Next Article in Journal
Unique Solutions for Caputo Fractional Differential Equations with Several Delays Using Progressive Contractions
Previous Article in Journal
Integrating Fuzzy C-Means Clustering and Explainable AI for Robust Galaxy Classification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Singularity, Observability, and Independence: Unveiling Lorenz’s Cryptographic Potential

by
Alexandru Dinu
Faculty of Electronics, Telecommunications and Information Technology, National University of Science and Technology Politehnica Bucharest, 061071 Bucharest, Romania
Mathematics 2024, 12(18), 2798; https://doi.org/10.3390/math12182798 (registering DOI)
Submission received: 28 July 2024 / Revised: 3 September 2024 / Accepted: 6 September 2024 / Published: 10 September 2024

Abstract

:
The key findings of this study include a detailed examination of the Lorenz system’s observability, revealing that it maintains high observability compared to other chaotic systems, thus supporting its potential use in cryptographic applications. We also investigated the singularity manifolds, identifying regions where observability might be compromised, but overall demonstrating that the system remains reliable across various states. Additionally, statistical tests confirm that the Lorenz system exhibits strong statistical independence in its outputs, further validating its suitability for encryption purposes. These findings collectively underscore the Lorenz system’s potential to enhance cryptographic security and contribute significantly to the field of secure communications. By providing a thorough analysis of its key properties, this study positions the Lorenz system as a promising candidate for advanced encryption technologies.

1. Introduction

Throughout history, the necessity of securely communicating sensitive information has been paramount [1]. This need spans various domains such as military operations, diplomatic exchanges, and personal matters, where ensuring that only the intended recipient comprehends the message has always been crucial [2]. Cryptography emerged to fulfill this critical requirement, enabling parties to protect the confidentiality of their information, even when potential interceptors attempt to decode it [3,4]. Over recent decades, the evolution of cryptographic methods has been profound, with confidentiality remaining a cornerstone of the field [5,6]. The developments within cryptography have profoundly impacted digital security and information protection.
Nonlinear dynamical chaotic systems are intensely studied due to their complex and unpredictable behaviors [7]. These systems, when implemented on FPGA platforms, offer practical advantages that bridge theoretical models with real-world applications [8]. In particular, advancements in chaotic dynamical systems have significant implications for various research areas such as robotics, communication, and cryptography [3]. The integration of chaos theory with cryptography has emerged as a promising approach to developing more secure and efficient cryptographic algorithms.
Jones and Smith (2023) discuss recent advancements in chaotic systems applied to cryptography, highlighting several innovative approaches [9]. Li and Zhang (2024) provide an overview of hyperchaotic systems and their implications for secure communications, presenting new methodologies [10]. Wang and Zhou (2023) offer a comprehensive review of fractional-order chaotic systems and their applications in various fields, including cryptography [11]. Lee and Kim (2024) explore optimization techniques for chaotic maps, focusing on their application in high-performance image encryption [12]. Patel and Kumar (2023) highlight recent advances in cryptographic algorithms based on chaotic systems, providing insights into current trends and future directions [13].
Recent research in chaos-based encryption has highlighted several advanced techniques and applications. For instance, cross-channel color image encryption using 2D hyperchaotic hybrid maps of optimization test functions [14] and PSO-based image encryption schemes utilizing modular integrated logistic exponential maps [15] represent notable advances in the field. Additionally, exploiting newly designed fractional-order 3D Lorenz chaotic systems and 2D discrete polynomial hyper-chaotic maps has demonstrated high-performance capabilities in multi-image encryption [16]. Moreover, image encryption algorithms based on plane-level image filtering and discrete logarithmic transforms [17] showcase innovative approaches to enhancing encryption techniques.
Despite these advancements, not all dynamical systems exhibit desirable cryptographic properties [18,19], and a universal solution applicable across all contexts remains elusive. This paper seeks to address this challenge by extending the results shown in [20] and evaluating the properties of the Lorenz chaotic system from three distinct perspectives: observability [21,22,23], singularity [24], and statistical independence [25,26].
The original contribution of this paper lies in its comprehensive analysis, which combines typically separate investigations of observability, singularity, and statistical independence to provide a unified and robust perspective on the use of dynamical chaotic maps in cryptography. This integrated approach not only deepens the understanding of chaotic systems but also enhances their reliability in cryptographic applications. Furthermore, this study examines and compares several discrete chaotic systems alongside the continuous Lorenz chaotic system, offering valuable insights from the perspectives of singularity, observability, and statistical independence.
Section 2 provides an overview of the current state-of-the-art findings that form the foundation of this research. This section reviews essential concepts and recent advancements that have guided this study. Section 3 delves into observability, singularity, and statistical independence, presenting new experimental data and analyses for the Lorenz system. The main findings and potential future research directions are discussed in Section 4, highlighting the implications of the results and suggesting areas for further research.

