Skip to content

Quantum Computing News

  • Home
  • Quantum News
    • Quantum Computing
    • Quantum Hardware and Software
    • Quantum Startups and Funding
    • Quantum Computing Stocks
    • Quantum Research and Security
  • IMP Links
    • About Us
    • Contact Us
    • Privacy & Policies
  1. Home
  2. Quantum Computing
  3. 2D Henon Map: Future of Quantum-Resistant Image Encryption
Quantum Computing

2D Henon Map: Future of Quantum-Resistant Image Encryption

Posted on November 13, 2025 by Agarapu Naveen6 min read
2D Henon Map: Future of Quantum-Resistant Image Encryption

The 2D Henon Map introduces a quantum-resistant approach to image encryption, ensuring secure data protection in the post-quantum computing era.

The whole underpinning of contemporary security, from secure financial transactions to military communications, confronts an existential threat in a digital world rapidly approaching the era of quantum computing. The foundation of modern cryptography, which is based on algorithms like RSA and Advanced Encryption Standard (AES), is about to be destroyed by the quick development of quantum computers, which make use of qubits, superposition, and entanglement. The computational impossibility of factoring large prime numbers is the foundation of these conventional systems; however, quantum algorithms such as Shor’s and Grover‘s can theoretically bridge this gap in a matter of minutes or seconds.

Security experts warn of a “Harvest Now, Decrypt Later” scenario, in which enemies gather today’s encrypted data, store it, and wait for the quantum decryption tool to arrive. A full-scale quantum computer is years away, yet this is true.

Researchers from North South University and Chittagong University of Engineering and Technology have developed a novel cryptographic protocol in response to this crisis: a quantum-resistant picture encryption system. Published in APL Quantum, this ground-breaking hybrid solution combines the mathematical unpredictability of chaos theory with the fundamental rules of quantum entanglement.

Visual data, which accounts for a significant amount of all digital traffic worldwide, is especially vulnerable. Due to the special characteristics of images such as their enormous information capacity, strong pixel-to-pixel correlation, and data redundancy classical encryption techniques sometimes fail, producing predictable cypher images or processing times that are poor. The new research, carried out by Durra Tarannum, Md. Abu Syed, and their associates, offers a defense mechanism that is inherently better at protecting sensitive visual data, like satellite imagery and medical imaging.

You can also read €100M Nova Investments For Quantum Growth To Next-Gen AI

The Hybrid Shield: Quantum Keys Meet the Henon Map

The development of a quantum-classical hybrid protocol is the researchers’ novel contribution. This method improves the usefulness of encrypting large data while deftly addressing the main flaw in traditional encryption the security of the key.

There are two main steps in the system’s operation:

The Quantum Basis: Enhanced Three-Qubit Entanglement for Key Generation

Upgraded entanglement-based Quantum Key Distribution (QKD) generates an unhackable, completely secret encryption key. Eavesdropping is clear since the QKD process follows physics during key exchange.

An improved Ekert91 (E91) QKD is used in the protocol. This advanced method uses bidirectional qubit transmission to achieve three-qubit entanglement instead of the conventional two-qubit Bell pairs. There are major security benefits to this tripartite structure:

  • Doubled Key Size: The created quantum key can be almost twice as large as a key generated by the conventional E91 protocol with the three-qubit configuration, which exponentially increases the strength of the cryptography. The key length is k≃4N/3 if the process is run N times.
  • Eavesdropper Detection via CHSH: The Clauser-Horne-Shimony-Holt (CHSH) inequality is used to continuously check the integrity of the key exchange. Bell inequalities are violated in entanglement-based protocols, such as this improved E91 version, to identify eavesdropping. The entanglement will be disrupted if an enemy (Eve) tries to intercept the quantum particles. By breaking the CHSH limit, this action immediately notifies Alice and Bob, the legitimate users, and compels them to throw away the compromised key. In a secure channel, CHSH values in simulation approach the quantum maximum of 2.828, but they sharply decrease in the presence of an eavesdropper.

