Introduction
The rapid development of the internet and the wide applications of multimedia technology have enable people to exchange information with high confidentiality [1], [2]. The security of data during its transmission involves several different aspects, including copyright protections, authentications, entertainments, business, health services and military affairs, etc. To fulfill a certain level of security in the wide range of applications, the encryption and decryption processes are very necessary. Some traditional or conventional encryption-decryption algorithms like DES (Data Encryption Standard), AES (Advanced Encryption Standard), IDEA (International Data Encryption Algorithm) and RSA (developed by Rivest, Shamir and Adleman) have been used in the past in order to avoid malicious attacks from unauthorized parties [3], [4]. But it has been shown that these methods are inappropriate for digital image encryption-decryption due to some intrinsic properties of the images such as bulky data capacity and high redundancy, which are generally difficult to handle by using these traditional techniques [5], [6]. These conventional methods therefore are less useful in image encryption cryptography, especially for rapid communication applications. We can now realize that more and more research has been done to develop modern encryption algorithms [7]–[10]. For instance chaos based encryption are used to protect the transferred information from attacks [9]. Some researchers have been devoted to systems characterized by ergodicity, deterministic dynamics, unpredictable behavior, non-linear transform, sensitivity dependence on initial conditions and system’s parameters. They used to investigate the dynamical properties of the proposed systems focusing on potential striking dynamical behavior including periodic attractors, chaotic attractors or hyperchaotic attractors, antimonotonicity, period doubling, crises, hysteresis, and coexisting bifurcations [11], [12]. Note that some of these properties and behaviors may be useful to image encryption in order to increase the number of encryption keys [7], [8].
Existing results in literature has recognized the presence of IAWs in plasmas comprising of negative and positive ions. The examination the negative ions in plasma system is significant owing to their broad applications in laboratory [13] and plasma processing reactors [14]. Saleem [15] presented the theoretical criterion for plasmas to have negative and positive ions. Many researchers [16]–[18], [20] reported the study of negative and positive pair ions for different plasma environments. Chaizy et al. [21] investigated that the negative ions in the comet Halley are readily damaged by solar radiation. The presence of negative ions is important in a physical processes such as radiative transfer or charge exchange that occur mainly in environments farther away from the Sun like Jupiter’s or Saturn’s magnetospheres. However, Coates et al. [22] recognized the presence of negative ions in Titan’s atmosphere. These negative ions were considered to have high number densities and play a vital role in chemical process like formation of organic-rich aerosols.
The physical environments present on space and astrophysical systems such as, galaxy clusters [23], plasmas [24], contain high energy and long-range interaction particles. These particles form various classes of nonextensive systems and develop strong thermostatistics. The nonextensive entropy introduced by Tsallis [25] can be extensively used for particles with high energy. The entropy proposed for combined system
The nonlinear waves in multi-component plasmas are capable of generating interesting behaviors and one such feature is called supernonlinear waves discovered by Dubinov and Kolotkov [32], [33]. Such waves are classified by the number of singular points and sepratrix layers in their phase profiles. A nonlinear wave should at least three singular points and one sepratrix layer in order to be classified as supernonlinear waves. Recently, numerous works [34]–[36] were reported for studying supersolitons using the Sagdeev potential. Researchers also studied examined supernonlinear waves in three-component plasma model [37], [38] where two temperature electrons were considered. In four-component plasmas, very recently, El-Wakil et al. [39] reported the supernonlinear waves in non-Maxwellian plasmas. However, the studies of supernonlinear waves through the dynamical systems and phase plane analysis [40]–[42] have gathered great attention of researchers. It is interesting to know that many researchers have already studied nonlinear with different composition of plasma particles in different atmosphere [43]–[46]. The chaotic, periodic and quasiperiodic behaviors of dynamical systems in plasmas are reported in multi-constituent plasmas [47]. Rahim et al. [48] studied dynamical feature and multistability. Many researchers [49]–[52] reported multistability property that is widely used to examine dynamical features for various systems. Very recently, some studies [53]–[55] related to dynamical behavior and multistability property of nonlinear waves under different plasma compositions have been examined widely for various plasma atmospheres. In this study, we consider a plasma model [56] to study solitary, periodic and superperiodic waves and their multistability behavior. Furthermore, the considered plasma system supports chaotic dynamics of IAWs which is applied to image encryption.
