3,801 Hits in 5.7 sec

Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography [chapter]

Li Shujun, Mou Xuanqin, Cai Yuanlong
2001 Lecture Notes in Computer Science  
Detailed theoretical analyses show that it has perfect cryptographic properties, and can be used to construct stream ciphers with higher security than other chaotic ciphers.  ...  As a comprehensive solution to these problems, a novel pseudo-random bit generator based on a couple of chaotic systems called CCS-PRBG is presented.  ...  In fact, it is desired that a digital chaotic cipher can work well with a large number of chaotic systems; such a property is called chaotic-system-free in this paper.  ... 
doi:10.1007/3-540-45311-3_30 fatcat:zi4oe524rvclfbtxyg3klyxgtu

A Secure and Reliable Chat Room Application via Embedded Chaotic Encryption

Mohd Yusof
2002 The Smart Computing Review  
Encryption process will convert plaintext to cipher text. Decryption process will convert ciphertext to plaintext with enter a secret key. Chat room application was developed using JAVA.  ...  This application was tested with several experiments. The result indicates implementation of chaotic encryption make a chat room application more secure and reliable.  ...  Chat room application is become more secure and reliable with implementation of chaotic encryption.  ... 
doi:10.6029/smartcr.2012.02.006 fatcat:nwtozf4s3zctdmwixoos4gzeze

Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing

Piyush Shukla, Ankur Khare, Murtaza Rizvi, Shalini Stalin, Sanjay Kumar
2015 Entropy  
Chaotic masking and switching used for block and stream cipher in non-linear dynamic systems enhances the security, speed, accuracy and reliability of encryption systems without compromising the quality  ...  Complexity of the algorithms is also increased with large key size, large space complexity and high processing speed by using discrete time chaotic systems for internet banking and communication systems  ...  A new kind of chaotic encryption algorithm, duality chaos, is also proposed to overcome the limitations of chaotic systems for practical applications [42] .  ... 
doi:10.3390/e17031387 fatcat:4wc2ve5dzjexdge4hyuxbxutly


Seham Muawadh Ali Ebrahim
2020 Zenodo  
Then, these algorithms are used to secure the data, where the statistical properties of the cipher-text are also tested.  ...  mixed chaotic Henon maps, where each chaotic algorithm runs side-by-side andstarts with random initial conditions and parameters (encryption keys).  ...  ACKNOWLEDGEMENTS The writer would like to thank Prof.WafaeBoghdady and express her appreciation and gratitude for his scientific assistance, his consistent encouragement, and support  ... 
doi:10.5281/zenodo.4301343 fatcat:6g26irlsvzh4djq66pf5mc5f54

Evaluation of Aizawa Chaotic Map in Digital Image Protection

Terlumun Gbaden
To address the security and efficiency problems encountered by many existing permutation-diffusion type image ciphers the new scheme utilizes Aizawa chaotic map which enhances the security against known  ...  In recent years, great concerns have been raised regarding the issue of digital image protection due to the increasing demand for security services.  ...  Logistic map was the simplest chaotic system and had high potential to be used to design a stream cipher for real-time embedded systems.  ... 
doi:10.46912/napas.119 fatcat:b6qpvet3fndjphpjwmxv3uhfla

Chaotic encryption scheme for real-time digital video

Shujun Li, Xuan Zheng, Xuanqin Mou, Yuanlong Cai, Nasser Kehtarnavaz
2002 Real-Time Imaging VI  
Essentially speaking, CVES is a UNIVERSAL fast encryption system with high security, so it can be easily extended to other real-time applications. This paper is organized as follows.  ...  to estimate the security of the proposed chaotic ciphers [18, 19, 26, [31] [32] [33] [34] [35] [36] [37] [38] .  ...  Most chaotic ciphers must use specific chaotic maps to ensure the security, which will limit their wider applications.  ... 
doi:10.1117/12.458527 fatcat:p3dftne5cfd7rf4r6rrjrouqou


K.Nithhyaadevi, J.S.Jenin, G.Gandhimathi
2022 EPRA international journal of research & development  
The encryption quality is evaluated using the histogram analysis of the encrypted of cipher image with different keys generated using respective chaotic maps.  ...  It is necessary to secure the images that cannot be accessed by the unauthorized persons.  ...  The sub-cipher image is again XORed with key to get the cipher image. The system is shown in Figure . 1.  ... 
doi:10.36713/epra9653 fatcat:ahm3ek2wirhcnkqpxrtvin6hou

Chaotic based multimedia encryption: a survey for network and internet security

Obaida M. Al-hazaimeh, Ashraf A. Abu-Ein, Malek M. Al-Nawashi, Nasr Y. Gharaibeh
2022 Bulletin of Electrical Engineering and Informatics  
Randomness created from completely deterministic systems is a particularly appealing quality in the field of cryptography and information security.  ...  Nowadays the security of multimedia data storage and transfer is becoming a major concern.  ...  A chaotic map can be used in two ways in a cipher system: To begin, use chaotic systems to generate a pseudorandom key stream.  ... 
doi:10.11591/eei.v11i4.3520 fatcat:tthqz6kzwzhhzfrhb2mxbnh3bi

