PRIVATE-KEY BLOCK CRYPTOSYSTEM USING TWO-DIMENSIONAL CHAOTIC MAP
نویسندگان
چکیده
منابع مشابه
A Cryptosystem Using Expansion of Chaotic Map
A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by iterations of a chaotic map. These features look similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. In this research, we propose a cryptosystem using iterations of a chaotic map. This cryptosystem uses ex...
متن کاملA Secret Key Cryptosystem by Iterating a Chaotic Map
Abstract Chaos i s introduced to cryptology. As an example of the applications, a secret key cryptosystem by iterating a one dimensional chaotic map i s proposed. This system is based on the characteristics of chaos, which are sensitivity of parameters, sensitivity of initial points, and randomness of sequences obtained by iterating a chaotic map. A ciphertext is obtained by the iteration of a ...
متن کاملImage encryption using the two-dimensional logistic chaotic map
Chaos maps and chaotic systems have been proved to be useful and effective for cryptography. In this paper, the two-dimensional logistic map with complicated basin structures and attractors are first used for image encryption. The proposed method adopts the classic framework of the permutation-substitution network in cryptography and thus ensures both confusion and diffusion properties for a se...
متن کاملCryptanalysis of a discrete chaotic cryptosystem using external key
In recent years, a growing number of cryptosystems based on chaos have been proposed, many of them fundamentally flawed by a lack of robustness and security. In this Letter, we explain how to break a very recent block cipher algorithm based on the logistic map. This cryptosystem uses a 128-bit external key to derive the initial condition and number of iterations, but in a weak way allowing for ...
متن کاملCryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map
Recently, a novel block encryption system has been proposed as an improved version of the chaotic cryptographic method based on iterating a chaotic map. In this Letter, a flaw of this cryptosystem is pointed out and a chosen plaintext attack is presented. Furthermore, a remedial improvement is suggested, which avoids the flaw while keeping all the merits of the original cryptosystem. © 2006 Els...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The International Conference on Electrical Engineering
سال: 1999
ISSN: 2636-4441
DOI: 10.21608/iceeng.1999.62284