Next Article in Journal
Level Operators over Intuitionistic Fuzzy Index Matrices
Previous Article in Journal
Mixed Convection Flow of Powell–Eyring Nanofluid near a Stagnation Point along a Vertical Stretching Sheet
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Construction of a Class of High-Dimensional Discrete Chaotic Systems

Mathematics and Physics School, University of Science and Technology Beijing, Beijing 100083, China
*
Author to whom correspondence should be addressed.
Mathematics 2021, 9(4), 365; https://doi.org/10.3390/math9040365
Submission received: 18 January 2021 / Revised: 5 February 2021 / Accepted: 8 February 2021 / Published: 11 February 2021
(This article belongs to the Section Dynamical Systems)

Abstract

:
In this paper, a class of n-dimensional discrete chaotic systems with modular operations is studied. Sufficient conditions for transforming this kind of discrete mapping into a chaotic mapping are given, and they are proven by the Marotto theorem. Furthermore, several special systems satisfying the criterion are given, the basic dynamic properties of the solution, such as the trace diagram and Lyapunov exponent spectrum, are analyzed, and the correctness of the chaos criterion is verified by numerical simulations.

1. Introduction

Chaotic systems are mainly characterized by their sensitivity to initial values and system parameters, local instability, boundedness, ergodicity, unpredictability and the fractal structure of their chaotic orbits. As a complex nonlinear dynamical system and due to its significant dynamic characteristics, chaos has become a new research hotspot and has been widely used in secure communications and other research fields [1,2,3]. With the wide application of chaotic systems in secure communications, the structures of chaotic system problems have attracted increasing attention from scholars [4,5,6], and a new chaotic system can provide a new pseudorandom number generator, which can be further applied to the design of cryptosystems [4,6,7,8]. Continuous system discretization is needed for actual use cases, and the direct use of discrete chaos is a very good choice. There are some commonly used chaos criteria for determining whether there is chaos in a discrete dynamical system. For the determination of chaos of a discrete mapping, Li–Yorke proposed three periodic chaos implication theorems; namely, the three periodic theorems [9]: the Marotto chaos determination theorem [10] and its improved Marotto theorem [11], heteroclinic repellent theory [12], and coupled expansion theory [13]. One-dimensional chaotic systems, such as logistic mappings, have the characteristics of simple structures and good performance, and they are one of the most widely used chaotic system types [14,15]. A logistic mapping has a quadratic polynomial form. In reference [4], a judgment theorem for a special cubic polynomial chaotic system was proposed, and the proof was given by using the periodic three theorem. In reference [6], a class of four-dimensional discrete chaotic systems without an equilibrium point was proposed, the sufficient conditions for this kind of systems to have no equilibrium point are given and the conclusion drawn that the maximum Lyapunov exponent of a given system is positive. In addition to the direct use of the discrimination theorem and the above method for verifying that the maximum Lyapunov exponent of a system is positive, there is also an indirect method for proving the chaos property of a system by using its topological conjugate relationship with a known chaotic system, such as the method proposed by reference [16].
In the study of chaos control, reference [17] proposed the Chen–Lai algorithm by considering the following one-dimensional mapping:
x k + 1 = f ( x k ) + ( N + e c ) x k ( mod 1 )
The problem by which a system can become a chaotic system under the control of the linear control term “ ( N + e c ) x k ” was studied. In reference [18], the linear control term of the Chen–Lai algorithm was not considered; only systems of the structural form x k + 1 = f ( x k ) ( mod 1 ) were analyzed. The authors proposed sufficient conditions for this form to be a chaotic map, provided the corresponding discrimination theorem, and proved the existence of chaos in the sense of Li–Yorke by using the snap-back repeller and the Marotto chaos criterion. Reference [19] used a continuous sawtooth function instead of a modular function to complete the iterative process.
In general, in the process of designing chaotic cryptosystems, high-dimensional systems have attracted increasing interest from researchers because of their highly complex dynamic properties, but the constructions and theoretical proofs of high-dimensional discrete chaotic systems are always difficult. Most of the existing high-dimensional discrete chaotic systems are designed based on the necessary conditions of the chaotic systems, such as having a positive Laypunov exponent [5,6,7]. According to the Marotto theorem, sufficient conditions that an n-dimensional discrete system is a chaotic system can be given.
This article does not consider the Chen–Lai algorithm for linear control and only considers a high-dimensional modular system, such as
x k + 1 = g ( x k ) mod 1 ,
where
x k = ( x 1 , x 2 , , x n ) T , g ( x k ) = ( g 1 ( x k ) , g 2 ( x k ) , , g n ( x k ) ) T .  
In view of two cases where g ( x k ) is a high-dimensional linear system and a high-dimensional polynomial system, the determination theorems for the chaotic properties of these two systems are presented, and their chaotic properties in the Li–Yorke sense are proven via the snap-back repeller and the Marotto chaos theorem.
The structure of this paper is as follows: Section 2 gives some necessary concepts and lemmas; Section 3 provides the discriminant theorem for a high-dimensional discrete chaotic system and proves it; Section 4 gives examples and conducts a numerical simulation according to the theory in Section 3; and Section 5 is the conclusion of this paper.

2. Basic Concepts and Lemmas

To study the theoretical structure of high-dimensional discrete chaos, some concepts are agreed, and some lemmas are given.

