Chaos− based cryptography. A possible solution for information security

CI Rincu, A Serbanescu - Bulletin of the Transilvania University of …, 2009 - webbut.unitbv.ro
The development of new information security systems based on chaos theory represents a
new research field in the communication and information technology domain. Cryptography …

A basic framework for the cryptanalysis of digital chaos-based cryptography

D Arroyo, G Alvarez… - 2009 6th International Multi …, 2009 - ieeexplore.ieee.org
Chaotic cryptography is based on the properties of chaos as source of entropy. Many
different schemes have been proposed to take advantage of those properties and to design …

Notions of chaotic cryptography: Sketch of a chaos based cryptosystem

C Pellicer-Lostao, R Lopez-Ruiz - arXiv preprint arXiv:1203.4134, 2012 - arxiv.org
Chaotic cryptography describes the use of chaos theory (in particular physical dynamical
systems working in chaotic regime as part of communication techniques and computation …

Chaos-based cryptography: A brief look into an alternate approach to data security

A Sharif, NI Raihana, A Samsudin - Journal of Physics …, 2020 - iopscience.iop.org
The present scale of computing inevitably demanded increased level of data security, which
is the concern of cryptography. Security of the cipher depends on the strength of the key and …

[PS][PS] Chaos Cryptography: Protecting Data Using Chaos

J Lampton - Mississippi School for Mathematics and Science, 2002 - rkeene.org
The purpose of this paper is to investigate and merge the two worlds of cryptography and
chaos theory by creating a secure ciphering algorithm based on known Chaos equations …

Chaotic cryptography in digital world: state-of-the-art, problems and solutions

S Li, X Mou, Y Cai - Science Direct Working Paper No S1574-034X …, 2003 - papers.ssrn.com
Since 1989, many contributions have been devoted to the methods of using chaos to
construct digital ciphers. Although some chaotic ciphers have been known insecure and …

Lessons learnt from the cryptanalysis of chaos-based ciphers

G Alvarez, JM Amigó, D Arroyo, S Li - Chaos-Based Cryptography: Theory …, 2011 - Springer
Introduction The idea of using chaotic transformations in cryptography is explicit in the
foundational papers of Shannon on secrecy systems (eg,[96]). Although the word “chaos” …

[PDF][PDF] Chaos-based Cryptography: an overview

L Kocarev, JM Amigo… - Proceedings of the …, 2005 - scholar.archive.org
We review some of the recent work on chaos-based cryptography. We argue that if a chaotic
map f is used in cryptography, then it should be implemented as a bijection FM: D→ D …

Notions of chaotic cryptography: sketch of a chaos based cryptosystem

PL Carmen, LR Ricardo - Applied cryptography and network …, 2012 - books.google.com
Chaotic cryptography describes the use of chaos theory (in particular physical dynamical
systems working in chaotic regime as part of communication techniques and computation …

Cryptanalysis of chaotic ciphers

E Solak - Chaos-Based Cryptography: Theory, Algorithms and …, 2011 - Springer
Introduction Cryptanalysis is an integral part of any serious effort in designing secure
encryption algorithms. Indeed, a cryptosystem is only as secure as the most powerful known …