2. The Classical Strength: Encryption via the 2D Henon Map

The key is used to power a fast, unpredictable, chaotic cypher after it has been secured by the rules of physics. The 2D Henon map, a set of two coupled equations that produces intricate, non-repeating chaotic sequences, was the one that the researchers selected.

Because chaotic systems have a butterfly effect and are extremely sensitive to beginning conditions, they are perfect for cryptography. This makes it impossible for attackers to identify patterns because altering even a single pixel in the original image will produce an entirely different encrypted image.

Because 1D maps have weak chaotic behaviour and lesser key space, the 2D Henon map was chosen over more straightforward 1D maps (such as the logistic map). With two dynamic variables and two control parameters, the 2D map produces a far more intricate and safe chaotic orbit that is impervious to statistical cryptanalysis.

The initial conditions (x 0, y 0 ) and control parameters (a, b) are established using the QKD-generated key in order to cryptographically connect the chaotic system to the quantum key. These parameters are obtained from the secret key using the SHA-256 hash function, which guarantees that the 2D Henon map functions in its extremely chaotic regime. Without the exact key, this method ensures that a single-bit alteration to the quantum-derived key produces completely different chaotic sequences, rendering decryption impossible.

You can also read Sub-Doppler Cooling Reveals Trial Atom Indium’s Complexity

Proving Resilience: Unbreakable Security Metrics

The hybrid scheme’s resilience against known classical and quantum-era threats was confirmed after it underwent extensive testing against a variety of cryptographic and statistical security tests.

  1. Colossal Key Space: The system reaches a huge key space of 10 220 by fusing the precision of the obtained Henon parameters with the quantum key length. Because it would take exponentially more time to exhaust this space than the universe’s lifespan, this number completely dissuades brute-force attempts.
  2. Differential Attack Resistance: The protocol showed remarkable defence against differential assaults, which examine how a cypher image changes when a single pixel is changed. Its UACI (Unified Average Change Intensity) was close to 50%, and its NPCR (Number of Pixels Change Rate) was 99.6%. The system’s high diffusion and confusion features are confirmed by these results, which are regarded as the theoretical ideal for a perfect cypher. Specifically, the UACI value is much higher than those of current picture encryption systems, indicating better resilience to differential assaults.
  3. Statistical Immunity: By demonstrating very 0% correlation between neighboring pixels the research verified that the cypher images are completely random. Additionally, the Shannon entropy values continuously got closer to the optimal maximum of 8, which denotes a uniform distribution of pixel intensity. Statistical attacks are futile because of this randomness.
  4. High Efficiency: With encryption and decryption times in microseconds the method demonstrated practical efficiency. This microsecond-level performance is a major improvement over chaotic and hybrid approaches, which can take milliseconds or seconds.

The Future of Security

A significant breakthrough in post-quantum cryptography has been made with the creation of this quantum-resistant image encryption technology. The researchers have developed a plan for protecting sensitive, high-volume visual data by combining the mathematical speed and intricacy of the 2D Henon map with the physical security of three-qubit entanglement.

The enormous promise of quantum-classical cryptography protocols as the most viable route forward for instantaneous, future-proof communication security is confirmed by this work. The future of security is based on the unchangeable laws of physics; the days of depending only on intricate mathematics are coming to an end.

You can also read QPerfect, BTQ Technologies to Advance Neutral Atom Quantum

Tags

Chaotic EncryptionChaotic SystemsHybrid Classical-Quantum EncryptionPost-Quantum SecurityQuantum algorithmsQuantum computingQuantum Cryptographyquantum key distribution (QKD)Quantum-Resistant Encryption

Written by

Agarapu Naveen

Naveen is a technology journalist and editorial contributor focusing on quantum computing, cloud infrastructure, AI systems, and enterprise innovation. As an editor at Govindhtech Solutions, he specializes in analyzing breakthrough research, emerging startups, and global technology trends. His writing emphasizes the practical impact of advanced technologies on industries such as healthcare, finance, cybersecurity, and manufacturing. Naveen is committed to delivering informative and future-oriented content that bridges scientific research with industry transformation.