2. Theoretical Background

This section provides a comprehensive overview of the theoretical concepts and state-of-the-art findings that underpin the research presented in this paper. We start by introducing the foundational theories relevant to chaotic systems and their applications in cryptography. This background sets the stage for the subsequent analysis by reviewing essential concepts, recent advancements, and key literature that have guided our study. The aim is to ensure that readers have a solid understanding of the theoretical framework before diving into the experimental results and analysis.
The theoretical concepts described below (observability, singularity and statistical independence) are mainly carried over from [20] and their description is not changed in a significant way. What is different in this paper is the chaotic system which is used and a comparison and correlation with the previous results is made.
A dynamical system can be succinctly described as a framework governing the evolution of states over time. One notable example is the Lorenz system, encapsulated by a trio of differential equations (continuous form—(1) and discrete form—(2); with Δ t = 1 / F s ). This set of equations, credited to Edward Lorenz, an American meteorologist, was developed to model variations in wind speed and temperature. Lorenz achieved this by formulating the three differential equations outlined below. Computational experiments later confirmed that these equations led to a highly sensitive system, where minuscule differences in initial conditions resulted in drastically divergent outcomes over time. The solutions generated by this chaotic system consistently evolve around a geometric structure known as a strange attractor fractal [24]. For chaotic behavior, typical parameter values are a = 10 , b = 8 / 3 , and c = 28 [20,27]; the variables x, y, and z represent the state variables of the Lorenz system.
d x d t = a · ( y x ) d y d t = x · ( c z ) y d z d t = x · y b · z
x k + 1 x k Δ t = a · ( y k x k ) y k + 1 y k Δ t = x k · ( c z k ) y k z k + 1 z k Δ t = x k · y k b · z k
The subsequent section elaborates on the core theoretical concepts employed in this paper. Observability refers to the ability to infer the states or the temporal evolution of the input/output of a system within any finite, non-zero time frame based on the system’s past behavior. Essentially, observability permits the monitoring and examination of a system’s internal states solely by accessing its input/output data. For an n-dimensional chaotic system, observability implies that by utilizing a sequence of values generated by one of the system’s state variables, one can reconstruct the system’s phase space [28]. It is important to note that the discussion of observability assumes that the system parameters are known. Extensive discussions on the observability of multi-dimensional systems can be found in [29,30].
The concept of the singularity manifold in dynamical systems denoted as S O ¯ , can be approached from various perspectives and is intricately linked to observability. The region of space where the system loses its observability for a particular state variable defines the singularity manifold for that variable, indicating that the system is unobservable in that region. In cryptography, the full observability of a system is critically important, making the determination of singularity manifolds a key aspect of our investigation in this paper [31].
The methodology for assessing statistical independence is outlined below. Vlad et al. [25] introduced a test procedure to determine if two random variables are statistically independent. This procedure combines a Pearson-like test with a visual assessment. The same research group further refined their approach [26] by innovatively applying the chi-square test [32] to evaluate whether two experimental datasets align with the Gaussian bivariate probability distribution.
In this paper, we will examine the statistical independence of two datasets, denoted as X and Y, which are derived from the solution space of the Lorenz system. According to the method described in [25], these datasets X and Y will be transformed into two new datasets, U and V, which are expected to follow a Gaussian distribution. The refined chi-square test described in [26] will then be used to assess the statistical independence of U and V by checking if they adhere to the standard normal bivariate probability distribution given by (3). If U and V satisfy this distribution, it implies that the original datasets X and Y are statistically independent.
p ( u , v ) = 1 2 π e u 2 + v 2 2
The datasets under evaluation are ( u 1 , u 2 , , u N ) and ( v 1 , v 2 , , v N ) , each of which should follow an i.i.d. statistical model, meaning the data points are from independent and identically distributed random variables, and both datasets should exhibit a standard Gaussian distribution (mean = 0; variance = 1). Each variable in the dataset is assumed to be independently and identically distributed (i.i.d.), adhering to a standard statistical model. This assumption is crucial for the validity of the subsequent analyses and results.
The hypotheses for the spatial chi-square test are as follows:
  • H 0 —null hypothesis: The datasets (U and V) conform to the bivariate normal distribution described in (3), indicating that U and V (and hence X and Y) are statistically independent.
  • H 1 —alternative hypothesis: The datasets (U and V) do not adhere to the bivariate normal distribution described in (3), suggesting that U and V (and hence X and Y) are not statistically independent.

