Survey Report on Chaos Based Public-key Cryptosystem
نویسندگان
چکیده
In recent years, encryption technology has been developed rapidly the chaos based cryptographic algorithms. Chaos owns certain critical properties such as sensitive dependence on initial condition, random-like behavior, and continuous broadband power spectrum, which match the confusion, diffusion, and key sensitivity requirements for cryptography. Chaos based cryptographic offer sundry features over the traditional encryption algorithms such as high security, speed, and sensible computational overheads and power. This paper presents a survey of public key encryption methods based on chaos system. Keywords— Chaos-based cryptography, Chaos System, Chaotic Map, Decryption, Encryption, Public key
منابع مشابه
QTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملEEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...
متن کاملChaotic Cryptographic Scheme Based on Composition Maps
In recent years, a growing number of cryptosystems based on chaos have been proposed. But most of them encountered more problems such as small key space and weak security. Based on such a fact, in the present report, a new kind of chaotic cryptosystem based on Composition of Trigonometric Chaotic Maps (CTCMs) is proposed. In the new scheme employs the composition map to shuffle the positions of...
متن کاملChaos Synchronization based Data Transmission with Asymmetric Encryption
In this article we consider the phenomena of chaos synchronization with bidirectional linear feedback coupling. The synchronized system can be used as a cryptosystem, where both the model can be considered as a transceiver. We have proposed an asymmetric cryptographic scheme for ensuring security of data being transmitted in the above manner. We utilize the recent disclosed ?AA?_? public key cr...
متن کاملImproving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes
This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem decreases up to 85 percent using a new efficient compression algorithm. Cryptanalytic methods show that the improved cryptosystem has a significant security advantage over Ra...
متن کامل