Post navigation

Previous: Multi-Partite Entanglement To LLM Inference Cost Reduction
Next: Quantum Optimization with Decoded Quantum Interferometry

Keep reading

QbitSoft

Scaleway & QbitSoft Launch European Quantum Adoption Program

4 min read
USC Quantum Computing

USC Quantum Computing Advances National Security Research

5 min read
SuperQ Quantum Computing Inc. at Toronto Tech Week 2026

SuperQ Quantum Computing Inc. at Toronto Tech Week 2026

4 min read

Leave a Reply Cancel reply

You must be logged in to post a comment.

Categories

  • Scaleway & QbitSoft Launch European Quantum Adoption Program Scaleway & QbitSoft Launch European Quantum Adoption Program May 23, 2026
  • USC Quantum Computing Advances National Security Research USC Quantum Computing Advances National Security Research May 23, 2026
  • SuperQ Quantum Computing Inc. at Toronto Tech Week 2026 SuperQ Quantum Computing Inc. at Toronto Tech Week 2026 May 23, 2026
  • WISER and Fraunhofer ITWM Showcase QML Applications WISER and Fraunhofer ITWM Showcase QML Applications May 22, 2026
  • Quantum X Labs Integrates Google Data for Error Correction Quantum X Labs Integrates Google Data for Error Correction May 22, 2026
  • SEALSQ and IC’Alps Expand Post-Quantum Security Technologies SEALSQ and IC’Alps Expand Post-Quantum Security Technologies May 21, 2026
  • MTSU Events: Quantum Valley Initiative Launches with MTE MTSU Events: Quantum Valley Initiative Launches with MTE May 20, 2026
  • How Cloud Quantum Computers Could Become More Trustworthy How Cloud Quantum Computers Could Become More Trustworthy May 20, 2026
  • Quantinuum Expands Quantum Leadership with Synopsys Quantum Quantinuum Expands Quantum Leadership with Synopsys Quantum May 20, 2026
View all
  • QeM Inc Reaches Milestone with Q1 2026 Financial Results QeM Inc Reaches Milestone with Q1 2026 Financial Results May 23, 2026
  • Arqit Quantum Stock News: 2026 First Half Financial Results Arqit Quantum Stock News: 2026 First Half Financial Results May 22, 2026
  • Sygaldry Technologies Raises $139M to Quantum AI Systems Sygaldry Technologies Raises $139M to Quantum AI Systems May 18, 2026
  • NSF Launches $1.5B X-Labs to Drive Future Technologies NSF Launches $1.5B X-Labs to Drive Future Technologies May 16, 2026
  • IQM and Real Asset Acquisition Corp. Plan $1.8B SPAC Deal IQM and Real Asset Acquisition Corp. Plan $1.8B SPAC Deal May 16, 2026
  • Infleqtion Q1 Financial Results and Quantum Growth Outlook Infleqtion Q1 Financial Results and Quantum Growth Outlook May 15, 2026
  • Xanadu First Quarter Financial Results & Business Milestones Xanadu First Quarter Financial Results & Business Milestones May 15, 2026
  • Santander Launches The Quantum AI Leap Innovation Challenge Santander Launches The Quantum AI Leap Innovation Challenge May 15, 2026
  • CSUSM Launches Quantum STEM Education With National Funding CSUSM Launches Quantum STEM Education With National Funding May 14, 2026
View all
  • QTREX AME Technology May Alter Quantum Hardware Connectivity QTREX AME Technology May Alter Quantum Hardware Connectivity May 23, 2026
  • Quantum Spain: The Operational Era of MareNostrum-ONA Quantum Spain: The Operational Era of MareNostrum-ONA May 23, 2026
  • NVision Inc Announces PIQC for Practical Quantum Computing NVision Inc Announces PIQC for Practical Quantum Computing May 22, 2026
  • Xanadu QROM Innovation Ends Seven-Year Quantum Memory Stall Xanadu QROM Innovation Ends Seven-Year Quantum Memory Stall May 22, 2026
