A Cryptosystem Based on Iterations of Chaotic Map with Variable Parameter
نویسندگان
چکیده
A chaotic map has sensitivity to changes in the initial conditions and parameters, and a long-term forecast becomes impossible by iterating a chaotic map. These features look similar to the features of cryptology. For this reason, it is effective to use chaotic maps for cryptosystems. In this research, we investigate features of the modified cut map when the parameters αi are changed. We use the parameter αi as shared secret key in the cryptosystem. Hence, it is important for the security of the proposed cryptosystem to investigate the relation between the generated sequences and the parameters. It influences the vulnerability of the cryptosystem.
منابع مشابه
A More Secure Chaos Based Encryption System with High Compression Capability
The Baptista cryptosystem uses the logistic map to generate chaotic sequence. The encryption process of a given plaintext character consists of iterating the chaotic map until the state reaches the subinterval assigned to that symbol. The cipher text corresponding to the plaintext symbol is the number of iterations in the chaotic map. We propose a method to enhance the security and compression ...
متن کاملA Cryptosystem Using Expansion of Chaotic Map
A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by iterations of a chaotic map. These features look similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. In this research, we propose a cryptosystem using iterations of a chaotic map. This cryptosystem uses ex...
متن کاملImprovement of a Cryptosystem Using Two Chaotic Maps
A chaotic map has various features. A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by the iterations of a chaotic map. These features looks similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. The chaotic cryptosystem is researched as an application of cha...
متن کاملCryptanalysis of a discrete chaotic cryptosystem using external key
In recent years, a growing number of cryptosystems based on chaos have been proposed, many of them fundamentally flawed by a lack of robustness and security. In this Letter, we explain how to break a very recent block cipher algorithm based on the logistic map. This cryptosystem uses a 128-bit external key to derive the initial condition and number of iterations, but in a weak way allowing for ...
متن کاملCryptography using multiple one-dimensional chaotic maps
Recently, Pareek et al. [Phys. Lett. A 309 (2003) 75] have developed a symmetric key block cipher algorithm using a one-dimensional chaotic map. In this paper, we propose a symmetric key block cipher algorithm in which multiple one-dimensional chaotic maps are used instead of a one-dimensional chaotic map. However, we also use an external secret key of variable length (maximum 128-bits) as used...
متن کامل