3. Experimental Results

This section presents the experimental results obtained from our investigations into the Lorenz chaotic system. The purpose of this section is to provide a detailed analysis of the data collected through various experiments designed to evaluate the system’s properties in the context of cryptographic applications.
We begin by discussing the methodology used for the experiments, followed by a presentation of the results for each aspect studied: observability, singularity, and statistical independence. The results are analyzed in detail to highlight key findings and their implications for enhancing cryptographic algorithms based on chaotic systems.
Finally, this section concludes with a discussion on the impact of the experimental findings and their relevance to the overall research goals outlined in the introduction.

3.1. Observability

The procedure used to calculate the observability coefficient for the Lorenz chaotic system is described next and is stemming from [21,31]:
  • Write the fluency matrix F i j by replacing each (non)constant element of the Jacobian matrix with ( 1 ¯ ) 1, and zero otherwise.
    The Jacobian for the Lorenz system is calculated considering the equations from (1) and their partial derivatives with respect to the state variables x i (for the Lorenz system, the state variables are represented by x, y, and z). The result is shown in (4), which is the Jacobian of the Lorenz system.
    J = a a 0 c z 1 x y x b
    The fluency matrix is presented in (5):
    F i j = 1 1 0 1 ¯ 1 1 ¯ 1 ¯ 1 ¯ 1
  • The next step is to choose a state variable to reconstruct the dynamics of the Lorenz system. One should also define the column array C 1 , i , with 1 on the ith position and 0 elsewhere: c 1 , 1 = 1 0 0 for x c 1 , 2 = 0 1 0 for y and c 1 , 3 = 0 0 1 for z.
  • Matrix H 1 , i is an auxiliary variable required in the algorithm, calculated by multiplying each line from the fluency matrix (5) with the corresponding element from array c 1 , i and replacing element F i i with a ·.
    H 1 , 1 = · 1 0 0 0 0 0 0 0 for x; H 1 , 2 = 0 0 0 1 ¯ · 1 ¯ 0 0 0 for y; H 1 , 3 = 0 0 0 0 0 0 1 ¯ 1 ¯ · for z.
  • Next, variable p 1 , i will be used to count the number of linear elements from H 1 , i and q 1 , i is storing the number of non-linear elements from H 1 , i , for each state variable x i .
    p 1 , 1 = 1 q 1 , 1 = 0 for x ; p 1 , 2 = 0 q 1 , 2 = 2 for y and p 1 , 3 = 0 q 1 , 3 = 2 for z .
  • Going further, the · elements from matrices H 1 , i are replaced with their corresponding element from the fluency matrix, and the resulting matrix is transposed:
    H 1 , 1 = 1 1 0 0 0 0 0 0 0 H 11 T = 1 0 0 1 0 0 0 0 0 for x
    H 1 , 2 = 0 0 0 1 ¯ 1 1 ¯ 0 0 0 H 12 T = 0 1 ¯ 0 0 1 0 0 1 ¯ 0 for y
    H 1 , 3 = 0 0 0 0 0 0 1 ¯ 1 ¯ 1 H 13 T = 0 0 1 ¯ 0 0 1 ¯ 0 0 1 for z
  • Arrays c 2 , i are computed by summing the elements of the lines of the previously defined matrices H 1 , i T (1 and 1 ¯ are considered as 1):
    c 2 , 1 = 1 1 0 for x c 2 , 2 = 1 1 1 for y and c 2 , 3 = 1 1 1 for z.
  • One of the final steps of the procedure used to calculate the observability coefficients for the Lorenz system consists in calculating the H 2 , i matrices. They are created by replacing any non-zero element from H 1 , i T with a · and the zero elements with the corresponding terms from the fluency matrix multiplied by the corresponding element from array c 2 , i
    H 21 = · 1 0 · 1 1 ¯ 0 0 0 for x, H 22 = 1 · 0 1 ¯ · 1 ¯ 1 ¯ · 1 for y and, H 23 = 1 1 · 1 ¯ 1 · 1 ¯ 1 ¯ · for z
  • Similarly to p 1 , i , the quantities p 2 , i will count the number of linear elements from H 2 , i and q 2 , i the number of non-linear elements from H 2 , i , for each state variable.
    p 2 , 1 = 2 q 2 , 1 = 1 for x p 2 , 2 = 2 q 2 , 2 = 3 for y p 2 , 3 = 3 q 2 , 3 = 3 for z .
  • The observability coefficient for each state variable, η i , is computed based on the below formulas:
    η i = 1 2 · p i , 1 p i , 1 + q i , 1 + q i , 1 ( p i , 1 + q i , 1 ) 3 + p i , 2 p i , 2 + q i , 2 + q i , 2 ( p i , 2 + q i , 2 ) 2
    where p i + q i = 1 + q i for p i = 0 .
    The observability coefficients for the Lorenz system are as follows:
    η 1 = 0.88 for x η 2 = 0.27 for y η 3 = 0.32 for z .
The results of the observability analysis for the Lorenz system are combined with the ones from [20] in Table 1. This presents data related to the observability characteristics of the chaotic systems under study. The table is designed to provide detailed insights into how different chaotic systems or configurations perform in terms of observability, which is a crucial property for evaluating their suitability for cryptographic applications.
The observability coefficient results for the Lorenz system (specifically for variables y, z) look promising and comparable with the best results obtained for the discrete systems analyzed in [20] (Ikea, Clifford and Tinkerbell). As mentioned in that paper, the observability characteristics of a chaotic system represent only part of the big picture, so we need to continue the analysis with the singularity manifolds.