2.1. Matrix Theoretical Analysis

Definition 1
[19].Let A = ( a i j ) be a complex matrix of order n; if it satisfies
| a i i | j = 1 , j i n | a i j | ( i = 1 , 2 , , n ) ,
matrixAis labelled row diagonally dominant. If the above inequality is strict, that is,
| a i i | > j = 1 , j i n | a i j | ( i = 1 , 2 , , n ) ,
matrixAis labelled strictly row diagonally dominant. Similarly, you can define a column diagonally dominant matrix. Hereafter, a row diagonally dominant matrix is referred to as a diagonally dominant matrix or a strictly diagonally dominant matrix (unless otherwise specified, the following diagonally dominant matrices are row diagonally dominant matrices).
Definition 2.
Let A = ( a i j ) be a complex matrix of order n; if it satisfies
| a i i | j = 1 , j i n | a i j | > 1 ( i = 1 , 2 , , n ) ,
matrix A = ( a i j ) is labelled over-one diagonally dominant. If the above inequality is strict, that is,
| a i i | j = 1 , j i n | a i j | > 1 ( i = 1 , 2 , , n ) ,
then matrix A is labelled strictly over-one diagonally dominant.
For an over-one diagonally dominant matrix and a strictly over-one diagonally dominant matrix, there are some properties as follows. First, from definitions 1 and 2, it can be seen that an over-1 diagonally dominant matrix must be a diagonally dominant matrix. Additionally, a diagonally dominant matrix must be an invertible matrix [20], so if there has ever been a diagonally dominant matrix, it must have been a reversible matrix; see Lemma 1 below.
Lemma 1.
If A = ( a i j ) is diagonally dominant, it is an invertible matrix.
For a strictly over-one diagonally dominant matrix, Lemma 2 follows.
Lemma 2.
For A = ( a i j ) n × n , a i i > 0 ( i = 1 , 2 , , n ) , ifAis a strictly over-one diagonally dominant matrix, then there exists N R that satisfies A = B + N I (Iis the identity matrix), where matrixBis a diagonally dominant matrix that satisfies N B > 1 .
Proof of Lemma 2.
Since A is a strictly over-one diagonally dominant matrix, it is clear that A is a strictly diagonally dominant matrix that satisfies | a i i | > j = 1 , j i n | a i j | ( i = 1 , 2 , , n ) .
Let us set B = ( b i j ) n × n ; then, it is easy to see that b i j = a i j ( i j ) according to A = B + N I , b i i = a i i N ( i = 1 , 2 , , n ) ; for B to be a diagonally dominant matrix, we need that
| a i i N | = | b i i | j = 1 , j i n | b i j | = j = 1 , j i n | a i j | ( i = 1 , 2 , , n ) ,
when N = A , we know that
| b i i | = | a i i N | = | a i i A | = A a i i = max 1 i n j = 1 n | a i j | | a i i | j = 1 , j i n | a i j | = j = 1 , j i n | b i j | ,
so B is now a diagonally dominant matrix.
Then, let us prove that N B > 1 when N = A .
Because A is a strictly over-one diagonally dominant matrix, we have
| a i i | j = 1 , j i n | a i j | > 1 ( i = 1 , 2 , , n ) | a i i | > j = 1 , j i n | a i j | + 1 ,
so we can conclude that
N = A a i i + a i i = A | a i i | + | a i i | > A | a i i | + j = 1 , j i n | a i j | + 1 = | b i i | + j = 1 , j i n | a i j | + 1 = | b i i | + j = 1 , j i n | b i j | + 1 ( i = 1 , 2 , , n ) .
Formula (1) holds for any i, while
B = max 1 i n j = 1 n | b i j | = max 1 i n ( | b i i | + j = 1 , j i n | b i j | ) ,
that is, N > B + 1 N B > 1 . The proof is completed. □
Lemma 3.
For A = ( a i j ) n × n and a i i > 0 ( i = 1 , 2 , , n ) , if A is a strictly over-one diagonally dominant matrix, then A 1 < 1 .
Proof of Lemma 3.
If A is a strictly over-one diagonally dominant matrix, then A is a strictly diagonally dominant matrix. According to Lemma 1, A 1 exists. From Lemma 2, we know that there exists N R that satisfies A = B + N I ( N = A ) , and we can conclude that
A 1 = ( B + N I ) 1 = ( N ( B N 1 + I ) ) 1 = N 1 ( B N 1 + I ) 1 .
Let us expand the left-hand side of the identity according to ( B N 1 + I ) ( B N 1 + I ) 1 = I ; we conclude that
B N 1 ( B N 1 + I ) 1 + ( B N 1 + I ) 1 = I
( B N 1 + I ) 1 = I B N 1 ( B N 1 + I ) 1 .
Taking the infinite norm of both sides of the above equation and according to the formula A B A + B , A B A B implies that
( B N 1 + I ) 1 = I B N 1 ( B N 1 + I ) 1
I + B N 1 ( B N 1 + I ) 1
1 + B N 1 ( B N 1 + I ) 1 .
If we rearrange the formula, we obtain
( 1 B N 1 ) ( B N 1 + I ) 1 1 .
Because
1 B N 1 = 1 N 1 B = N 1 ( N B ) ,
we know from Lemma 2 that
N B > 1 .
Thus, we have
1 B N 1 > N 1 > 0 .
Therefore, the above formula implies that ( B N 1 + I ) 1 1 1 B N 1 , so we can obtain that
A 1 = N 1 ( B N 1 + I ) 1 = N 1 ( B N 1 + I ) 1 N 1 1 1 B N 1 = 1 N B < 1 .
The proof is completed. □
Lemma 4
[20]. Let A = ( a i j ) n × n C n × n be any complex matrix of order n ; then, the eigenvalues of A fall into the union of n disks of | z a i i | R i = j i , j = 1 n | a i j | ( i = 1 , 2 , , n ) on the complex plane, and we call R i the radius of the disk. The disk is called the Gerschgorin disk, or the gale circle for short.
Lemma 5.
For A = ( a i j ) n × n , if A is a strictly over-one diagonally dominant matrix, the moduli of all eigenvalues corresponding to A are greater than one.
Proof of Lemma 5.
According to Lemma 4, the eigenvalues of A fall into the union of n disks of | z a i i | R i = j i , j = 1 n | a i j | ( i = 1 , 2 , , n ) on the complex plane, where z represents an eigenvalue. If we expand the above equation, we obtain that
a i i j i , j = 1 n | a i j | z a i i + j i , j = 1 n | a i j | ( i = 1 , 2 , , n ) .
Because A is a strictly over-one diagonally dominant matrix,
| a i i | j = 1 , j i n | a i j | > 1 ( i = 1 , 2 , , n ) .
  • If a i i > 0 , let a i i = j i , j = 1 n | a i j | + 1 + m ( m > 0 ) ; then, a i i - j i , j = 1 n | a i j | = m + 1 z ; namely,
    | z | m + 1 = | | a i i | - j i , j = 1 n | a i j | | > 1 .
  • If a i i < 0 , let a i i = j i , j = 1 n | a i j | 1 m ( m > 0 ) ; then, z a i i + j i , j = 1 n | a i j | - m - 1 ; namely,
    | z | m + 1 = | | a i i | - j i , j = 1 n | a i j | | > 1 .
In conclusion, | z | | | a i i | j i , j = 1 n | a i j | | > 1 ; therefore, the magnitudes of all the eigenvalues corresponding to A are greater than one. The proof is completed. □