A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images

K.Sakthidasan Sankaran, B.V.Santhosh Krishna
2011 International Journal of Information and Education Technology  
This paper, a new image encryption scheme which employs one of the three dynamic chaotic systems (Lorenz or Chen or LU chaotic system selected based on 16-byte key) to shuffle the position of the image  ...  Recent researches of image encryption algorithms have been increasingly based on chaotic systems, but the drawbacks of small key space and weak security in onedimensional chaotic cryptosystems are obvious  ...  Therefore in the decryption process, the same chaotic systems with same confusion key are used to get the original position of the image.  ... 
doi:10.7763/ijiet.2011.v1.23 fatcat:kcropdrwyjat3e2cvbjmazazfu

An application of Chen system for secure chaotic communication based on extended Kalman filter and multi-shift cipher algorithm

Kia Fallahi, Reza Raoufi, Hossein Khoshbin
2008 Communications in nonlinear science & numerical simulation  
In the proposed system, a multi-shift cipher algorithm is also used to enhance the security and the key cipher is chosen as one of the chaos states.  ...  To illustrate the effectiveness of the proposed scheme, a numerical example based on Chen dynamical system is presented and the results are compared to two other chaotic systems.  ...  After that, the encrypted data is ciphered with n-cipher algorithm to enhance the security and as a result, it is more difficult to break the encryption.  ... 
doi:10.1016/j.cnsns.2006.07.006 fatcat:dtfwo5r7lfgydluicyeipddgci

LMI Fuzzy Observer Design for Cryptography in Wireless Mobile Communications

P. Sivakumar, N. Chitra, M. Rajaram
2013 International Journal of Intelligent Systems and Applications  
The fact that the cryptographic community had used discrete pseudo-chaotic systems for a long time to generate cipher keys that leads to the initiation of applying chaos to secure communicat ions.  ...  In receiver side, the fu zzy observer of chaotic system is designed based on the general Takag i-Sugeno fuzzy model. Th is approach leads to the design of communication systems with higher security.  ...  Conclusion In this paper, a secure communicat ion system based on Fuzzy logic observer for chaotic system is proposed to cryptographic applications.  ... 
doi:10.5815/ijisa.2013.08.08 fatcat:6dnhu7jktzgl7idrho2yklmb7a

Comparison of a Chaotic Cryptosystem with Other Cryptography Systems

A. S. Alshammari
2020 Engineering, Technology & Applied Science Research  
This technique was built on digitizing two Lorenz chaotic models to increase the security level.  ...  The proposed system utilizes two Lorenz generators, a main and an auxiliary, where the aim of the second one is to make one of the main Lorenz generator's parameters to vary continually with time in a  ...  Fig. 3 . 3 Alshammari: Comparison of a Chaotic Cryptosystem with Other Cryptography Systems Analog chaotic signal converted to digital signal.  ... 
doi:10.48084/etasr.3745 fatcat:w3g2yj2byjfjvbk7vyvq6kqcve

Chaotic Map based Block Encryption

Nisha Kushwah, Madhu Sharma
2013 International Journal of Computer Applications  
As, two logistic maps are used in order to obtain chaotic sequences with improved cryptographic feature.  ...  Tao Xiang , Kwok-wo Wong, Xiaofeng Liao in 2008 proposed an improved scheme by using a symmetric key block cipher algorithm in which one-dimensional chaotic maps are used, in order to obtain chaotic sequences  ...  These systems appear spontaneously in nature and can be directly applied to security processes. The properties of chaotic systems have been used in very different ways to build new cryptosystems.  ... 
doi:10.5120/12442-9134 fatcat:npd22qkjmjdqrewyswrzu6uilu

An Effective Image Encryption Algorithm Using Bit Reversal Permutation and a New Chaotic Wind Map

Hidayet OĞRAŞ, Mehmet Rıda TÜR
Highlights • To create a new chaotic map. • Confidential image in power systems. • This is a satisfactory security.  ...  Compared to most frequently used and well known chaotic maps, such as Logistic map, Sine map or Tent map, a new chaotic system based on Logistic map with Sine map is designed and used as an encryption  ...  As a result, using chaotic system with a large Lyapunov value significantly contributes to the security of the algorithm in data encryption.  ... 
doi:10.35378/gujs.872818 fatcat:qifv3j3iezgppogbf67mbn62uq

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems

Ma Junming, Ye Ruisong
2015 International Journal of Computer Network and Information Security  
Firstly, a hyper-chaotic differential equation system is used to generate two hyper-chaotic orbit sequences.  ...  Introducing the idea of hybrid orbit, two orbits are mixed to generate a hybrid hyper-chaotic sequence which is used to be the initial chaotic key stream.  ...  With high-level security, it can be used in internet applications, such as network security and secure image communications. Fig. 1 . 1 Fig.1. The phase diagrams of hyper-chaotic sequence pairs.  ... 
doi:10.5815/ijcnis.2015.05.04 fatcat:335qtiufaba6ddc3jfxcgpulrm
« Previous Showing results 1 — 15 out of 3,801 results