmanan, B. & Sheron, S. & Smitha Rajini, T. Hybrid image encryption using advanced least significant bit algorithm, chaotic maps and {DNA} encoding for digital healthcare. J. Intell. Fuzzy Syst.2024, 1–15 (2024).
17. Romera, M; Small, M; Danca, M. Deterministic and random synthesis of discrete chaos. Appl. Math. Comput.; 2007; 192, pp. 283-297.2385594
18. Wang, J; Liu, L. A novel chaos-based image encryption using magic square scrambling and octree diffusing. Mathematics; 2022; 10, 457. [DOI: https://dx.doi.org/10.3390/math10030457]
19. Jomaa, I; Mohammed, RJ; Jaafar, NA; Ismael, HA. Cryptography by the Echacha20 algorithm based on logistic and Chirikov chaotic maps. Bilad Alrafidain J. Eng. Sci. Technol.; 2024; 3, pp. 1-19. [DOI: https://dx.doi.org/10.56990/bajest/2024.030101]
20. Abduljabbar, ZA et al. Provably secure and fast color image encryption algorithm based on S-boxes and hyperchaotic map. IEEE Access.; 2022; 10, pp. 26257-26270. [DOI: https://dx.doi.org/10.1109/ACCESS.2022.3151174]
21. Denning, D. E. Cryptography and Data Security (Wiley, 1982).
22. Pecora, LM; Carroll, TL. Synchronization in chaotic systems. Phys. Rev. Lett.; 1990; 64, pp. 821-824.10382631:STN:280:DC%2BC2sfoslCktA%3D%3D [DOI: https://dx.doi.org/10.1103/PhysRevLett.64.821] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/10042089]
23. Baptista, MS. Cryptography with chaos. Phys. Lett. A; 1998; 240, pp. 50-54.16196211:CAS:528:DyaK1cXhsFOisrc%3D [DOI: https://dx.doi.org/10.1016/S0375-9601(98)00086-3]
24. Alvarez, G; Montoya, F; Romera, M; Pastor, G. Cryptanalysis of an ergodic chaotic cipher. Phys. Lett. A; 2003; 311, pp. 172-179.19823401:CAS:528:DC%2BD3sXjt1eksrk%3D [DOI: https://dx.doi.org/10.1016/S0375-9601(03)00469-9]
25. Gao, E. Analysis of the Parrondo paradox and applications. Highlights Sci. Eng. Technol.; 2024; 88, pp. 383-390. [DOI: https://dx.doi.org/10.54097/7n856166]
26. Rani, M; Yadav, A. Parrondo’s paradox in the superior logistic map. Int. J. Tech. Res.; 2016; 1, pp. 1-8.
27. Singh, SL; Mishra, SN; Sinkala, W. A new iterative approach to fractal models. Commun. Nonlinear Sci. Numer. Simul.; 2012; 17, pp. 521-529.2834410 [DOI: https://dx.doi.org/10.1016/j.cnsns.2011.06.014]
28. Boyarsky, A; Góra, P; Islam, M. Randomly chosen chaotic maps can give rise to nearly ordered behavior. Phys. D Nonlinear Phenom.; 2005; 210, pp. 284-294.21706211:CAS:528:DC%2BD2MXhtVemtbzE [DOI: https://dx.doi.org/10.1016/j.physd.2005.07.015]
29. Gamaliel, B; Victor, C; Manuel, F. On the coexisting dynamics in the alternate iteration of two logistic maps. Dyn. Syst.; 2011; 26, pp. 189-197.2801271 [DOI: https://dx.doi.org/10.1080/14689367.2011.554383]
30. Levinsohn, E; Mendoza, S; Peacock-López, E. Switching induced complex dynamics in an extended logistic map. Chaos Solitons Fractals; 2012; 45, pp. 426-432. [DOI: https://dx.doi.org/10.1016/j.chaos.2011.12.020]
31. Danca, MF; Romera, M; Pastor, G; Montoya, F. Finding attractors of continuous-time systems by parameter switching. Nonlinear Dyn.; 2011; 67, pp. 2317-2342.2881545 [DOI: https://dx.doi.org/10.1007/s11071-011-0172-6]
32. Danca, MF; Romera, M. Algorithm for control and anticontrol of chaos in continuous-time dynamical systems. Dyn. Contin Discret Impuls Syst. Ser. B Appl. Algor.; 2008; 15, pp. 155-164.2401706
33. Stinson, D. R. Cryptography: Theory and Practice (Chapman and Hall/CRC, 2005).
34. Yadav, A. & Rani, M. PS algorithm in different forms of logistic map in superior orbit. Chaos Complex. Lett.12, 1452 (2018).
35. Rani, M; Kumar, V. Superior Julia set. Res. Math. Educ.; 2004; 8, pp. 261-277.
© The Author(s) 2025. This work is published under http://creativecommons.org/licenses/by/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.