2.2. Overview of Multivariate Polynomials

Definition 3.
Let F be a numerical field, where x 1 , x 2 , , x n are n independent undetermined elements. a x 1 k 1 x 2 k 2 x n k n , a F , k 1 , k 2 , , k n N is a monomial with respect to the undetermined elements x 1 , x 2 , , x n and k i is called the degree of the indeterminate element x i in the monomial, where i = 1 , 2 , , n . k 1 + k 2 + + k n is called the degree of this monomial, and we call that the sum of n-ary monomials. k 1 , k 2 , , k n a k 1 , k 2 , , k n x 1 k 1 x 2 k 2 x n k n are n-ary polynomials or polynomials for short.

2.3. Marotto Theorem

The following is the definition of the snap-back repeller in the dynamical system and Marotto theorem.
Definition 4
[10] (snap-back repeller).Note that B r ( x * ) is a closed sphere whose center is the point x * and whose radius is r . Assume that the fixed point x * of a differentiable mapping g in R n satisfies the following conditions:
  • There is a real number r > 0 such that the moduli of all eigenvalues of the Jacobian matrix D g ( x ) of any point x in B r ( x * ) are greater than 1.
  • There is a point x 0 x * in B r ( x * ) and a natural number m 2 that yield g m ( x 0 ) = x * , and point x 0 is nondegenerate, that is, det { D g m ( x 0 ) } 0 .
Then, we call the fixed point x * a snap-back repeller of mapping g .
On the basis of the definition of a snap-back repeller, we have the following Marotto theorem.
Lemma 6
[10] (Marotto theorem). If an n-dimensional differentiable mapping g : R n R n has a snap-back repeller, mapping g has chaotic properties in the Li–Yorke sense.
Based on some concepts and lemmas given in this section, the decision theorem of high-dimensional discrete chaos is given below.

3. Construction of High-Dimensional Linear Chaos Theory

The n-dimensional discrete system is expressed as x k + 1 = g ( x k ) ( mod 1 ) . The following discussion is provided for the cases in which g ( x k ) is a linear system and a multinomial system.

3.1. g ( x k ) is a Linear System

For the case where g ( x k ) is a linear system, the following theorem is given.
Theorem 1.
Consider the high-dimensional discrete dynamics equation
x k + 1 = A x k ( mod 1 ) ,
where x k R n , A = ( a i j ) n x n if element a i i > 0 ( i = 1 , 2 , , n ) in A , and A is a strictly over-one diagonally dominant matrix. Then, system (2) is chaotic in the sense of Li–Yorke.
Proof of Theorem 1.
Let f ( x ) = A x , g ( x ) = A x ( mod 1 ) . It is easy to see that when x * ( 0 , 0 , , 0 ) T = 0 R n , f ( 0 ) = 0 , g ( 0 ) = 0 , so 0 is the fixed point of g ( x ) , and we only need to prove that x * = 0 is the snap-back repeller.
Because A is a strictly over-one diagonally dominant matrix, we know from Lemma 1 that A 1 exists. Let b = ( 1 , 1 , , 1 ) T R n and select x 0 = A 1 A 1 b ; Lemma 3 tells us that
x 0 = A 1 A 1 b A 1 2 b < b = 1 .
If we substitute this back into the original system, we obtain that
{ x 1 = g ( x 0 ) = A A 1 A 1 b ( mod 1 ) = A 1 b x 2 = g ( x 1 ) = A A 1 b ( mod 1 ) = 0 = x * .
We know from Lemma 3 that
x 1 = A 1 b A 1 b < b = 1 .
From this, we know that g m ( x 0 ) = x * , where m = 2 and the fixed point g ( x ) satisfies the following conditions:
(1)
Select r ( x 0 , x 1 ) to satisfy x 0 B r ( x * ) , such that B r ( x * ) becomes the exclusion domain including x * . The Jacobian matrix D g ( x ) at any point in B r ( x * ) is D g ( x ) = A , from which A is a strictly over-one diagonally dominant matrix. According to Lemma 5, it is known that the moduli of the eigenvalues of D g ( x ) are greater than one.
(2)
There exists x 0 = A 1 A 1 b x * in B r ( x * ) and the natural number m = 2 such that g m ( x 0 ) = x * , and since det { D g 2 ( x 0 ) } = det { D g ( x 0 ) } det { D g ( x 1 ) } = det A det A 0 , we know that x 0 is nondegenerate. In summary, we know that x * = 0 is a snap-back repeller. The proof is completed. □

