Implementing Symmetric Cryptography Using Chaos Functions
نویسندگان
چکیده
Chaos functions have mainly used to develop mathematical models of non linear systems. They have attracted the attention of many mathematicians owing to their extremely sensitive nature to initial conditions and their immense applicability to problems of daily life. In this paper we investigate the utility of such functions in symmetric key cryptography for secure communications. An algorithm using one of the simplest chaotic functions f(x)=4*x*(1-x) is proposed. The algorithm is compared with the DES algorithm which has by far been the most widely used standard for symmetric key cryptography. The algorithm is proved to be much more secure than the DES algorithm. However it has a higher computation cost. Practical applications of the algorithm are also suggested.
منابع مشابه
Improving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملChaos-Based Symmetric Key Cryptosystems
Chaos theory is the study of dynamical systems that are highly sensitive to initial conditions and exhibit seemingly random behavior. From the perspective of cryptography and information security, randomness generated from entirely deterministic systems is a very appealing property. As such, the application of chaos in modern cryptography has been a topic of much research and debate for over a ...
متن کاملChaos Based Cryptography
This paper shall discuss the design of a Chaos based symmetric key cryptosystem. The structure of two contemporary symmetric key encryption schemes using the Logistic map is discussed and their performance is evaluated based on a battery of tests and some qualitative measures. It is deduced that one scheme performs far better than the other. It is then experimentally shown that the performance ...
متن کاملA Survey to Design Privacy Preserving Protocol Using Chaos Cryptography
Chaos theory has been widely studied and adapted in cryptography for achieving some security mechanisms, such as encryption/decryption, key agreement and hash function. The privacy of using chaos cryptography mostly relies on one of or the combination of three mechanisms: (1) Universal construction symmetric cryptography; (2) Efficient type multiplication in finite field; (3) Prudent operation ...
متن کاملImplementation of AES and RSA Using Chaos System
In this paper we propose two cryptographic algorithm AES and RSA Using Chaos. Chaos has attracted much attention in the field of cryptography. It describes a system which is sensitive to initial condition. It generates apparently random behavior but at the same time is completely deterministic Chaos function is used to increase the complexity and Security of the System.AES and RSA are the two c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002