3.2. Singularity

Another critical concept closely related to observability is singularity, which will be explored in the following sections. A singularity manifold refers to the region where the system loses its observability. In cryptographic applications, it is crucial for the system to be non-singular, which implies that the system remains entirely observable from the selected state variable, denoted as S O ¯ = .
The methodology for identifying singularity regions in the Lorenz chaotic system, along with the results obtained, is described next. The connection between the current and subsequent iterations in the phase space for the state variable x i (x, y, and z) is given by Φ i (7):
Φ i : A = s = x i B = s + = x i + C = s + + = x i + +
Here, Φ i represents the transformation function that maps the state variable x i from its current state s to the next states s + and s + + . Determining singularity regions is vital to ensure that the system maintains observability across all states, thereby ensuring its robustness and security in cryptographic contexts.
Variables A, B, and C correspond to iterations k, k + 1 , and k + 2 , respectively. The observability matrix O i , corresponding to the state variable x i of a non-linear dynamical system, is equal to the Jacobian of the map Φ i . The matrix O i is given by (8):
O i = δ A δ x 1 δ A δ x 2 δ A δ x 3 δ B δ x 1 δ B δ x 2 δ B δ x 3 δ C δ x 1 δ C δ x 2 δ C δ x 3
The chaotic system is fully observable if det ( O i ) 0 for all iterations. This condition ensures that the map Φ i is invertible and that the system can always be represented in an iterative form as shown in (9):
A + = B B + = C C + = F i ( A , B , C )
where the function F i does not have singularities, and the index i denotes the state variable. If the determinant of O i is zero, the system is not fully observable. The singularity manifold for the state variable x i is mathematically described by:
S O ¯ i = { ( x 1 , x 2 , x 3 ) R 3 det ( O i ) = 0 }
For the Lorenz system, the singularity manifolds for the three state variables are calculated below.
Φ 1 : A = s = x B = s + = x + = σ · ( y x ) C = σ 2 · ( y x ) + σ · ( x · ( ρ z ) y )
O 1 = 1 0 0 σ σ 0 σ 2 + σ · ( ρ z ) σ 2 σ σ · x
The singularity manifold for variable x, resulting from d e t ( O 1 ) = 0 , translates to x = 0 and can be visualized in Figure 1. We used a similar approach as in [20] and considered the overlap of the Lorenz attractor with a band of ± 1 around x = 0 (similar to the discrete systems from the previous paper, where a ± 0.1 band was considered, in both cases, the values correspond to approx. 10% of the system’s support).
The singularity manifolds for the remaining two state variables can be calculated similarly as for x and the results are aligned with the ones obtained in [24].
Equations (13) and (14) mathematically describe the singularity areas for y and z and Figure 2 and Figure 3 depict them.
S O ¯ 2 = { ( x , y , z ) R 3 | d e t ( O 2 ) = = ρ ρ · β · x σ · y + 2 · x 2 y = 0 }
S O ¯ 3 = { ( x , y , z ) R 3 | d e t ( O 3 ) = = ρ σ y 2 x 2 = 0 }
The singularity results for the Lorenz system and the reference chaotic discrete systems from [20] are combined in Table 2.
From a singularity point of view, the Lorenz system has a mixed performance, being somehow in between the best and the worst systems analyzed (note: a small percentage of overlap means that the system is more observable than a bigger percentage). This conclusion could have been drawn from the observability coefficient values calculated above. The conclusion from [20] stands true for continuous chaotic systems as well: a high observability coefficient for a specific state variable translates into a high percentage of overlap between the singularity region and the attractor of the respective chaotic system.

3.3. Statistical Independence

The statistical independence for the Lorenz system was studied in detail in [27] and was based on work from [25,26,33].
The primary objective of this investigation was to determine the independence distance/time of the Lorenz chaotic system and assess the impact of sampling frequency on this independence. To achieve this, we followed a structured methodology.
Firstly, we generated 10,000 random initial conditions (x, y, and z) and solved the Lorenz equations for each set within a 0–100 s time frame, using various time steps. For instance, with a sampling frequency ( F S ) of 100 Hz, solutions were calculated at t = 0.01 s . This resulted in 10,000 spatial trajectories aligning with the Lorenz attractor.
We then applied the spatial Chi-Square independence test using data beyond the transient time. The variables X and Y were selected from the coordinates of s n and s n + d , respectively, with d representing the independence distance. This process was conducted for each of the three dimensions (x, y, and z), and the smallest d where all tests passed was identified as the independence distance.
Transient time, the period before the system stabilizes was evaluated and found to be around one second. Figure 4 shows that after one second, the probability density functions stabilized. Hence, we evaluated statistical independence after this transient period.
Data were collected at two seconds and subsequently in steps of 1 / F S until independence was reached according to the spatial Chi Square test. It was observed that the independence time was approximately three seconds regardless of the sampling frequency (10 Hz or 100 Hz). Figure 5a,b illustrate this, showing the independence test for the y dimension at different intervals. The scatter diagrams demonstrate the test’s failure at 0.5 s and success at 30 s.
Figure 6 depicts the independence time based on the start sampling moment. Results showed minimal variation for F S = 100 Hz and slightly more for F S = 10 Hz , yet they aligned closely. Empirical evidence indicates that the independence time for the Lorenz chaotic system is consistent across different sampling frequencies, with approximately 30 s ensuring statistical independence.
In summary, the independence time of the Lorenz system is unaffected by the sampling frequency, and a time difference of about 30 s ensures statistical independence.