3.2. g ( x k ) is a Multinomial System

In view of the fact that g ( x k ) is a multinomial system, the following theorems are given.
Theorem 2.
Consider an n-dimensional discrete nonlinear control system:
x k + 1 = g ( x k ) ( mod 1 ) ,  
in the above formula, x k = ( x 1 , x 2 , x n ) T R n , and g ( x k ) = ( g 1 ( x k ) , g 2 ( x k ) , , g n ( x k ) ) T , where g ( x k ) is a polynomial system of many variables that is described as
g i ( x k ) = g i ( x 1 , x 2 , x n ) = k i , k 1 , k 2 , k n a k i , k 1 , , k n i x i k i x 1 k 1 x 2 k 2 x i 1 k i 1 x i + 1 k i + 1 x n k n .
a k i , k 1 , , k n i R ( i = 1 , 2 , , n ) for k 1 , k 2 , , k n N (with at least one k j 0 and j = 1 , 2 , , n ). Assume g ( x k ) satisfies the following conditions for all x Ω { x R n | x < 1 } :
Record b i j as the sum of the absolute values of all the coefficients and constant terms of g i ( x k ) x j ; b i j = { b i j , i j b i j a 1 , 0 , , 0 i , i = j ; N M = max 1 i n ( j = 1 n b i j ) ; N m = min 1 i n ( j = 1 n b i j ) . This satisfies a 1 , 0 , , 0 i 2 j i , j = 1 n b i j > 1 ( i , j = 1 , 2 , , n ) and N M 1 , N M N m < 1 2 . Then, system (3) is chaotic in the sense of Li–Yorke.
Proof of Theorem 2.
It is easy to see that when x * ( 0 , 0 , , 0 ) T = 0 R n , g ( 0 ) = 0 is obtained. Therefore, x * = 0 is the fixed point of g ( x ) . One only needs to prove that x * = 0 is the snap-back repeller. Let σ i = a 1 , 0 , , 0 i = N m + η i ( η i > N m + 1 , i = 1 , 2 , , n ) , where η m = min ( η 1 , η 2 , , η n ) , η M = max ( η 1 , η 2 , , η n ) , and g ( x k ) is written as follows:
g ( x k ) = f ( x k ) + ( ( N m + η 1 ) x 1 , ( N m + η 2 ) x 2 , , ( N m + η n ) x n ) T , = ( g 1 ( x k ) , g 2 ( x k ) , , g n ( x k ) ) T
where
g i ( x k ) = f i ( x k ) + ( N m + η i ) x i ( i = 1 , 2 , , n ) .  
f i ( x k ) is obviously a multivariate polynomial system:
D ( f ( x ) ) < N M ( x Ω ) , b = ( 1 , 1 , , 1 ) T R n .
Next, let us prove that there is a point y ( 0 < y < 1 2 η M + N M 1 b ) such that g 2 ( y ) mod 1 = 0 .
Step 1. We first prove that there is a point z ( 1 2 η M + N M 1 b < z < 1 3 N m + 1 b ) such that g ( z ) mod 1 = 0 , where z = ( z 1 , z 2 , , z n ) T . This is equivalent to
( f ( z ) + ( ( N m + η 1 ) z 1 , ( N m + η 2 ) z 2 , , ( N m + η n ) z n ) T ) mod 1 = 0 .
The following step is used to prove that there exists a point z ( 1 2 η M + N M 1 b < z < 1 3 N m + 1 b ) such that
( f ( z ) + ( ( N m + η 1 ) z 1 , ( N m + η 2 ) z 2 , , ( N m + η n ) z n ) T ) b = 0 .
Two functions are defined for this purpose:
h ( x ) f ( x ) + ( ( N m + η 1 ) x 1 , ( N m + η 2 ) x 2 , , ( N m + η n ) x n ) T b   and
ϕ ( x ) = max { 0 , x h ( x ) } = [ max { 0 , x 1 h 1 ( x ) } , , max { 0 , x n h n ( x ) } ] T ,
where x = [ x 1 , x 2 , , x n ] T . Let ρ 1 η m + N m N M ; because η m > N m + 1 and it is known from the conditions that N M 1 , N M N m < 1 2 , we can obtain that
η m + N m N M > 2 N m + 1 N M > 2 ( N M 1 2 ) + 1 N M = N M 1 .
Thus, ρ ( 0 , 1 ] . Because f ( x ) is bounded for any bounded x , there exists a number τρ > 0 such that
ϕ ( x ) Ω τ { x R n | x 0 , x τ }
for any x Ω ρ { x R n | x 0 , x ρ } .
Define a scalar function as follows:
λ ( x ) = { 1 , x Ω ρ ; min x i > ρ ( ρ x i ) , x Ω τ \ Ω ρ .
Let
r ( x ) = λ ( x ) x ,   ϕ ¯ ( x ) ϕ ( r ( x ) ) .
According to the above formula, we can infer that r ( x ) Ω ρ and ϕ ¯ ( x ) Ω τ for any x Ω τ . Additionally, ϕ ¯ ( x ) is continuous on Ω τ . According to the Brouwer fixed-point theorem in functional analysis, there exists a point z Ω τ such that z = ϕ ¯ ( z ) , and this is equivalent to
z = ϕ ( r ( z ) ) = max { 0 , r ( z ) h ( r ( z ) ) } .
