منابع مشابه
A Stream Cipher Based on Chaotic Permutations
In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...
متن کاملAnalysis of chaotic vibration in a hexagonal centrifugal governor system
In this paper, the periodic, quasi periodic and chaotic responses of rotational machines with a hexagonal centrifugal governor are studied. The external disturbance is assumed as a sinusoid effect. By using the forth order Rung-Kutta numerical integration method, bifurcation diagram, largest Lyapunov exponent and Lyapunov dimension are calculated and presented to detect the critical controlling...
متن کاملConservative chaotic flow generated via a pseudo-linear system
Analysis of nonlinear autonomous systems has been a popular field of study in recent decades. As an interesting nonlinear behavior, chaotic dynamics has been intensively investigated since Lorenz discovered the first physical evidence of chaos in his famous equations. Although many chaotic systems have been ever reported in the literature, a systematic and qualitative approach for chaos generat...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
A stack-based chaotic algorithm for encryption of colored images
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology And Control
سال: 2020
ISSN: 2335-884X,1392-124X
DOI: 10.5755/j01.itc.49.2.24072