4. Conclusions

The concluding section summarizes the primary findings of the research and reflects on their significance. We provide a concise overview of the study’s contributions, highlighting the enhanced understanding of chaotic systems and their application in cryptography. The conclusions also address potential future research directions, suggesting areas where additional studies could expand upon the insights gained from this work. This summary encapsulates the impact of our research and offers guidance for future investigations in the field.
This paper evaluates the Lorenz chaotic system from three perspectives: observability, singularity, and statistical independence, extending previous research in this field.
The Lorenz system, characterized by its sensitivity to initial conditions and chaotic behavior, was analyzed for its cryptographic properties. Observability was assessed by reconstructing the system’s phase space using its state variables. The observability coefficients for the Lorenz system were found to be comparable to the best results from other discrete chaotic systems like Clifford, Ikeda, and Tinkerbell, indicating its potential utility in cryptographic applications.
Singularity analysis was conducted to ensure the system remains observable across all states, which is crucial for maintaining robustness and security. The singularity manifolds, where observability is lost, were identified, highlighting the importance of choosing the appropriate state variables for cryptographic use.
Statistical independence was tested using the chi-square method to determine if the transformed datasets followed a Gaussian distribution, implying independence. The results confirmed that the original datasets derived from the Lorenz system were statistically independent, reinforcing their suitability for cryptographic purposes.
Overall, the holistic approach combining observability, singularity, and statistical independence provides a robust framework for evaluating the Lorenz system and other chaotic systems for cryptographic applications. Future research should explore further integration of these analyses to enhance the reliability and security of cryptographic methods based on chaotic systems.

