IJAST

Enhancing AES Encryption with Chaotic Maps for Improved Network Security

© 2025 by IJAST

Volume 3 Issue 3

Year of Publication : 2025

Author : Zaid A. Abdulrazaq

: 10.56472/25839233/IJAST-V3I3P103

Citation :

Zaid A. Abdulrazaq, 2025. "Enhancing AES Encryption with Chaotic Maps for Improved Network Security" ESP International Journal of Advancements in Science & Technology (ESP-IJAST)  Volume 3, Issue 3: 15-23.

Abstract :

This paper presents an enhanced chaotic AES encryption algorithm with a diffusion mechanism for secure image encryption. The approach combines a dynamically generated chaotic S-box, derived from a logistic map, with a key-dependent diffusion phase to strengthen encryption performance. The chaotic S-box ensures high non-linearity, while the diffusion process introduces randomness and resistance to statistical attacks. Experimental results demonstrate the effectiveness of the proposed method, achieving high entropy values (7.9974), significantly low correlation coefficients (0.0021), and successful decryption with no data loss. These results validate the algorithm's robustness, reliability, and applicability in secure image transmission. Potential applications include sensitive fields such as medical imaging, defense, and IoT. The proposed scheme highlights the synergy between chaos theory and cryptographic techniques, offering a promising direction for future research in advanced encryption mechanism.

References :

[1] SALIH, Ahmed Amir; ABDULRAZAQ, Zaid Abdulsattar; AYOUB, Harith Ghanim. Design and enhancing security performance of image cryptography system based on fixed point chaotic maps stream ciphers in FPGA. Baghdad Science Journal, 2024, 21.5 (SI): 1754-1754.

[2] AYOUB, Harith G., et al. Unveiling robust security: Chaotic maps for frequency hopping implementation in FPGA. Ain Shams Engineering Journal, 2024, 15.11: 103016.

[3] S. A. Baker, S. J. Rashid, and O. I. Alsaif. Fog Computing: A Comprehensive Review of Architectures, Applications, and Security Challenges. Northern Technical University Journal for Engineering and Technology (NTU-JET), 2023.

[4] ARROYO, David; DIAZ, Jesus; RODRIGUEZ, F. B. Cryptanalysis of a one round chaos-based substitution permutation network. Signal Processing, 2013, 93.5: 1358-1364.

[5] HWANG, Jinha, et al. Machine learning in chaos-based encryption: Theory, implementations, and applications. IEEE Access, 2023, 11: 125749-125767.

[6] ZEGHID, MEDIEN; AHMED, HASSAN YOUSIF; KHAN, AKHTAR NAWAZ. High-Level Design and Implementation of a Configurable Cryptosystem with a Novel Chaos-Enhanced Function. IEEE Access, 2025.

[7] ALTAMEEM, Ayman, et al. A hybrid AES with a chaotic map-based biometric authentication framework for IoT and industry 4.0. Systems, 2023, 11.1: 28.

[8] KUMAR, Sanjay; SHARMA, Deepmala. Image scrambling encryption using chaotic map and genetic algorithm: a hybrid approach for enhanced security. Nonlinear Dynamics, 2024, 112.14: 12537-12564.

[9] ALAWIDA, Moatsum. A novel image encryption algorithm based on cyclic chaotic map in industrial IoT environments. IEEE Transactions on Industrial Informatics, 2024.

[10] HABBAL, Adib; ALI, Mohamed Khalif; ABUZARAIDA, Mustafa Ali. Artificial Intelligence Trust, risk and security management (AI trism): Frameworks, applications, challenges and future research directions. Expert Systems with Applications, 2024, 240: 122442.

[11] KAMALOV, Firuz, et al. Internet of medical things privacy and security: Challenges, solutions, and future trends from a new perspective. Sustainability, 2023, 15.4: 3317.

[12] MANIKANDAPRABHU, P.; SAMREETHA, M. A review of encryption and decryption of text using the AES algorithm. International Journal of Scientific Research & Engineering Trends, 2024, 10.2.