  • GlobalFoundries Quantum Computing Rise Drives U.S. Research GlobalFoundries Quantum Computing Rise Drives U.S. Research May 22, 2026
  • BlueQubit Platform Expands Access to Quantum AI Tools BlueQubit Platform Expands Access to Quantum AI Tools May 22, 2026
  • Oracle and Classiq Introduce Quantum AI Agents for OCI Oracle and Classiq Introduce Quantum AI Agents for OCI May 21, 2026
  • Kipu Quantum: Classical Surrogates for Quantum-Enhanced AI Kipu Quantum: Classical Surrogates for Quantum-Enhanced AI May 21, 2026
  • Picosecond low-Power Antiferromagnetic Quantum Switch Picosecond low-Power Antiferromagnetic Quantum Switch May 21, 2026
View all
  • Terra Quantum Quantum-Secure Platform for U.S. Air Force Terra Quantum Quantum-Secure Platform for U.S. Air Force May 23, 2026
  • Merqury Cybersecurity and Terra Quantum’s Secured Data Link Merqury Cybersecurity and Terra Quantum’s Secured Data Link May 23, 2026
  • ESL Shipping Ltd & QMill Companys Fleet Optimization project ESL Shipping Ltd & QMill Companys Fleet Optimization project May 23, 2026
  • Pasqals Logical Qubits Beat Physical Qubits on Real Hardware Pasqals Logical Qubits Beat Physical Qubits on Real Hardware May 22, 2026
  • Rail Vision Limited Adds Google Dataset to QEC Transformer Rail Vision Limited Adds Google Dataset to QEC Transformer May 22, 2026
  • Infleqtion Advances Neutral-Atom Quantum Computing Infleqtion Advances Neutral-Atom Quantum Computing May 21, 2026
  • Quantinuum News in bp Collaboration Targets Seismic Image Quantinuum News in bp Collaboration Targets Seismic Image May 21, 2026
  • ParityQC Achieves 52-Qubit Quantum Fourier Transform on IBM ParityQC Achieves 52-Qubit Quantum Fourier Transform on IBM May 21, 2026
  • PacketLight And Quantum XChange Inc Optical Network Security PacketLight And Quantum XChange Inc Optical Network Security May 21, 2026
View all
  • Quantum Computing Funding: $2B Federal Investment in U.S Quantum Computing Funding: $2B Federal Investment in U.S May 22, 2026
  • Quantum Bridge Technologies Funds $8M For Quantum Security Quantum Bridge Technologies Funds $8M For Quantum Security May 21, 2026
  • Nord Quantique Inc Raises $30M in Quantum Computing Funding Nord Quantique Inc Raises $30M in Quantum Computing Funding May 20, 2026
  • ScaLab: Advances Quantum Computing At Clemson University ScaLab: Advances Quantum Computing At Clemson University May 19, 2026
  • National Quantum Mission India Advances Quantum Innovation National Quantum Mission India Advances Quantum Innovation May 18, 2026
  • Amaravati Leads Quantum Computing in Andhra Pradesh Amaravati Leads Quantum Computing in Andhra Pradesh May 18, 2026
  • Wisconsin Technology Council Spotlights Quantum Industries Wisconsin Technology Council Spotlights Quantum Industries May 18, 2026
View all

Search

Latest Posts

  • Scaleway & QbitSoft Launch European Quantum Adoption Program May 23, 2026
  • Terra Quantum Quantum-Secure Platform for U.S. Air Force May 23, 2026
  • Merqury Cybersecurity and Terra Quantum’s Secured Data Link May 23, 2026
  • USC Quantum Computing Advances National Security Research May 23, 2026
  • QTREX AME Technology May Alter Quantum Hardware Connectivity May 23, 2026

Tutorials

  • Quantum Computing
  • IoT
  • Machine Learning
  • PostgreSql
  • BlockChain
  • Kubernettes

Calculators

  • AI-Tools
  • IP Tools
  • Domain Tools
  • SEO Tools
  • Developer Tools
  • Image & File Tools

Imp Links

  • Free Online Compilers
  • Code Minifier
  • Maths2HTML
  • Online Exams
  • Youtube Trend
  • Processor News
© 2026 Quantum Computing News. All rights reserved.
Back to top