Funding

This work was supported by National University of Science and Technology Politehnica Bucharest through the PubArt programme.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. Liao, T.-L.; Chen, H.-C.; Peng, C.-Y.; Hou, Y.-Y. Chaos-Based Secure Communications in Biomedical Information Application. Electronics 2021, 10, 359. [Google Scholar] [CrossRef]
  2. Taleby Ahvanooey, M.; Li, Q.; Hou, J.; Rajput, A.R.; Chen, Y. Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis. Entropy 2019, 21, 355. [Google Scholar] [CrossRef] [PubMed]
  3. Shukla, P.K.; Khare, A.; Rizvi, M.A.; Stalin, S.; Kumar, S. Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing. Entropy 2015, 17, 1387–1410. [Google Scholar] [CrossRef]
  4. Knežević, M.; Tomović, S.; Mihaljević, M.J. Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation. Electronics 2020, 9, 1296. [Google Scholar] [CrossRef]
  5. Hamida, E.B.; Noura, H.; Znaidi, W. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures. Electronics 2015, 4, 380–423. [Google Scholar] [CrossRef]
  6. Maurer, U.; Rüedlinger, A.; Tackmann, B. Confidentiality and Integrity: A Constructive Perspective. In Theory of Cryptography Conference; Springer: Berlin/Heidelberg, Germany, 2012; pp. 209–229. [Google Scholar]
  7. Vijayakumar, M.D.; Natiq, H.; Leutcho, G.D.; Rajagopal, K.; Jafari, S.; Hussain, I. Hidden and Self-Excited Collective Dynamics of a New Multistable Hyper-Jerk System with Unique Equilibrium. Int. J. Bifurc. Chaos 2022, 32, 2250063. [Google Scholar] [CrossRef]
  8. Perez-Padron, J.; Posadas-Castillo, C.; Paz-Perez, J.; Zambrano-Serrano, E.; Platas-Garza, M.A. Fpga realization and Lyapunov–Krasovskii analysis for a master-slave synchronization scheme involving chaotic systems and time-delay neural networks. Math. Probl. Eng. 2021, 2021, 2604874. [Google Scholar] [CrossRef]
  9. Jones, A.; Smith, B. Recent Advances in Chaotic Systems for Cryptography. J. Cryptogr. Res. 2023, 12, 45–60. [Google Scholar]
  10. Li, C.; Zhang, D. Hyperchaotic Systems and Their Applications in Secure Communications. Int. J. Inf. Secur. 2024, 18, 123–134. [Google Scholar]
  11. Wang, L.; Zhou, Y. Fractional-Order Chaotic Systems: A Comprehensive Review. IEEE Trans. Circuits Syst. 2023, 70, 1002–1014. [Google Scholar]
  12. Lee, M.; Kim, S. Optimizing Chaotic Maps for High-Performance Image Encryption. J. Appl. Math. 2024, 30, 15–28. [Google Scholar]
  13. Patel, R.; Kumar, N. Advances in Cryptographic Algorithms Based on Chaotic Systems. Cryptogr. Commun. 2023, 15, 500–515. [Google Scholar]
  14. Toktas, F.; Erkan, U.; Yetgin, Z. Cross-Channel Color Image Encryption via 2D Hyperchaotic Hybrid Map and Optimization Test Functions. Expert Syst. Appl. 2024, 249, 123583. [Google Scholar] [CrossRef]
  15. Kocak, O.; Erkan, U.; Toktas, A.; Gao, S. PSO-Based Image Encryption Scheme Using Modular Integrated Logistic Exponential Map. Expert Syst. Appl. 2024, 237 Pt A, 121452. [Google Scholar] [CrossRef]