It has been proved that chaotic sequences are useful for image encryption. Inverse tent map was used by T. Habutsu and co-workers to build a chaotic cryptosystem for image security [57], in which the initial states are calculated in terms of the original input image. The encrypted data is obtained for N iterations of the chaotic map. E. Biham presented a cryptanalysis based on weakness of the chaotic map (Ten maps) to break the above mentioned cryptosystem [58]. Using the sequence of the well-known one dimensional Logistic map, M. S. Baptista designed an encryption scheme and security analysis indicated an efficient encryption process [59]. However most of the proposed algorithms rely on the solely use of chaotic sequences in the diffusion process. This may usually cause some lack of security and time consumption. Some solutions to these problems can be found in the literature. For instance, Wang and collaborators combined cyclic shift and sorting permutation technics to produce rapid image encryption protocol [9]. DNA can also be combined to chaotic sequences and other transformations to achieve more security and rapidity [60]. In this paper we combine the chaotic sequences of the proposed IAW with DNA coding and
The article is arranged as follows: In section II, mathematical model is considered. In section III, the dynamical system is formed using the direct method. In section IV, multistability properties are presented. In section V, encryption process and its security are discussed. In section VI, conclusion of our work is provided.
Model Equations
Supernonlinear and nonlinear IAWs are studied for a plasma system consisting of \begin{align*} \frac {\partial n_{p,n}}{\partial t}+\frac {\partial }{\partial x}(n_{p,n}u_{p,n})=&0, \tag{1}\\ \frac {\partial u_{p}}{\partial t}+u_{p}\frac {\partial u_{p}}{\partial x}+\frac {\partial \phi }{\partial x}=&0, \tag{2}\\ \frac {\partial u_{n}}{\partial t}+u_{n}\frac {\partial u_{n}}{\partial x}-s\frac {\partial \phi }{\partial x}=&0, \tag{3}\\ \frac {\partial ^{2} \phi }{\partial x^{2}}-n_{e}-n_{n}+ n_{p}=&0. \tag{4}\end{align*}
The electron velocity distribution function \begin{equation*}f_{e}(v)=C_{q}\left\{{1+(q-1)\left[{\frac {m_{e}v^{2}}{2k_{B}T_{e}}-\frac {e\phi }{k_{B}T_{e}}}\right]}\right\}^{\frac {1}{(q-1)}},\end{equation*}
\begin{equation*}C_{q} = n_{e0} \frac {\Gamma \left({\frac {1}{1-q}}\right)}{\Gamma \left({\frac {1}{1-q} -\frac {1}{2}}\right)} \sqrt {\frac {m_{e}(1-q)}{2\pi k_{B}T_{e}}} ~~\text {for}~\,\,-1< q< 1,\end{equation*}
\begin{equation*}C_{q} = n_{e0} \frac {1+q}{2} \frac {\Gamma \left({\frac {1}{q-1}+\frac {1}{2}}\right)}{\Gamma \left({\frac {1}{q-1}}\right)} \sqrt {\frac {m_{e}(q-1)}{2\pi k_{B}T_{e}}}~~\text {for}~~q>1,\end{equation*}
\begin{equation*}n_{e}=n_{e0}\left\{{{1+(q-1)\frac {e\phi }{k_{B}T_{e}}}}\right\}^{1/(q-1)+1/2},\end{equation*}
\begin{equation*} n_{e}=N_{e}\{{1+(q-1)\phi }\}^{\frac {1}{q-1}+\frac {1}{2}}. \tag{5}\end{equation*}
Dynamical System
The dynamical characteristics of IAWs are shown using tools such as, phase plane profiles, time series and Lyapunov exponents. In order to examine such diverse features of the wave, we transform the model equations into a planar dynamical system (DS) [41], [42] using the wave transformation \begin{equation*} n_{p}=\frac {V}{V-u_{p}},\quad n_{n}=\frac {VN_{n}}{V-u_{n}}.\tag{6}\end{equation*}
\begin{equation*} V-u_{p}=\sqrt {V^{2}-2\phi },\quad V-u_{n}=\sqrt {V^{2}+2s\phi }.\tag{7}\end{equation*}
