PRIVATE-KEY BLOCK CRYPTOSYSTEM USING TWO-DIMENSIONAL CHAOTIC MAP

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Cryptosystem Using Expansion of Chaotic Map

A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by iterations of a chaotic map. These features look similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. In this research, we propose a cryptosystem using iterations of a chaotic map. This cryptosystem uses ex...

متن کامل

A Secret Key Cryptosystem by Iterating a Chaotic Map

Abstract Chaos i s introduced to cryptology. As an example of the applications, a secret key cryptosystem by iterating a one dimensional chaotic map i s proposed. This system is based on the characteristics of chaos, which are sensitivity of parameters, sensitivity of initial points, and randomness of sequences obtained by iterating a chaotic map. A ciphertext is obtained by the iteration of a ...

متن کامل

Image encryption using the two-dimensional logistic chaotic map

Chaos maps and chaotic systems have been proved to be useful and effective for cryptography. In this paper, the two-dimensional logistic map with complicated basin structures and attractors are first used for image encryption. The proposed method adopts the classic framework of the permutation-substitution network in cryptography and thus ensures both confusion and diffusion properties for a se...

متن کامل

Cryptanalysis of a discrete chaotic cryptosystem using external key

In recent years, a growing number of cryptosystems based on chaos have been proposed, many of them fundamentally flawed by a lack of robustness and security. In this Letter, we explain how to break a very recent block cipher algorithm based on the logistic map. This cryptosystem uses a 128-bit external key to derive the initial condition and number of iterations, but in a weak way allowing for ...

متن کامل

Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map

Recently, a novel block encryption system has been proposed as an improved version of the chaotic cryptographic method based on iterating a chaotic map. In this Letter, a flaw of this cryptosystem is pointed out and a chosen plaintext attack is presented. Furthermore, a remedial improvement is suggested, which avoids the flaw while keeping all the merits of the original cryptosystem. © 2006 Els...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The International Conference on Electrical Engineering

سال: 1999

ISSN: 2636-4441

DOI: 10.21608/iceeng.1999.62284