Randomness and disorder of chaotic iterations. Applications in information security field
نویسندگان
چکیده
Design and cryptanalysis of chaotic encryption schemes are major concerns to provide secured information systems. Pursuing our previous research works, some well-defined discrete chaotic iterations that satisfy the reputed Devaney’s definition of chaos have been proposed. In this article, we summarize these contributions and propose applications in the fields of pseudorandom number generation, hash functions, and symmetric cryptography. For all these applications, the proofs of chaotic properties are outlined.
منابع مشابه
Chaotic-based Particle Swarm Optimization with Inertia Weight for Optimization Tasks
Among variety of meta-heuristic population-based search algorithms, particle swarm optimization (PSO) with adaptive inertia weight (AIW) has been considered as a versatile optimization tool, which incorporates the experience of the whole swarm into the movement of particles. Although the exploitation ability of this algorithm is great, it cannot comprehensively explore the search space and may ...
متن کاملSuitability of chaotic iterations schemes using XORshift for security applications
The design and engineering of original cryptographic solutions is a major concern to provide secure information systems. In a previous study, we have described a generator based on chaotic iterations, which uses the well-known XORshift generator. By doing so, we have improved the statistical performances of XORshift and make it behave chaotically, as defined by Devaney. The speed and security o...
متن کاملThe topology of chaotic iterations
Chaotic iterations have been introduced on the one hand by Chazan, Miranker [6] and Miellou [10] in a numerical analysis context, and on the other hand by Robert [12] and Pellegrin [11] in the discrete dynamical systems framework. In both cases, the objective was to derive conditions of convergence of such iterations to a fixed state. In this paper, a new point of view is presented, the goal he...
متن کاملChaotic iterations and topological chaos
Chaotic iterations have been introduced on the one hand by Chazan, Miranker [5] and Miellou [9] in a numerical analysis context, and on the other hand by Robert [11] and Pellegrin [10] in the discrete dynamical systems framework. In both cases, the objective was to derive conditions of convergence of such iterations to a fixed state. In this paper, a new point of view is presented, the goal her...
متن کاملA Pseudo Random Numbers Generator Based on Chaotic Iterations: Application to Watermarking
In this paper, a new chaotic pseudo-random number generator (PRNG) is proposed. It combines the well-known ISAAC and XORshift generators with chaotic iterations. This PRNG possesses important properties of topological chaos and can successfully pass NIST and TestU01 batteries of tests. This makes our generator suitable for information security applications like cryptography. As an illustrative ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1611.08422 شماره
صفحات -
تاریخ انتشار 2016