[13] SARKAR, Bikramjit, et al. A Survey on the Advanced Encryption Standard (AES): A Pillar of Modern Cryptography. 2024.

[14] MOURA, Ricardo, et al. MultiTLS: using multiple and diverse ciphers for stronger secure channels. Computers & Security, 2023, 132: 103342.

[15] KUMAR, Chanumolu Kiran; RAMACHANDRAN, Nandhakumar. Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells. Computers, Materials & Continua, 2024, 78.3.

[16] NASR, Marwa A., et al. A robust audio steganography technique based on image encryption using different chaotic maps. Scientific Reports, 2024, 14.1: 22054.

[17] KENT, Robert M.; BARBOSA, Wendson AS; GAUTHIER, Daniel J. Controlling chaos using edge computing hardware. Nature Communications, 2024, 15.1: 3886.

[18] ADENIYI, A. E., et al. Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach. Multimedia Tools and Applications, 2023, 82.13: 20537-20551.

[19] HADJ BRAHIM, A.; ALI PACHA, A.; HADJ SAID, N. An image encryption scheme based on a modified AES algorithm by using a variable S-box. Journal of Optics, 2024, 53.2: 1170-1185.

[20] ABDUL HUSSIEN, Farah Tawfiq; ALDEEN KHAIRI, Teaba Wala. Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption. International Journal of Interactive Mobile Technologies, 2023, 17.10.

[21] LI, Lizong. A novel chaotic map application in image encryption algorithm. Expert Systems with Applications, 2024, 124316.

[22] LIU, Lingfeng; WANG, Jie. A cluster of 1D quadratic chaotic map and its applications in image encryption. Mathematics and Computers in Simulation, 2023, 204: 89-114.

[23] ALEXAN, Wassim, et al. Color image encryption through chaos and kaa map. IEEE Access, 2023, 11: 11541-11554.

[24] SHUKUR, Wisam Abed; QURBAN, Luheb Kareem; ALJUBOORI, Ahmed. Digital data encryption using a proposed W-method based on AES and DES algorithms. Baghdad Science Journal, 2023, 20.4: 1414-1414.

[25] R. H. Joudah and M. E. Manaa. A New Approach to Improving the Security of the 5G-AKA Using Crystals-Kyber Post-Quantum Technologies and ASCON Algorithm. International Journal of Safety & Security, 2024.

[26] F. Shen, L. Shi, J. Zhang, C. Xu, Y. Chen, and Y. He. BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records. Computer Standards & …, 2024.

[27] P. Duan, Z. Ma, H. Gao, and T. Tian. Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing. IEEE Transactions on …, 2024.

[28] J. Gong, L. Xiong, F. Zhang, and M. Pu. Integrated Quad‐Color Nanoprinting and Tri‐Channel Holographic Encryption Meta‐Marks with Printable Metasurfaces. Laser & Photonics, 2025.

[29] A. Bedi, J. Ramprabhakar, R. Anand, and U. Kumaran. A Novel Blockchain Supported Hybrid Authentication and Handshake Algorithm for Smart Grid. IEEE, 2024.

[30] S. K. Gochhi, S. Sahoo, and P. K. Samanta. Blockchain-Based Comparative Analysis of E-Voting Systems: A Review. In Smart, Secure …, 2024.

[31] M. Alawida. Enhancing logistic chaotic map for improved cryptographic security in random number generation. Journal of Information Security and Applications, 2024.

[32] MNE Farandi, A Marjuni, and N Rijati. Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level. The Imaging Science, 2024.

[33] T. Umar, M. Nadeem, and F. Anwer. Chaos based image encryption scheme to secure sensitive multimedia content in cloud storage. Expert Systems with Applications, 2024.

[34] X. Fang, C. Guyeux, Q. Wang, and J. M. Bahi. Randomness and disorder of chaotic iterations. Applications in information security field. 2016.

[35] M. Shariatzadeh, M. Javad Rostami, and M. Eftekhari. An Adaptive Image Encryption Scheme Guided by Fuzzy Models. 2022.

Keywords :

AES, Cryptographic, Networks, S-Box, Security.