Global Information Lookup Global Information

Chaotic cryptology information


Chaotic cryptology is the application of mathematical chaos theory to the practice of cryptography, the study or techniques used to privately and securely transmit information with the presence of a third-party or adversary. Since first being investigated by Robert Matthews in 1989,[1] the use of chaos in cryptography has attracted much interest. However, long-standing concerns about its security and implementation speed continue to limit its implementation.[2][3][4][5][6]

Chaotic cryptology consists of two opposite processes: Chaotic cryptography and Chaotic cryptanalysis. Cryptography refers to encrypting information for secure transmission, whereas cryptanalysis refers to decrypting and deciphering encoded encrypted messages.

In order to use chaos theory efficiently in cryptography, the chaotic maps are implemented such that the entropy generated by the map can produce required Confusion and diffusion. Properties in chaotic systems and cryptographic primitives share unique characteristics that allow for the chaotic systems to be applied to cryptography.[7] If chaotic parameters, as well as cryptographic keys, can be mapped symmetrically or mapped to produce acceptable and functional outputs, it will make it next to impossible for an adversary to find the outputs without any knowledge of the initial values.[citation needed] Since chaotic maps in a real life scenario require a set of numbers that are limited, they may, in fact, have no real purpose in a cryptosystem if the chaotic behavior can be predicted.

One of the most important issues for any cryptographic primitive is the security of the system. However, in numerous cases, chaos-based cryptography algorithms are proved insecure.[5][8][9][10] The main issue in many of the cryptanalyzed algorithms is the inadequacy of the chaotic maps implemented in the system.[11][12]

  1. ^ "On the derivation of a “chaotic” encryption algorithm." Matthews, R.A.J. Cryptologia 13, no. 1 (1989): 29-42.
  2. ^ "Supercomputer investigations of a chaotic encryption algorithm" DD Wheeler, RAJ Matthews Cryptologia 15 (2), 140-152
  3. ^ Chen, Yong; Liao, Xiaofeng (2005-07-25). "Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm". Physics Letters A. 342 (5–6): 389–396. Bibcode:2005PhLA..342..389C. doi:10.1016/j.physleta.2005.05.048.
  4. ^ Xie, Eric Yong; Li, Chengqing; Yu, Simin; Lü, Jinhu (2017-03-01). "On the cryptanalysis of Fridrich's chaotic image encryption scheme". Signal Processing. 132: 150–154. arXiv:1609.05352. doi:10.1016/j.sigpro.2016.10.002. S2CID 12416264.
  5. ^ a b Akhavan, A.; Samsudin, A.; Akhshani, A. (2015-09-01). "Cryptanalysis of "an improvement over an image encryption method based on total shuffling"". Optics Communications. 350: 77–82. Bibcode:2015OptCo.350...77A. doi:10.1016/j.optcom.2015.03.079.
  6. ^ Akhavan, A.; Samsudin, A.; Akhshani, A. (2017-10-01). "Cryptanalysis of an image encryption algorithm based on DNA encoding". Optics & Laser Technology. 95: 94–99. Bibcode:2017OptLT..95...94A. doi:10.1016/j.optlastec.2017.04.022.
  7. ^ Baptista, M.S. (1998). "Cryptography with chaos". Physics Letters A. 240 (1–2): 50–54. Bibcode:1998PhLA..240...50B. doi:10.1016/s0375-9601(98)00086-3.
  8. ^ Li, Shujun; Zheng, Xuan (2002-01-01). "Cryptanalysis of a chaotic image encryption method". 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353) (PDF). Vol. 2. pp. II–708–II–711 vol.2. doi:10.1109/ISCAS.2002.1011451. ISBN 978-0-7803-7448-5. S2CID 14523625.
  9. ^ Cite error: The named reference :3 was invoked but never defined (see the help page).
  10. ^ Solak, Ercan; Çokal, Cahit; Yildiz, Olcay Taner; Biyikoğlu, Türker (2010-05-01). "Cryptanalysis of fridrich's chaotic image encryption". International Journal of Bifurcation and Chaos. 20 (5): 1405–1413. Bibcode:2010IJBC...20.1405S. CiteSeerX 10.1.1.226.413. doi:10.1142/S0218127410026563. ISSN 0218-1274.
  11. ^ Arroyo, David; Alvarez, Gonzalo; Fernandez, Veronica (2008-05-28). "On the inadequacy of the logistic map for cryptographic applications". arXiv:0805.4355 [nlin.CD].
  12. ^ Li, C. (January 2016). "Cracking a hierarchical chaotic image encryption algorithm based on permutation". Signal Processing. 118: 203–210. arXiv:1505.00335. doi:10.1016/j.sigpro.2015.07.008. S2CID 7713295.

and 10 Related for: Chaotic cryptology information

Request time (Page generated in 0.7876 seconds.)

Chaotic cryptology

Last Update:

Chaotic cryptology is the application of mathematical chaos theory to the practice of cryptography, the study or techniques used to privately and securely...

Word Count : 1682

Alternate reality game

Last Update:

Architeuthis, created for the U.S. Navy as a recruiting device for its cryptology division, won numerous awards, including the 2015 Warc Grand Prix for...

Word Count : 6379

Rule 30

Last Update:

classification scheme, Rule 30 is a Class III rule, displaying aperiodic, chaotic behaviour. This rule is of particular interest because it produces complex...

Word Count : 1619

Alice and Bob

Last Update:

"A Kilobit Hidden SNFS Discrete Logarithm Computation". Advances in Cryptology – EUROCRYPT 2017 (PDF). Lecture Notes in Computer Science. Vol. 10, 210...

Word Count : 2023

Coding theory

Last Update:

World War I and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread....

Word Count : 3546

Uesugi clan

Last Update:

Kakizaki Castle: Kakizaki Kageie Yasuda Castle: Yasuda Nagahide Japanese cryptology from the 1500s to Meiji Appert, Georges. (1888). Ancien Japon, p. 79....

Word Count : 1367

Block cipher

Last Update:

Steven; Nandi, Mridul (eds.). Progress in cryptology-- INDOCRYPT 2012 : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12...

Word Count : 6475

Neural cryptography

Last Update:

Shamir, Adi (2002). "Analysis of Neural Cryptography" (PDF). Advances in Cryptology. ASIACRYPT 2002. LNCS. Vol. 2501. pp. 288–298. doi:10.1007/3-540-36178-2_18...

Word Count : 2220

James Orlin Grabbe

Last Update:

featuring the Cuban pianist, Danilo Pina.[citation needed] Grabbe's cryptology-focused "The End of Ordinary Money" was published in the July 1995 edition...

Word Count : 2443

Wilhelm Fenner

Last Update:

was known by colleagues as someone who was keen to continue working in cryptology after World War II. To quote military historian David Alvarez: Wilhelm...

Word Count : 3000

PDF Search Engine © AllGlobal.net