\begin{equation*} n_{p}=\frac {V}{\sqrt {V^{2}-2\phi }},\quad ~n_{n}=\frac {VN_{n}}{\sqrt {V^{2}+2s\phi }}\tag{8}\end{equation*}
\begin{align*} \frac {d^{2}\phi }{d\xi ^{2}}\!-\!N_{e} [1\!+\!(q\!-\!1)\phi]^{\frac {1}{q-1}+\frac {1}{2}}\!-\!\frac {VN_{n}}{\sqrt {V^{2}\!+\!2s\phi }}\!+\! \frac {V}{\sqrt {V^{2}\!-\!2\phi }}\!=\!0.\!\!\!\! \\\tag{9}\end{align*}
\begin{equation*} \frac {d^{2}\phi }{d\xi ^{2}}= A\phi +B\phi ^{2}+C\phi ^{3},\tag{10}\end{equation*}
\begin{align*}A=&\frac {1}{2}(1+q)N_{e}-\frac {sN_{n}}{V^{2}}-\frac {1}{V^{2}},\\ B=&\frac {1}{8}(1+q)(3-q)N_{e}+\frac {3}{2V^{4}}s^{2}N_{n}-\frac {3}{2V^{4}},\\ C=&\frac {1}{48}(1+q)(3-q)(5-3q)N_{e}-\frac {5}{2V^{6}}s^{3}N_{n}-\frac {5}{2V^{6}}.\end{align*}
\begin{align*} \begin{cases} \displaystyle \frac {d \phi }{d \xi }=z,\\ \displaystyle \frac {dz}{d\xi }=A\phi +B\phi ^{2}+C\phi ^{3}. \end{cases}\tag{11}\end{align*}
Figure 1 is phase portraits for the system DS (11) with higher unperturbed number density of negative ions
Phase portraits of system (11) for (a)
Figure 2 is phase portraits for the system DS (11) with lower unperturbed number density of negative ions
Phase portraits of system (11) for (a)
Figure 3 shows phase portraits of the system DS (11) for (a) superextensive case (
Phase portraits of system (11) for (a)
A. Wave Solutions for IAW
We encounter the existence of nonlinear periodic, nonlinear solitary and superperiodic solutions of IAWs through the phase plane analysis. Therefore, we now obtain the analytical periodic wave solution of IAW for which we suppose the Hamiltonian function \begin{equation*} H(\phi,y)=\frac {y^{2}}{2}-\left ({\frac {A\phi ^{2}}{2}+\frac {B\phi ^{3}}{3}+\frac {C\phi ^{4}}{4}}\right)=h.\tag{12}\end{equation*}
\begin{equation*} \dfrac {d\phi }{d\xi }=\sqrt {\dfrac {C}{2}}\sqrt {(a-\phi)(\phi -b)(\phi -c)(\phi -d)},\tag{13}\end{equation*}
Substituting equation (13) in (12), we get \begin{equation*} \phi = \frac {b-c\left\{{\dfrac {a-b}{a-c}sn^{2}\left({\dfrac {1}{g}\sqrt {\dfrac {C}{2}}\xi,k}\right)}\right\}}{1-\dfrac {a-b}{a-c}sn^{2}\left({\dfrac {1}{g}\sqrt {\dfrac {C}{2}}\xi,k}\right)}.\tag{14}\end{equation*}
Figure 4 displays change on NPIAW by varying
Periodic solution with respect to figure 1 (a) and (b) for different values of
Figure 4 shows change on NPIAW by varying
Periodic solution with respect to figure 2 (a) and (b) for different values of
Figure 6 shows change on SPIAW by varying
Superperiodic solution with respect to figure 1 (a) and (b) for different values of
Figure 7 shows change on SPIAW by varying
Superperiodic solution with respect to figure 2 (a) and (b) for different values of
Multistability Property
The dynamical features such as, chaotic and quasiperiodic behaviors of the system (11) are studied by introducing an extraneous force \begin{align*} \begin{cases} \displaystyle \frac {d\phi }{d\xi }=y,\\ \displaystyle \frac {dy}{d\xi }=A\phi +B\phi ^{2}+C\phi ^{3}+f_{0}~cos(U),\\[7pt] \displaystyle \frac {dU}{d\xi }=\omega, \end{cases}\tag{15}\end{align*}
Figure 8 shows phase portraits for system (15) in
Multistability of system (15) for (a) subextensive case with
The Lyapunov exponent is an efficient tool to determine the chaotic behavior of a system. Positive values of Lyapunov exponent show occurrence of chaos. Since, we observed the existence of chaos in multistability phase plot figure 8 (a) for the perturbed system (15), we determine the Lyapunov exponent with respect to
Lyapunov exponent for the chaotic behavior (shown by pink orbits in figure 8 (a)) of the perturbed DS (15) for subextensive case.