Let us consider the value range of z . If z Ω ρ , then there is a parameter i ( 1 i n ) such that
ρ < z i = z M = max ( z 1 , z 2 , , z n ) = z τ ,
where z = ( z 1 , z 2 , , z n ) T . r ( z ) Ω ρ and as a result, r ( z ) ρ 1 . Because
D ( f ( x ) ) < N M ( x Ω ) ,   | f i ( r ( z ) ) | D ( f ( x ) ) r ( z ) < N M ρ ,
we can conclude that N M ρ < f i ( r ( z ) ) < N M ρ , so the following inequality can be obtained:
h i ( r ( z ) ) f i ( r ( z ) ) + ( N m + η i ) r i ( z ) 1 > N M ρ + ( N m + η m ) ρ 1 = ( N m N M + η m ) ρ 1 = ( N m N M + η m ) 1 N m N M + η m 1 = 0
Therefore, from z M > max { 0 , r i ( z ) h i ( r ( z ) ) } , which is in contradiction with Equation (7), we can draw the conclusion that z Ω ρ , so λ ( z ) = 1 , r ( z ) = λ ( z ) z = z , and (7) is transformed into
z = max { 0 , z h ( z ) } .
Next, let us consider the range of h ( z ) ; if h ( z ) < 0 , then z < z h ( z ) , which contradicts Formula (8), so we can obtain that h ( z ) 0 . Note that (8) also means that
z T z = z T z z T h ( z ) z T h ( z ) = 0 .
Now let us prove that every component of z is nonzero. Because z ρ , we can obtain that
f ( z ) < N M z N M ρ = N M η m + N m N M ,
where η m > N m + 1 , and it is known from the above conditions that N M N m < 1 2 , so we can obtain that
η m + N m N M > 2 N m + 1 N M > 2 ( N M 1 2 ) + 1 N M = N M
that is, f ( z ) < 1 . If there is a parameter i , 1 i n such that z i = 0 , then
h i ( z ) = f i ( z ) + ( N m + η i ) z i 1 = f i ( z ) 1 < 0 .
Therefore,
z i = 0 < h i ( z ) = max { 0 , z i h i ( z ) } .
This inequality itself contradicts Formula (8). Thus, point z must satisfy 0 < z ρ b . From Equation (9), we can deduce the following equation:
h ( z ) f ( z ) + ( ( N m + η 1 ) z 1 , ( N m + η 2 ) z 2 , , ( N m + η n ) z n ) T b = 0 .
We can infer from Equation (10) that
1 2 η M + N M 1 b < 1 η m + N M + N m b < z < 1 η m + 2 N m b < 1 3 N m + 1 b .
It can be concluded that there exists a point z such that
g ( z ) = b g ( z ) mod 1 = 0 .
Step 2. Next, we prove that there exists a point y ( 0 < y < 1 2 η M + N M 1 b ) such that
g ( y ) mod 1 = z .
Instead of using ρ in step 1 as ρ ¯ , let ρ ¯ ρ 2 ; then, two functions are defined as follows:
h ¯ ( x ) f ( x ) + ( ( N m + η 1 ) x 1 , ( N m + η 2 ) x 2 , , ( N m + η n ) x n ) T z   and
ϕ ¯ ( x ) = max { 0 , x h ¯ ( x ) }
= [ max { 0 , x 1 h ¯ 1 ( x ) } , , max { 0 , x n h ¯ n ( x ) } ] T ,
where x = ( x 1 , x 2 , , x n ) T . Similar to step 1, it can be concluded that
h ¯ ( y ) f ( y ) + ( ( N m + η 1 ) y 1 , ( N m + η 2 ) y 2 , , ( N m + η n ) y n ) T z = 0
that is,
g ( y ) mod 1 = z .
According to Equations (11) and (12), there exists a point y ( 0 < y < 1 2 η M + N M 1 b ) such that after two iterations, we can obtain that g 2 ( y ) = 0 and that the fixed point x * = 0 of g satisfies the following conditions:
(1)
Let γ satisfy y < γ < 1 2 η M + N M 1 b , and define the closed sphere
y B γ { x R n | x γ } . According to the above condition, the Jacobian matrix D g ( x ) of any point x in B γ ( x * ) is a strictly over-one diagonally dominant matrix. Therefore, according to Lemma 5, the modulus of the eigenvalue of any point of D g ( x ) is greater than one.
(2)
There exists y R n in B r ( x * ) and a natural number m = 2 that satisfy g 2 ( y ) = x * , where the components of y satisfy y i ( 0 , z i ) . Because
det { D g 2 ( y ) } = det { D g ( y ) } det { D g ( z ) } 0 ,
we know that y is nondegenerate.
In conclusion, we know that x * = 0 is a snap-back repeller. The proof is completed. Then, the modular polynomial operation system (3) is chaotic in the sense of Li–Yorke. □

