Improvement of a Cryptosystem Using Two Chaotic Maps

نویسندگان

  • Shuichi Aono
  • Masahiro Wada
  • Yoshifumi Nishio
چکیده

A chaotic map has various features. A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by the iterations of a chaotic map. These features looks similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. The chaotic cryptosystem is researched as an application of chaos in an engineering field [1-4]. On the other hand, the security of the chaotic cryptosystem is not investigated in detail. It is necessary to investigate the security and to clarify the vulnerability of the chaotic cryptosystem. A cryptosystem using the tent map has been proposed [5]. And a cryptosystem using two chaotic maps has been proposed [6]. This system performed encryption and decryption by using two chaotic maps, a skew tent map and a logistic map, and their inverse maps. In this research, we consider a chosen plaintext attack (CPA) for this cryptosystem. And we investigate vulnerability of the cryptosystem using two chaotic maps to CPA. We propose an effective method against this attack. The proposed method repeats the encryption process twice. We confirm that eavesdroppers cannot select the intended plaintext in the second encryption process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chaotic Map based Block Encryption

Number of cryptosystems based on chaos has been proposed, in recent years. Tao Xiang , Kwok-wo Wong, Xiaofeng Liao in 2008 proposed an improved scheme by using a symmetric key block cipher algorithm in which one-dimensional chaotic maps are used, in order to obtain chaotic sequences with better cryptographic feature. In this system, an encryption /decryption scheme was proposed, a cryptographic...

متن کامل

A New Chaotic Cryptosystem Based on Multiple One-dimensional Chaotic Maps

In this paper, the authors propose a new chaotic block cryptosystem based on multiple one-dimensional chaotic maps. In the proposed cryptosystem, the authors establish map-to-task relations between the multiple chaotic maps and the tasks, which must be performed in the encryption rounds. The encryption process is based on these map-to-task relations. The authors enhance the security of the cryp...

متن کامل

A New Pseudo-Random Number Generator Based on Two Chaotic Maps

A new pseudo-random number generator (PRNG) is proposed. The principle of the method consists in mixing chaotic maps produced from an input initial vector. The algorithm uses permutations whose positions are computed and indexed by a chaotic function based on linear congruences. The performance of this scheme is evaluated through statistical analysis. Such a cryptosystem lets appear significant...

متن کامل

Cryptography using multiple one-dimensional chaotic maps

Recently, Pareek et al. [Phys. Lett. A 309 (2003) 75] have developed a symmetric key block cipher algorithm using a one-dimensional chaotic map. In this paper, we propose a symmetric key block cipher algorithm in which multiple one-dimensional chaotic maps are used instead of a one-dimensional chaotic map. However, we also use an external secret key of variable length (maximum 128-bits) as used...

متن کامل

Design of identity-based digital signature schemes using extended chaotic maps

Inspired from the Identity-based cryptosystem proposed by Adi Shamir, and Boneh and Franklin, this paper designed a new Identity-based digital signature (ECM-IDS) scheme using extended chaotic maps. The ECM-IDS scheme is secure based on the difficulties of integer factorization problem.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006