Cryptography with cycling chaos
نویسندگان
چکیده
Periodic switching of cryptographic keys is commonly employed as a mechanism to enhance the security of encryption methods. In this Letter, cycling chaos, in which orbits of certain coupled iterated maps make periodic excursions between chaotic sets, is proposed as a new encryption approach that combines chaotic behavior with periodic switching of keys. The actual encryption process is similar to the one used by Baptista [Phys. Lett. A (1998) 50], except that now different chaotic attractors, and consequently different keys, are periodically switched to encrypt each character of a message. Advantages and disadvantages of this approach are also discussed. 2002 Elsevier Science B.V. All rights reserved.
منابع مشابه
Improving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملCycling Chaos in One-Dimensional Coupled Iterated Maps
Cycling behavior involving steady-states and periodic solutions is known to be a generic feature of continuous dynamical systems with symmetry. Using Chua’s circuit equations and Lorenz equations, Dellnitz et al. [1995] showed that “cycling chaos”, in which solution trajectories cycle around symmetrically related chaotic sets, can also be found generically in coupled cell systems of differentia...
متن کاملChaos-based Pseudo-Random Number Generators and Chip Implementation
Cryptography as an ancient subject is endowed with new vigor by chaos theory. Cryptography protects the security of today’s ubiquitous Internet communication, which as an open network is vulnerable to attack. In this paper, chaos-based cryptography is surveyed with focus on designing chaotic pseudo-random number generators (CPRNGs) for stream cipher and their chip implementation. The properties...
متن کاملSurvey Report on Chaos Based Public-key Cryptosystem
In recent years, encryption technology has been developed rapidly the chaos based cryptographic algorithms. Chaos owns certain critical properties such as sensitive dependence on initial condition, random-like behavior, and continuous broadband power spectrum, which match the confusion, diffusion, and key sensitivity requirements for cryptography. Chaos based cryptographic offer sundry features...
متن کاملChaos-based Cryptography: an overview
We review some of the recent work on chaos-based cryptography. We argue that if a chaotic map f is used in cryptography, then it should be implemented as a bijection FM : D → D, where D is a finite set with cardinality M, such that, for large M, FM ‘approximates well’ the chaotic map f . Several examples, including chaotic block cypher and chaotic public-key encryption algorithm, are given.
متن کامل