4. Numerical Simulation

4.1. Numerical Simulation of System (2)

In system (2), set matrix A to be
A = ( a 0.18 0.35 0.39 a 0.21 0.13 0.55 a ) ,
where a is the system parameter and x k = ( x , y , z ) T . When we choose a = 2 , we obtain that
{ 2 ( 0.18 + 0.35 ) > 1 2 ( 0.39 + 0.21 ) > 1 2 ( 0.13 + 0.55 ) > 1 ,
that is, matrix A is strictly over-1 diagonally dominant. Therefore, according to theorem 1, system (2) represents chaos.
MATLAB is used to simulate system (2). The following parameters are selected: a = 2 , x 0 = 0.15 , y 0 = 0.21 , z 0 = 0.32 . The phase diagram distribution is shown in Figure 1.
Figure 2 describes the Lyapunov exponential graph of system (2) as it varies with the parameters when the initial values are x 0 = 0.15 , y 0 = 0.21 , and z 0 = 0.32 . It can be seen from the graph that when parameter a satisfies the condition a > 1.68 from the above theorem, the three Lyapunov exponents of the system are positive.
Figure 3 shows the sensitivity of system (2) to the initial conditions x 0 = 0.15 , y 0 = 0.21 , and z 0 = 0.32 and the system parameter a = 2 . The parameters and initial conditions are perturbed by 10−10. In Figure 3a,c, it can be found that the orbit produced by the small change in the initial value is obviously different, while the differences between the two orbits before and after the perturbation are shown in Figure 3b,d, respectively.
Figure 4 describes the bifurcation diagram of each component of system (2) with its parameters when x 0 = 0.15 , y 0 = 0.21 , and z 0 = 0.32 .
The following is a numerical simulation of a five-dimensional system such that
A = ( a 0.15 0.12 0.23 0.05 0.13 a 0.14 0.17 0.24 0.25 0.13 a 0.16 0.23 0.27 0.14 0.1 a 0.08 0.15 0.17 0.19 0.3 a )
in system (2), where a is the system parameter and x k = ( m , n , x , y , z ) T . When we choose a = 2 , we obtain that
{ 2 ( 0.15 + 0.12 + 0.23 + 0.05 ) > 1 2 ( 0.13 + 0.14 + 0.17 + 0.24 ) > 1 2 ( 0.25 + 0.13 + 0.16 + 0.23 ) > 1 2 ( 0.27 + 0.14 + 0.1 + 0.08 ) > 1 2 ( 0.15 + 0.17 + 0.19 + 0.3 ) > 1 .
Therefore, matrix A is strictly over-1 diagonally dominant. According to theorem 1, the system is chaotic.
MATLAB is used to simulate system (2). The parameters selected are as follows: a = 2 , m 0 = 0.1 , n 0 = 0.2 , x 0 = 0.3 , y 0 = 0.15 , and z 0 = 0.2 . The phase diagram distribution is shown in Figure 5; Figure 6 describes the exponential graph of system (2) as it varies with the parameters when the initial value is given. It can be seen from the graph that when the parameter a satisfies the condition a > 1.81 from the above theorem, the three exponents of the system are positive. Figure 7 shows the sensitivity of system (2) to the given initial conditions and the system parameter a = 2 . The parameters and initial conditions are perturbed by 10−10. In Figure 7a,c, it can be found that the orbit produced by the small change in the initial value is obviously different, while the differences between the two orbits before and after perturbation are shown in Figure 7b,d, respectively. Figure 8 describes the bifurcation diagram of each component of system (2) with the parameter a when the initial conditions are given.

4.2. Numerical Simulation of System (3)

When the original mapping is high dimensional and nonlinear, consider that g ( x ) in system (3) is
g ( x ) = ( 0.23 x 2 + a x + 0.15 y z 0.1 y 2 0.25 x y 0.1 x + a y + 0.3 z 2 0.15 x y + 0.2 z 2 0.1 x z + a z ) ,
where a is the system parameter. We can compute that
D g ( x ) = ( 0.46 x + a 0.15 z 0.2 y 0.15 y 0.25 y 0.1 0.25 x + a 0.6 z 0.15 y 0.1 z 0.15 x 0.4 z 0.1 x + a ) .
Then, when the parameter a = 4 is selected, it is easy to see that D g ( x ) satisfies the conditions in theorem 2; at this time, the Lyapunov indices are LE1 = 1.3673, LE2 = 1.4299, and LE3 = 1.4789, so it can be concluded that system (3) is chaotic.
MATLAB is used to simulate the system (3). The parameters selected are as follows: a = 4 , x 0 = 0.25 , y 0 = 0.3 , and z 0 = 0.4 . The phase diagram distribution is shown in Figure 9. The exponential Lyapunov diagram of system (3) as it varies with the parameter a is shown in Figure 10, and the sensitive schematic diagram of 10−10 perturbations to parameter a and the initial condition x 0 is shown in Figure 11. In Figure 11a,c, it can be found that the orbits produced by small changes in the initial values and parameters are significantly different, while Figure 11b,d show the differences between the two orbits before and after the perturbation. The bifurcation diagram of each component of system (3) as it varies with parameter a is shown in Figure 12.

5. Conclusions of this Paper

In this paper, sufficient conditions for transforming a class of high-dimensional discrete systems into chaotic systems based on modular operations are given, and the proofs are given by the Marotto theorem. Based on the above conditions, two kinds of systems with high-dimensional linear modular operations and high-dimensional polynomial modular operations are constructed, and the given chaotic systems are numerically simulated. The phase diagram distributions, the Lyapunov exponent spectra, the sensitivities to the chosen initial values and the chaotic bifurcation diagrams of these systems are analyzed. It is concluded that the discrete systems we constructed have chaotic dynamics characteristics, thereby verifying the correctness of the proposed theory.
The advantages of designing cryptosystems based on the chaotic systems constructed in this paper are as follows: (1) the dimension of the systems can be any positive integer n. An accepted view is that compared with the low-dimensional chaotic systems; high-dimensional chaotic systems have more complex dynamic behavior and can produce better random sequences for the design of cryptosystems; (2) the systems can design many parameters as the keys of the cryptosystems, a large number of system parameters means that the cryptosystems with large key space can be designed.