Encryption Application
A. Proposed Algorithm
1) SHA-512 for Cryptography
Secure Hash Algorithm 512 (SHA−512) is one of the prominent solutions to withstand various forms of attacks in cryptography given than it is not reversible [74]. In effect SHA-512 accept any type of input data of any size and provide an output (hash digest) of 512 bits. Note that SHA-512 uses one-way function to map input data to the output, in addition a slight change in the input data leads to a completely different output. Consequently it is quite impossible to break encryption schemes based on SHA-512.
2) DNA Principle for Cryptography
Due to low power consumption and large memory capacity DNA coding has been shown to be efficient to cryptography in general and particularly in image encryption. It is well known that the four bases of DNA sequence are Adenine (A), Thymine (T), Guanine (G) and Cytosine (C) where A-T are complementary and C-G are complementary. Comparing to the binary system where 0 and 1 are complementary a correspondence can be defined as
3) The Encryption Process
We start the encryption process by applying NIST SP 800-22 tests to the chaotic sequences to assess its randomness. The results in TABLE 2 indicate that the generated sequences (
Step 1:
Read the plain image P1 of size
and compute its hash digestm \times n \times r using SHA−512 whereH = H_{1}, H_{2} \cdots H_{64} is theH_{i} byte in the digesti^{\text {th}} .H Step 2:
Read the initial values
and apply the following update law for solving system (15):\phi _{0}, y_{0}, u_{0} where\begin{align*} \widetilde {\phi }=&\left[{{\phi (0)+\frac {1}{10^{15}}\prod _{i=1}^{16}bin2dec(H_{i})}}\right]mod256 \\ \widetilde {y}=&\left[{{y(0)+\frac {1}{10^{15}}\prod _{i=17}^{32}bin2dec(H_{i})}}\right]mod256 \\ \widetilde {u}=&\left[{{u(0)+\frac {1}{10^{15}}\prod _{i=33}^{48}bin2dec(H_{i})}}\right]mod256 \\ \tag{16}\end{align*} View Source\begin{align*} \widetilde {\phi }=&\left[{{\phi (0)+\frac {1}{10^{15}}\prod _{i=1}^{16}bin2dec(H_{i})}}\right]mod256 \\ \widetilde {y}=&\left[{{y(0)+\frac {1}{10^{15}}\prod _{i=17}^{32}bin2dec(H_{i})}}\right]mod256 \\ \widetilde {u}=&\left[{{u(0)+\frac {1}{10^{15}}\prod _{i=33}^{48}bin2dec(H_{i})}}\right]mod256 \\ \tag{16}\end{align*}
converts the binary values of the hash digest to equivalent decimal values.bin2dec Step 3:
Using the updated initial values, solve system (15) to obtain three chaotic sequences
each of size\phi _{i}, y_{i}, u_{i} , convert each sequence into integers then into binary format.m \times n \times r Step 4:
Apply DNA coding operation on the plain image
usingP_{1} as indicated by TABLE 1 to achieve DNA matrix\phi _{i} .P_{2} Step 5:
Apply DNA permutation operation on the DNA matrix
following algorithm 1 to achieve the permuted matrixP_{2} .P_{3} Step 6:
Apply DNA diffusion operation on the permuted matrix
following algorithm 2 to achieve the diffused matrixP_{3} .P_{4} Step 7:
Apply DNA decoding operation on the diffused matrix
following the rules of TABLE 1.P_{4}
General outline of the encryption process. The decryption is reverse of the encryption process.
Algorithm 1: DNA Permutation Algorithm
-
-[m,n,r] is the size of the DNA image.
-
Permuted matrix
Convert the chaotic sequence
for
for
for
end
end
end
Algorithm 2: DNA Diffusion Algorithm
- P3 is the DNA permuted image,
-[m,n,r] is the size of the DNA image.
-
Diffused matrix
Convert the chaotic sequence
Collect the first different
Construct the DNA diffusion key
for
if (L(i)==1 or L(i)==2 ) then
{Diff(i)=A}:
else if (L(i)==3 or L(i)==4) then
{Diff(i)=T}
else if (L(i)==5 or L(i)==6) then
{Diff(i)=C}
else
{Diff(i)=G}
end
end
add, sub, ex_or, ex_nor and mult are different DNA operation as indicated in Figure 11.