  16. Feng, W.; Wang, Q.; Liu, H.; Ren, Y.; Zhang, J.; Zhang, S.; Qian, K.; Wen, H. Exploiting Newly Designed Fractional-Order 3D Lorenz Chaotic System and 2D Discrete Polynomial Hyper-Chaotic Map for High-Performance Multi-Image Encryption. Fractal Fract. 2023, 7, 887. [Google Scholar] [CrossRef]
  17. Feng, W.; Zhao, X.; Zhang, J.; Qin, Z.; Zhang, J.; He, Y. Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform. Mathematics 2022, 10, 2751. [Google Scholar] [CrossRef]
  18. Martínez, V.G.; Hernández-Álvarez, L.; Encinas, L.H. Analysis of the Cryptographic Tools for Blockchain and Bitcoin. Mathematics 2020, 8, 131. [Google Scholar] [CrossRef]
  19. Wang, L.; Cheng, H. Pseudo-Random Number Generator Based on Logistic Chaotic System. Entropy 2019, 21, 960. [Google Scholar] [CrossRef]
  20. Dinu, A.; Frunzete, M. Singularity, Observability and Statistical Independence in the Context of Chaotic Systems. Mathematics 2023, 11, 305. [Google Scholar] [CrossRef]
  21. Letellier, C.; Aguirre, L.A. Interplay between synchronization, observability, and dynamics. Phys. Rev. E Stat. Nonlin. Soft Matter Phys. 2010, 82 Pt 2, 016204. [Google Scholar] [CrossRef]
  22. Frunzete, M.; Barbot, J.P.; Letellier, C. Influence of the singular manifold of nonobservable states in reconstructing chaotic attractors. Phys. Rev. E 2012, 86, 026205. [Google Scholar] [CrossRef] [PubMed]
  23. Frunzete, M.; Luca, A.; Vlad, A.; Barbot, J.P. Observability and singularity in the context of rössler map. Univ. Politeh. Buchar. Sci. Bull. Ser. Appl. Math. Phys. 2012, 74, 83–92. [Google Scholar]
  24. Frunzete, M. Quality Evaluation for Reconstructing Chaotic Attractors. Mathematics 2022, 10, 4229. [Google Scholar] [CrossRef]
  25. Badea, B.; Vlad, A. Revealing statistical independence of two experimental data sets. In An Improvement on Spearman’s Algorithm, Lectures Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2006; Volume 3980 (ICCSA 2006), pp. 1166–1176. ISSN 0302-9743. [Google Scholar]
  26. Vaduva, A.; Vlad, A.; Badea, B. Evaluating the performance of a test-method for statistical independence decision in the context of chaotic signals. In Proceedings of the 2016 International Conference on Communications (COMM), Bucharest, Romania, 9–11 June 2016; pp. 417–422. [Google Scholar] [CrossRef]
  27. Dinu, A.; Frunzete, M. The Lorenz chaotic system, statistical independence and sampling frequency. In Proceedings of the 2021 International Symposium on Signals, Circuits and Systems (ISSCS), Iasi, Romania, 15–16 July 202; pp. 1–4. [CrossRef]
  28. Goodson, R.; Klein, R. A definition and some results for distributed system observability. IEEE Trans. Autom. Control 1970, 15, 165–174. [Google Scholar] [CrossRef]
  29. Hermann, R.; Krener, A. Nonlinear controllability and observability. IEEE Trans. Autom. Control 1977, 22, 728–740. [Google Scholar] [CrossRef]
  30. Diop, R.S.; Fliess, M. Nonlinear observability, identifiability, and persistent trajectories. In Proceedings of the 30th IEEE Conference on Decision and Control, Brighton, UK, 11–13 December 1991; pp. 714–719. [Google Scholar]
