A Cryptosystem Based on Iterations of Chaotic Map with Variable Parameter

نویسندگان

  • Shuichi AONO
  • Yoshifumi NISHIO
چکیده

A chaotic map has sensitivity to changes in the initial conditions and parameters, and a long-term forecast becomes impossible by iterating a chaotic map. These features look similar to the features of cryptology. For this reason, it is effective to use chaotic maps for cryptosystems. In this research, we investigate features of the modified cut map when the parameters αi are changed. We use the parameter αi as shared secret key in the cryptosystem. Hence, it is important for the security of the proposed cryptosystem to investigate the relation between the generated sequences and the parameters. It influences the vulnerability of the cryptosystem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A More Secure Chaos Based Encryption System with High Compression Capability

The Baptista cryptosystem uses the logistic map to generate chaotic sequence. The encryption process of a given plaintext character consists of iterating the chaotic map until the state reaches the subinterval assigned to that symbol. The cipher text corresponding to the plaintext symbol is the number of iterations in the chaotic map. We propose a method to enhance the security and compression ...

متن کامل

A Cryptosystem Using Expansion of Chaotic Map

A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by iterations of a chaotic map. These features look similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. In this research, we propose a cryptosystem using iterations of a chaotic map. This cryptosystem uses ex...

متن کامل

Improvement of a Cryptosystem Using Two Chaotic Maps

A chaotic map has various features. A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by the iterations of a chaotic map. These features looks similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. The chaotic cryptosystem is researched as an application of cha...

متن کامل

Cryptanalysis of a discrete chaotic cryptosystem using external key

In recent years, a growing number of cryptosystems based on chaos have been proposed, many of them fundamentally flawed by a lack of robustness and security. In this Letter, we explain how to break a very recent block cipher algorithm based on the logistic map. This cryptosystem uses a 128-bit external key to derive the initial condition and number of iterations, but in a weak way allowing for ...

متن کامل

Cryptography using multiple one-dimensional chaotic maps

Recently, Pareek et al. [Phys. Lett. A 309 (2003) 75] have developed a symmetric key block cipher algorithm using a one-dimensional chaotic map. In this paper, we propose a symmetric key block cipher algorithm in which multiple one-dimensional chaotic maps are used instead of a one-dimensional chaotic map. However, we also use an external secret key of variable length (maximum 128-bits) as used...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008