Chaos-based Cryptography. a Possible Solution for Information Security
نویسندگان
چکیده
The development of the new information security systems based on chaos theory represents a new research field in communication and information technology domain. Cryptography is a permanent field of interest at all times. At present secret communication plays an increasing role in many fields of common life, like banking, industry, and telecommunication. In this paper we present some aspects regarding the chaosbased cryptography stage. The essence of the theoretical and practical efforts which are done in this new field is represented by the idea that chaos-based cryptosystem is capable to have similar performances regarding the classic methods based on computational techniques. We show that some of these performances are obtained using several well-known chaotic ciphers.
منابع مشابه
Improving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملChaos-Based Symmetric Key Cryptosystems
Chaos theory is the study of dynamical systems that are highly sensitive to initial conditions and exhibit seemingly random behavior. From the perspective of cryptography and information security, randomness generated from entirely deterministic systems is a very appealing property. As such, the application of chaos in modern cryptography has been a topic of much research and debate for over a ...
متن کاملA chaos-based video watermarking algorithm
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...
متن کاملCryptanalysis of a one round chaos-based Substitution Permutation Network
The interleaving of chaos and cryptography has been the aim of a large set of works since the beginning of the nineties. Many encryption proposals have been introduced to improve conventional cryptography. However, many of those proposals possess serious problems according to the basic requirements for the secure exchange of information. In this paper we highlight some of the main problems of c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009