Author Contributions

H.Z. carried out numerical simulation and analysis, J.L. (Jianying Liu) and J.L. (Jiu Li) studied the proof and derivation of relevant theories, H.Z. and J.L. (Jianying Liu) wrote the paper, H.Z. and J.L. (Jianying Liu) revised the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lambić, D. A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design. Nonlinear Dyn. 2020, 100, 699–711. [Google Scholar] [CrossRef]
  2. Vaseghi, B.; Pourmina, M.A.; Mobayen, S. Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control. Nonlinear Dyn. 2017, 89, 1689–1704. [Google Scholar] [CrossRef]
  3. Ouannas, A.; Bendoukha, S.; Volos, C.; Boumaza, N.; Karouma, A. Synchronization of Fractional Hyperchaotic Rabinovich Systems via Linear and Nonlinear Control with an Application to Secure Communications. Int. J. Control Autom. Syst. 2019, 17, 52211–52219. [Google Scholar] [CrossRef]
  4. Xiuping, Y.; Lequan, M.; Xue, W. A cubic map chaos criterion theorem with applications in generalized synchronization based pseudorandom number generator and image encryption. Chaos 2015, 25, 053104. [Google Scholar]
  5. Wang, C.; Fan, C.; Ding, Q. Constructing Discrete Chaotic Systems with Positive Lyapunov Exponents. Int. J. Bifurc. Chaos 2018, 28, 17. [Google Scholar] [CrossRef]
  6. Min, L.; Yang, X.; Chen, G.; Wang, D. Some Polynomial Chaotic Maps Without Equilibria an Application to Image Encryption with Avalanche Effects. Int. J. Bifurc. Chaos 2015, 25, 1550124. [Google Scholar] [CrossRef]
  7. Zhuosheng, L.; Simin, Y.; Jinhu, L.; Shuting, C.; Guanrong, C. Design and ARM-Embedded Implementation of a Chaotic Map-Based Real-Time Secure Video Communication System. IEEE Trans. Circuits Syst. Video Technol. 2015, 25, 1203–1216. [Google Scholar] [CrossRef]
  8. Lin, Z.; Yu, S.; Feng, X.; Lü, J. Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme. Int. J. Bifurc. Chaos 2018, 28, 27. [Google Scholar] [CrossRef]
  9. Li, T.-Y.; Yorke, J.A. Period three implies chaos. Am. Math. Mon. 1975, 82, 985–992. [Google Scholar] [CrossRef]
  10. Marotto, F.R. Snap-back repellers imply chaos in Rn. J. Math. Anal. Appl. 1978, 63, 199–223. [Google Scholar] [CrossRef] [Green Version]
  11. Shi, Y.; Chen, G. Discrete chaos in banach spaces. Sci. China Ser. A Math. 2005, 48, 222–238. [Google Scholar] [CrossRef]
  12. Lin, W.; Chen, G. Heteroclinical repellers imply chaos. Int. J. Bifurc. Chaos 2006, 16, 1471–1489. [Google Scholar] [CrossRef]
  13. Shi, Y.; Yu, P. Study on chaos induced by turbulent maps in noncompact sets. Chaos Solitons Fractals 2006, 28, 1165–1180. [Google Scholar] [CrossRef]
  14. Da Costa, D.R.; Medrano-T, R.O.; Leonel, E.D. Route to chaos and some properties in the boundary crisis of a generalized logistic mapping. Phys. A Stat. Mech. Its Appl. 2017, 486, 674–680. [Google Scholar] [CrossRef]
  15. Elsadany, A.; Yousef, A.; Elsonbaty, A. Further analytical bifurcation analysis and applications of coupled logistic maps. Appl. Math. Comput. 2018, 338, 314–336. [Google Scholar] [CrossRef]
  16. Zang, H.; Huang, H.; Chai, H. Study on homogenization method of a class of quadratic polynomial chaotic system. J. Electron. Inf. 2019, 41, 1618–1624. [Google Scholar]
  17. Chen, G.; Lai, D. Feedback control of lyapunov exponents for discrete-time dynamical systems. Int. J. Bifurc. Chaos 1996, 6, 1341. [Google Scholar] [CrossRef]
  18. Zang, H.; Li, J.; Li, G. A one-dimensional discrete chaos determination theorem and its application in pseudorandom number generator. J. Electron. Inf. 2018, 40, 1992–1997. [Google Scholar]
  19. Wang, X.; Chen, G. Yet Another Algorithm for Chaotifying Control of Discrete Chaos. Control Theory Appl. 2000, 17, 336–340. [Google Scholar]
  20. Yu, S.; Lu, J.; Chen, G. Anti Control Method of Power System and Its Application; Science Press: Beijing, China, 2013. [Google Scholar]
Figure 1. Phase diagram of system (2): (a) X–Y phase diagram; (b) X–Z phase diagram; (c) Y–Z phase diagram; (d) X–Y–Z phase diagram.
Figure 1. Phase diagram of system (2): (a) X–Y phase diagram; (b) X–Z phase diagram; (c) Y–Z phase diagram; (d) X–Y–Z phase diagram.
Mathematics 09 00365 g001
Figure 2. Exponential Lyapunov spectrum of system (2).
Figure 2. Exponential Lyapunov spectrum of system (2).
Mathematics 09 00365 g002
Figure 3. Schematic diagram of the sensitivity of system (2) to the initial values and system parameters: (a) perturbation trajectory diagram of parameter a; (b) perturbation difference diagram of parameter a; (c) perturbation trajectory diagram of initial value x 0 ; (d) perturbation difference diagram of initial value x 0 .
Figure 3. Schematic diagram of the sensitivity of system (2) to the initial values and system parameters: (a) perturbation trajectory diagram of parameter a; (b) perturbation difference diagram of parameter a; (c) perturbation trajectory diagram of initial value x 0 ; (d) perturbation difference diagram of initial value x 0 .