Diffuse the DNA permuted image P3 using DNA diffusion key Diff as:
for
if (L(i)==1) then
{
else if (L(i)==2) then
{
else if (L(i)==3) then
{
else if (L(i)==4) then
{
else
{
end
end
B. Security Performance
To test and evaluate the security of the above cryptosystem, the proposed chaotic system is solved with initial seed as: \begin{equation*} PSNR = \log \frac {peak\_{}value}{MSE}\tag{17}\end{equation*}
\begin{equation*} {\mathrm{MSE = - }}\frac {1}{m \times n}\sum \limits _{i = 1}^{m} {\sum \limits _{j = 1}^{n} {[P(i,j) - C(i,j)]^{2} } }\tag{18}\end{equation*}
Visual test of the dataset images. It is observed that the plain images are no more recognizable after encryption.
1) Correlation of Adjacent Pixels
The calculation of the correlation coefficient between the pixels makes it possible to evaluate the cryptographic quality of the cryptosystem. The correlation coefficient tends to 1 or −1 for two pixels that are closely associated. However, its value close to zero signs that the two pixels are not associated and cannot be predicted [75]. This metric is calculated from the following formula:\begin{align*} r_{xy}=&\frac {E((x-E(x))(y-E(y)))}{\sqrt {D(x)}\sqrt {D(y)}}, \\ \text {where}~~E(x)=&\frac {1}{N}\sum _{i=1}^{N} x_{i}~\text {and} ~D(x)=\frac {1}{N}\sum _{i=1}^{N} (x_{i}-E(x))^{2}. \\\tag{19}\end{align*}
Here
2) Global and Local Entropy Tests
Global and local entropy are two important indicators used for random characteristics of a cryptosystem. The greater the information entropy, the more uncertain the information we have [76]. It can be evaluated as follows:\begin{equation*} E(x_{i})=-\sum _{i=0}^{255} p(x_{i})~log_{2}~p(x_{i}), \tag{20}\end{equation*}
3) Histogram, \chi^{2}
and Variance Tests
Any good encryption scheme must pass the histogram and chi-square test to be able to resist the statistical intrusion of a third party [77]. The histogram of a plain data is usually distributed randomly whereas the histogram of the corresponding cipher is required to be uniform. Figures 16 and 17 present the histograms of the plain and cipher color and gray scale images. It is obvious to observe that the histograms of the plain image are randomly distributed while the histograms of the encrypted data are flat. This flatness can be checked using the chi-square test. TABLE 6 provides the issue of chi-square values with 0.05 as weight value. Usually, the flatness of the histogram is validated if the chi-square value of the test sample is less than 293.2478 indicating a p-value higher than 0.5. Regarding TABLE 6 the histograms of various test samples are validated. Variance of histogram is another metric currently used to evaluate the uniformity of encrypted image [78]. this metric can be computed with respect to encryption keys using the following formula:\begin{equation*} {\mathop {\mathrm{ v}}\nolimits } (H)\,\,= \frac {1}{m \times n}\sum \limits _{i = 1}^{m} {\sum \limits _{j = 1}^{n} {\frac {1}{2}(h_{i} - h_{j})^{2} } }\tag{21}\end{equation*}
4) NPCR and UACI Tests
To assess the capability of an encryption algorithm to withstand differential attacks NPCR (Number of Pixels Change Rate) and UACI are commonly used [79]. These metrics evaluate the rate of change in the original image on its equivalent cipher one. The numerical value of NPCR is computed as:\begin{align*} NPCR=&\frac {\sum _{m,n}Diff(m,n)}{D}\times 100\%, \\ Diff(m,n)=&\begin{cases} \displaystyle 0,&if~P(m,n)=C(m,n)\\ \displaystyle 1,&if ~P(m,n) \ne C(m,n) \end{cases}\tag{22}\end{align*}
here \begin{equation*} UACI=\frac {100}{m\times n}\sum _{1}^{m}\sum _{1}^{n} \frac {|IC_{1}(m,n)-IC_{2}(m,n)|}{255},\tag{23}\end{equation*}
The outcomes of NPCR and UACI for the experimented dataset are displayed in TABLE 8. From these results, the given encryption approach has a high sensitivity to tiny pixel changes in the original image. Consequently, encrypted images are secured against any form of differential attacks.
5) Key Space Analysis
The key space of an encryption algorithm is the product of all the keys used in the encryption process (
6) Key Sensitivity Analysis
Any cryptosystem is required to be sensitive to tiny change in the keys that is any slight change in the key should cause significant effect in the encrypted data [2]. To test the sensitivity of our algorithm to keys a given plain image is encrypted using correct key. Then correct key (
7) Noise Attack Analysis
Salt-and-pepper and Gaussian are two types of noises currently encountered in image processing. This part aims to verify if the proposed encryption algorithm is able to resist to such type of noises [9]. In this line a certain amount of Gaussian noise and salt-and-pepper noises are added to the encrypted data. The proposed encryption algorithm is then used to decrypt the infected images. Figures 19 and 20 show that our algorithm is able to produce readable image from infected cipher. the proposed encryption algorithm is more efficient on Salt-and-pepper noise.
