Lessons learnt from the cryptanalysis of chaos-based ciphers

G Alvarez, JM Amigó, D Arroyo, S Li - Chaos-Based Cryptography: Theory …, 2011 - Springer
Introduction The idea of using chaotic transformations in cryptography is explicit in the
foundational papers of Shannon on secrecy systems (eg,[96]). Although the word “chaos” …

Cryptanalysis of chaotic ciphers

E Solak - Chaos-Based Cryptography: Theory, Algorithms and …, 2011 - Springer
Introduction Cryptanalysis is an integral part of any serious effort in designing secure
encryption algorithms. Indeed, a cryptosystem is only as secure as the most powerful known …

[PDF][PDF] Chaotic map cryptography and security

AN Pisarchik, M Zanin - Encryption: Methods, Software and Security, 2010 - academia.edu
In the last decade, chaos has emerged as a new promising candidate for cryptography
because many chaos fundamental characteristics such as a broadband spectrum …

Implementation and practical problems of chaos-based cryptography revisited

JS Teh, M Alawida, YC Sii - Journal of Information Security and Applications, 2020 - Elsevier
Chaos-based cryptography, since its inception, has become a widely published subject.
Despite the vast amount of contributions in the area, its applications in real-world scenarios …

Some hints for the design of digital chaos-based cryptosystems: lessons learned from cryptanalysis

D Arroyo, G Alvarez, S Li - IFAC Proceedings Volumes, 2009 - Elsevier
In this work we comment some conclusions derived from the analysis of recent proposals in
the field of chaos-based cryptography. These observations remark a number of major …

Cryptanalysis of an ergodic chaotic cipher

G Alvarez, F Montoya, M Romera, G Pastor - Physics letters a, 2003 - Elsevier
In recent years, a growing number of cryptosystems based on chaos have been proposed,
many of them fundamentally flawed by a lack of robustness and security. In this Letter, we …

[PDF][PDF] Analyses and new designs of digital chaotic ciphers

S Li - Ph. D. Dissertation, 2003 - researchgate.net
Since 1980s, the idea of using digital chaotic systems to design new ciphers has attracted
more and more attention. The use of chaos in cryptography depends on the natural relation …

Symmetric ciphers based on two-dimensional chaotic maps

J Fridrich - International Journal of Bifurcation and chaos, 1998 - World Scientific
In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on
a torus or on a square to create new symmetric block encryption schemes. A chaotic map is …

Chaos-based cryptography

JM Amigó - Intelligent computing based on chaos, 2009 - Springer
Introduction The story of chaos-based or “chaotic” cryptography is remarkable, for several
reasons. To begin with, it appeared outside conventional cryptography, first as an …

Chaos and cryptography: block encryption ciphers based on chaotic maps

G Jakimoski, L Kocarev - … transactions on circuits and systems i …, 2001 - ieeexplore.ieee.org
This paper is devoted to the analysis of the impact of chaos-based techniques on block
encryption ciphers. We present several chaos based ciphers. Using the well-known …