Mathematics 09 00365 g003
Figure 4. Three-dimensional bifurcation diagram of system (2): (a) a-X bifurcation diagram; (b) a-Y bifurcation diagram; (c) a-Z bifurcation diagram.
Figure 4. Three-dimensional bifurcation diagram of system (2): (a) a-X bifurcation diagram; (b) a-Y bifurcation diagram; (c) a-Z bifurcation diagram.
Mathematics 09 00365 g004
Figure 5. Phase diagram of the five-dimensional system (2): (a) M–N phase diagram; (b) M–X phase diagram; (c) M–Y phase diagram; (d) M–Z phase diagram; (e) N–X phase diagram; (f) N–Y phase diagram; (g) N–Z phase diagram; (h) X–Y phase diagram; (i) X-Z phase diagram; (j) Y–Z phase diagram; (k) M–N–X phase diagram; (l) M–N–Y phase diagram; (m) M–N–Z phase diagram; (n) M–X–Y phase diagram; (o) M–X–Z phase diagram; (p) M–Y–Z phase diagram; (q) N–X–Y phase diagram; (r) N–X–Z phase diagram; (s) N–Y–Z phase diagram; (t) X–Y–Z phase diagram.
Figure 5. Phase diagram of the five-dimensional system (2): (a) M–N phase diagram; (b) M–X phase diagram; (c) M–Y phase diagram; (d) M–Z phase diagram; (e) N–X phase diagram; (f) N–Y phase diagram; (g) N–Z phase diagram; (h) X–Y phase diagram; (i) X-Z phase diagram; (j) Y–Z phase diagram; (k) M–N–X phase diagram; (l) M–N–Y phase diagram; (m) M–N–Z phase diagram; (n) M–X–Y phase diagram; (o) M–X–Z phase diagram; (p) M–Y–Z phase diagram; (q) N–X–Y phase diagram; (r) N–X–Z phase diagram; (s) N–Y–Z phase diagram; (t) X–Y–Z phase diagram.
Mathematics 09 00365 g005
Figure 6. Exponential Lyapunov spectrum of the five-dimensional system (2).
Figure 6. Exponential Lyapunov spectrum of the five-dimensional system (2).
Mathematics 09 00365 g006
Figure 7. Schematic diagram of the sensitivity of system (2) to the initial values and system parameters: (a) perturbation trajectory diagram of parameter a; (b) perturbation difference diagram of parameter a; (c) perturbation trajectory diagram of initial value x 0 ; (d) perturbation difference diagram of initial value x 0 .
Figure 7. Schematic diagram of the sensitivity of system (2) to the initial values and system parameters: (a) perturbation trajectory diagram of parameter a; (b) perturbation difference diagram of parameter a; (c) perturbation trajectory diagram of initial value x 0 ; (d) perturbation difference diagram of initial value x 0 .
Mathematics 09 00365 g007
Figure 8. Five-dimensional bifurcation diagram of system (2): (a) a-M bifurcation diagram; (b) a-N bifurcation diagram; (c) a-X bifurcation diagram; (d) a-Y bifurcation diagram; (e) a-Z bifurcation diagram.
Figure 8. Five-dimensional bifurcation diagram of system (2): (a) a-M bifurcation diagram; (b) a-N bifurcation diagram; (c) a-X bifurcation diagram; (d) a-Y bifurcation diagram; (e) a-Z bifurcation diagram.
Mathematics 09 00365 g008
Figure 9. Phase diagram of system (3): (a) X–Y phase diagram; (b) X–Z phase diagram; (c) Y–Z phase diagram; (d) X–Y–Z phase diagram.
Figure 9. Phase diagram of system (3): (a) X–Y phase diagram; (b) X–Z phase diagram; (c) Y–Z phase diagram; (d) X–Y–Z phase diagram.
Mathematics 09 00365 g009
Figure 10. Exponential Lyapunov spectrum of system (3).
Figure 10. Exponential Lyapunov spectrum of system (3).
Mathematics 09 00365 g010
Figure 11. Schematic diagram of the sensitivity of system (3) to the initial values and system parameters; (a) perturbation trajectory diagram of parameter a ; (b) perturbation difference diagram of parameter a ; (c) perturbation trajectory diagram of the initial value; (d) perturbation difference diagram of the initial value.
Figure 11. Schematic diagram of the sensitivity of system (3) to the initial values and system parameters; (a) perturbation trajectory diagram of parameter a ; (b) perturbation difference diagram of parameter a ; (c) perturbation trajectory diagram of the initial value; (d) perturbation difference diagram of the initial value.
Mathematics 09 00365 g011
Figure 12. Three-dimensional bifurcation diagram of system (3): (a) a-X bifurcation diagram; (b) a-Y bifurcation diagram; (c) a-Z bifurcation diagram.
Figure 12. Three-dimensional bifurcation diagram of system (3): (a) a-X bifurcation diagram; (b) a-Y bifurcation diagram; (c) a-Z bifurcation diagram.
Mathematics 09 00365 g012
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zang, H.; Liu, J.; Li, J. Construction of a Class of High-Dimensional Discrete Chaotic Systems. Mathematics 2021, 9, 365. https://doi.org/10.3390/math9040365

AMA Style

Zang H, Liu J, Li J. Construction of a Class of High-Dimensional Discrete Chaotic Systems. Mathematics. 2021; 9(4):365. https://doi.org/10.3390/math9040365

Chicago/Turabian Style

Zang, Hongyan, Jianying Liu, and Jiu Li. 2021. "Construction of a Class of High-Dimensional Discrete Chaotic Systems" Mathematics 9, no. 4: 365. https://doi.org/10.3390/math9040365

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop