منابع مشابه
Public-channel cryptography using chaos synchronization.
We present a key-exchange protocol that comprises two parties with chaotic dynamics that are mutually coupled and undergo a synchronization process, at the end of which they can use their identical dynamical state as an encryption key. The transferred coupling- signals are based nonlinearly on time-delayed states of the parties, and therefore they conceal the parties' current state and can be t...
متن کاملImplementing Symmetric Cryptography Using Chaos Functions
Chaos functions have mainly used to develop mathematical models of non linear systems. They have attracted the attention of many mathematicians owing to their extremely sensitive nature to initial conditions and their immense applicability to problems of daily life. In this paper we investigate the utility of such functions in symmetric key cryptography for secure communications. An algorithm u...
متن کاملCryptography based on Spatiotemporal Chaos System and Multiple Maps
In this paper, a stream image cryptography has been proposed based on spatiotemporal chaos system. It is specifically designed for the colored images, which are 3D arrays of data streams. One-way coupled map lattices (OCML) are used to generate pseudorandom sequences and then encrypt image pixels one by one. By iterating randomly chosen chaotic maps from a set of chaotic maps for certain times,...
متن کاملChaos and Cryptography
In his paper on chaos and cryptography, Baptista says ”It is possible to encrypt a message (a text composed by some alphabet) using the ergodic property of the simple low-dimensional and chaotic logistic equation. The basic idea is to encrypt each character of the message as the integer number of iterations performed in the logistic equation, in order to transfer the trajectory from an initial ...
متن کاملCryptography with cycling chaos
Periodic switching of cryptographic keys is commonly employed as a mechanism to enhance the security of encryption methods. In this Letter, cycling chaos, in which orbits of certain coupled iterated maps make periodic excursions between chaotic sets, is proposed as a new encryption approach that combines chaotic behavior with periodic switching of keys. The actual encryption process is similar ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2021
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1770/1/012092