Salt-and-pepper noise analysis: the first line presents the noise infected images with 0.5 as parameter and the second line indicate the corresponding decrypted images.
Gaussian noise analysis: the first line presents the noise infected images with 0.5 as parameter and the second line indicate the corresponding decrypted images.
8) Occlusion Attack Analysis
Images usualy loss some informations during the transmission process. This is called occlusion attack and a well-designed encryption/decryption algorithm should be able to withstand such type of attack. To test the capability of the proposed algorithm to resist occlusion a dark matrix is created on the encrypted image. Then the proposed method is used to decrypt the attacked image. From the results of Figure 21 the recovered image is readable. Consequently the occlusion does not affect the decryption.
9) Classical Types of Attack
Any encryption algorithm should be able to resist to the four classical forms of attacks such as ciphertext only (The hacker has a part of the encrypted data), known plaintext (The hacker has a part of the plain data and the corresponding encrypted data), chosen ciphertext (The hacker has the possibilty to choose a part of the plain data and construct the corresponding cipher data using the algorithm), chosen plaintext (The hacker has the possibilty to choose a part of the cipher data and construct the corresponding plain data using the algorithm) [10]. It is obvious that a given cryptosystem is robust to any form of the above described attacks if it resists to chosen plaintext attack. The algorithm proposed in this paper is sensitive to any change in chaotic system parameters and initial seeds. In addition the encrypted data also depends on the plain data as we use Hash algorithm with plain data as input to compute the initial seed of the chaotic system. Consequently even with a part of the plain data and cipher data our algorithm can resist to chosen plaintext attack.
10) Complexity Analysis
Complexity analysis is one of the most important tools to measure the performance of an algorithm. [82]–[85] This complexity can be computed in terms of running time or the Encryption Throughput (ET) and the Number of Cycles (NC) required securing one byte of the plain image. Note that the encryption time is computed using the “tic-toc” function of MATLAB while ET and NC are computed as:\begin{align*} ET=&\frac {size~of~the~image (Byte)}{Encryption~time~(sec)} \tag{24}\\ NC=&\frac {CPU~speed~(Hz)}{ET (Byte/sec)}\tag{25}\end{align*}
A good encryption algorithm is required to take less encryption time, less NC, and high ET to be suitable for real time implementation. TABLE 9 contains the running time of the encryption algorithm while using the various size of test image “Data1” (example
11) Comparison Analysis
A variety of chaos based encryption techniques can be found in the literature. In this part a comparative analysis between the proposed techniques and some recent literature is done. TABLE 11 show the outcome of comparative analysis in terms of some well-known metrics including NPCR, UACI, information entropy, algorithm complexity. Our algorithm shows the highest NPCR and entropy compared to some recents achievements in the literature. In the case of UACI our result is poor compare to the results in some recents achievements of the literature but the value of UACI achieved by our work is above the threshold value which is 33.46354% regarding the correlation the values achieved by our algorithm are more closed to 0 than the values in some recent works in the literature. Table 10 shows the outcome of comparative analysis in terms of algorithm complexity. As mentioned above a good encryption algorithm is required to take less encryption time, less NC, and high ET to be suitable for real time implementation. It is clear from this result that our algorithm achieve the smallest encryption time and NC but the highest ET compared to some recents achievements in the literature.
Conclusion
The supernonlinear and nonlinear periodic IAWs have been investigated in a nonextensive plasma system which is composed of pair ions (positive and negative) through the direct approach. Dynamical system has been formed directly from the model equations applying the suitable transformation. To examine dynamical behaviors, the existing DS has been disturbed with external periodic force. The DS and perturbed DS have been studied considering suitable values of physical parameters. The solitary, supernonlinear and nonlinear periodic IAW solutions have been shown through phase plane analysis for the DS. The periodic wave solution for IAW has been obtained analytically. It has been observed numerically that the SPIAW and NPIAW have become spiky and smooth according to
ACKNOWLEDGMENT
TSAFACK Nestor is grateful to Prof. Kengne Jacques for his inestimable broad knowledge, common sense, and ability to analyze intricate problems crucial to the success of this research work.