نتایج جستجو برای: multiple chaotic maps

تعداد نتایج: 879192  

2011
XINGYUAN WANG YISONG TAN

In this paper, the authors propose a new chaotic block cryptosystem based on multiple one-dimensional chaotic maps. In the proposed cryptosystem, the authors establish map-to-task relations between the multiple chaotic maps and the tasks, which must be performed in the encryption rounds. The encryption process is based on these map-to-task relations. The authors enhance the security of the cryp...

1999
J. S. CANOVAS Shihai Li

The aim of this paper is to prove the following results: a continuous map f : [0, 1]→ [0, 1] is chaotic iff the shift map σf : lim ← ([0, 1], f)→ lim ← ([0, 1], f) is chaotic. However, this result fails, in general, for arbitrary compact metric spaces. σf : lim ← ([0, 1], f) → lim ← ([0, 1], f) is chaotic iff there exists an increasing sequence of positive integers A such that the topological s...

2010
David Arroyo Shujun Li José Maŕıa Amigó Gonzalo Alvarez Rhouma Rhouma

This paper studies the security of a recently proposed chaos-based cryptosystem. It is shown that the encryption architecture of this cryptosystem possesses some important problems related to its implementation and its robustness against noise. Some security problems are also highlighted.

2012
Indranil Bhaumik Binayak S. Choudhury

In this short note we discuss totally transitive maps. We show that all chaotic maps are not necessarily totally transitive, but there are chaotic maps with this property. Our discussion relates to symbol space Σ2 and real line.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1375

in chapter one we will describe definitions and preliminary results to provide the global context of our own results to be presented in detail in the subsequent chapters in chapter two we consider degree-one maps of the circle and we study their rotation set. our main result in this chapter says that if the map is topologically mixing then its rotation interval is nontrivial (that is, not reduc...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده برق و کامپیوتر 1390

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

Journal: :International Journal of Network Security & Its Applications 2011

Journal: :EURASIP J. Wireless Comm. and Networking 2017
Leonard Novosel Gordan Sisul

In this paper, bit error performance evaluation of chaotic sequences is presented. Performance of chaotic sequences is evaluated on multiple access spread spectrum system model for USRP software defined radio. LabVIEW is used to perform numerical simulations and bit error rate analysis. Chaotic sequences of different lengths are generated using one-dimensional, two-dimensional, and three-dimens...

2003
N. K. Pareek Vinod Patidar

Recently, Pareek et al. [Phys. Lett. A 309 (2003) 75] have developed a symmetric key block cipher algorithm using a one-dimensional chaotic map. In this paper, we propose a symmetric key block cipher algorithm in which multiple one-dimensional chaotic maps are used instead of a one-dimensional chaotic map. However, we also use an external secret key of variable length (maximum 128-bits) as used...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید