Cryptography with cycling chaos

نویسندگان

  • A. Palacios
  • H. Juarez
چکیده

Periodic switching of cryptographic keys is commonly employed as a mechanism to enhance the security of encryption methods. In this Letter, cycling chaos, in which orbits of certain coupled iterated maps make periodic excursions between chaotic sets, is proposed as a new encryption approach that combines chaotic behavior with periodic switching of keys. The actual encryption process is similar to the one used by Baptista [Phys. Lett. A (1998) 50], except that now different chaotic attractors, and consequently different keys, are periodically switched to encrypt each character of a message. Advantages and disadvantages of this approach are also discussed.  2002 Elsevier Science B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving security of double random phase encoding with chaos theory using fractal images

This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...

متن کامل

Cycling Chaos in One-Dimensional Coupled Iterated Maps

Cycling behavior involving steady-states and periodic solutions is known to be a generic feature of continuous dynamical systems with symmetry. Using Chua’s circuit equations and Lorenz equations, Dellnitz et al. [1995] showed that “cycling chaos”, in which solution trajectories cycle around symmetrically related chaotic sets, can also be found generically in coupled cell systems of differentia...

متن کامل

Chaos-based Pseudo-Random Number Generators and Chip Implementation

Cryptography as an ancient subject is endowed with new vigor by chaos theory. Cryptography protects the security of today’s ubiquitous Internet communication, which as an open network is vulnerable to attack. In this paper, chaos-based cryptography is surveyed with focus on designing chaotic pseudo-random number generators (CPRNGs) for stream cipher and their chip implementation. The properties...

متن کامل

Survey Report on Chaos Based Public-key Cryptosystem

In recent years, encryption technology has been developed rapidly the chaos based cryptographic algorithms. Chaos owns certain critical properties such as sensitive dependence on initial condition, random-like behavior, and continuous broadband power spectrum, which match the confusion, diffusion, and key sensitivity requirements for cryptography. Chaos based cryptographic offer sundry features...

متن کامل

Chaos-based Cryptography: an overview

We review some of the recent work on chaos-based cryptography. We argue that if a chaotic map f is used in cryptography, then it should be implemented as a bijection FM : D → D, where D is a finite set with cardinality M, such that, for large M, FM ‘approximates well’ the chaotic map f . Several examples, including chaotic block cypher and chaotic public-key encryption algorithm, are given.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002