Randomness and disorder of chaotic iterations. Applications in information security field

نویسندگان

  • Xiaole Fang
  • Christophe Guyeux
  • Qianxue Wang
  • Jacques M. Bahi
چکیده

Design and cryptanalysis of chaotic encryption schemes are major concerns to provide secured information systems. Pursuing our previous research works, some well-defined discrete chaotic iterations that satisfy the reputed Devaney’s definition of chaos have been proposed. In this article, we summarize these contributions and propose applications in the fields of pseudorandom number generation, hash functions, and symmetric cryptography. For all these applications, the proofs of chaotic properties are outlined.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chaotic-based Particle Swarm Optimization with Inertia Weight for Optimization Tasks

Among variety of meta-heuristic population-based search algorithms, particle swarm optimization (PSO) with adaptive inertia weight (AIW) has been considered as a versatile optimization tool, which incorporates the experience of the whole swarm into the movement of particles. Although the exploitation ability of this algorithm is great, it cannot comprehensively explore the search space and may ...

متن کامل

Suitability of chaotic iterations schemes using XORshift for security applications

The design and engineering of original cryptographic solutions is a major concern to provide secure information systems. In a previous study, we have described a generator based on chaotic iterations, which uses the well-known XORshift generator. By doing so, we have improved the statistical performances of XORshift and make it behave chaotically, as defined by Devaney. The speed and security o...

متن کامل

The topology of chaotic iterations

Chaotic iterations have been introduced on the one hand by Chazan, Miranker [6] and Miellou [10] in a numerical analysis context, and on the other hand by Robert [12] and Pellegrin [11] in the discrete dynamical systems framework. In both cases, the objective was to derive conditions of convergence of such iterations to a fixed state. In this paper, a new point of view is presented, the goal he...

متن کامل

Chaotic iterations and topological chaos

Chaotic iterations have been introduced on the one hand by Chazan, Miranker [5] and Miellou [9] in a numerical analysis context, and on the other hand by Robert [11] and Pellegrin [10] in the discrete dynamical systems framework. In both cases, the objective was to derive conditions of convergence of such iterations to a fixed state. In this paper, a new point of view is presented, the goal her...

متن کامل

A Pseudo Random Numbers Generator Based on Chaotic Iterations: Application to Watermarking

In this paper, a new chaotic pseudo-random number generator (PRNG) is proposed. It combines the well-known ISAAC and XORshift generators with chaotic iterations. This PRNG possesses important properties of topological chaos and can successfully pass NIST and TestU01 batteries of tests. This makes our generator suitable for information security applications like cryptography. As an illustrative ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1611.08422  شماره 

صفحات  -

تاریخ انتشار 2016