  31. Frunzete, M.; Cucu, H. Observability coefficient for 2D dynamical systems. In Proceedings of the 2017 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA), Poznan, Poland, 20–22 September 2017; pp. 292–295. [Google Scholar] [CrossRef]
  32. Walpole, R.E.; Myers, R.H. Probability and Statistics for Engineers and Scientists, 4th ed.; MacMillan Publishing: New York, NY, USA, 1989. [Google Scholar]
  33. Dinu, A.; Vlad, A. The compound tent map and the connection between Gray codes and the initial condition recovery. UPB Sci. Bull. Ser. A Appl. Math. Phys 2014, 76, 17–28. Available online: https://www.scientificbulletin.upb.ro/rev_docs_arhiva/full72a_882955.pdf (accessed on 20 July 2024).
Figure 1. Singularity areas for the Lorenz system−x state variable.
Figure 1. Singularity areas for the Lorenz system−x state variable.
Mathematics 12 02798 g001
Figure 2. Singularity areas for the Lorenz system−y state variable.
Figure 2. Singularity areas for the Lorenz system−y state variable.
Mathematics 12 02798 g002
Figure 3. Singularity areas for the Lorenz system—z state variable.
Figure 3. Singularity areas for the Lorenz system—z state variable.
Mathematics 12 02798 g003
Figure 4. Transient time visualization.
Figure 4. Transient time visualization.
Mathematics 12 02798 g004
Figure 5. Scatter diagram U-V—dimension y.
Figure 5. Scatter diagram U-V—dimension y.
Mathematics 12 02798 g005
Figure 6. Independence time variation for F S = 100 Hz (top) and F S = 10 Hz (bottom).
Figure 6. Independence time variation for F S = 100 Hz (top) and F S = 10 Hz (bottom).
Mathematics 12 02798 g006
Table 1. Observability coefficients per state variable and chaotic system analyzed.
Table 1. Observability coefficients per state variable and chaotic system analyzed.
Chaotic System η 1 Observability Coefficient η 2 Observability Coefficient η 3 Observability Coefficient
Clifford (discrete)0.540.54Not Applicable (NA)
Ikeda (discrete)0.170.17NA
Tinkerbell (discrete)0.440.88NA
Lorenz (continuous)0.880.270.32
Table 2. Overlap percentage between attractor and singularity areas for each chaotic system analyzed.
Table 2. Overlap percentage between attractor and singularity areas for each chaotic system analyzed.
Chaotic SystemOverlap Attractor and S O ¯ 1 Overlap Attractor and S O ¯ 2 Overlap Attractor and S O ¯ 3
Clifford (discrete)12.26%22.02NA%
Ikeda (discrete)0%0.41NA%
Tinkerbell (discrete)2.84%4.83NA%
Lorenz (continuous)11.84%3.043.50%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Dinu, A. Singularity, Observability, and Independence: Unveiling Lorenz’s Cryptographic Potential. Mathematics 2024, 12, 2798. https://doi.org/10.3390/math12182798

AMA Style

Dinu A. Singularity, Observability, and Independence: Unveiling Lorenz’s Cryptographic Potential. Mathematics. 2024; 12(18):2798. https://doi.org/10.3390/math12182798

Chicago/Turabian Style

Dinu, Alexandru. 2024. "Singularity, Observability, and Independence: Unveiling Lorenz’s Cryptographic Potential" Mathematics 12, no. 18: 2798. https://doi.org/10.3390/math12182798

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop