Applications of tripled chaotic maps in cryptography
From MaRDI portal
Publication:602178
DOI10.1016/J.CHAOS.2007.08.013zbMATH Open1197.94177arXiv0705.2633OpenAlexW1981949417WikidataQ56866140 ScholiaQ56866140MaRDI QIDQ602178FDOQ602178
S. Behnia, A. Akhshani, A. Akhavan, H. Mahmodi
Publication date: 31 October 2010
Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)
Abstract: Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them fundamentally were flawed by a lack of robustness and security. For getting higher security and higher complexity, in the current paper, we introduce a new kind of symmetric key block cipher algorithm that is based on emph{tripled chaotic maps}. In this algorithm, the utilization of two coupling parameters, as well as the increased complexity of the cryptosystem, make a contribution to the development of cryptosystem with higher security. In order to increase the security of the proposed algorithm, the size of key space and the computational complexity of the coupling parameters should be increased as well. Both the theoretical and experimental results state that the proposed algorithm has many capabilities such as acceptable speed and complexity in the algorithm due to the existence of two coupling parameter and high security. Note that the ciphertext has a flat distribution and has the same size as the plaintext. Therefore, it is suitable for practical use in secure communications.
Full work available at URL: https://arxiv.org/abs/0705.2633
Recommendations
- A block cipher based on a suitable use of the chaotic standard map
- Cryptography using multiple one-dimensional chaotic maps
- CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPS
- Color image encryption based on coupled nonlinear chaotic map
- A novel image encryption algorithm based on a 3D chaotic map
Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Cryptography (94A60) Applications of dynamical systems (37N99)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Synchronization in chaotic systems
- Chaos, fractals, and noise: Stochastic aspects of dynamics.
- Communication Theory of Secrecy Systems*
- Title not available (Why is that?)
- Title not available (Why is that?)
- YET ANOTHER CHAOTIC ATTRACTOR
- A chaotic cryptography scheme for generating short ciphertext
- A symmetric image encryption scheme based on 3D chaotic cat maps
- Breaking parameter modulated chaotic secure communication system
- A novel block cryptosystem based on iterating a chaotic map
- Title not available (Why is that?)
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- An Introduction to Chaos in Nonequilibrium Statistical Mechanics
- On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision
- Title not available (Why is that?)
- Cryptography with chaos
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- A combined chaotic cryptographic and hashing scheme
- A NOVEL FAST IMAGE ENCRYPTION SCHEME BASED ON 3D CHAOTIC BAKER MAPS
- A novel method for designing S-boxes based on chaotic maps
- Chaos and cryptography
- Analysis of some recently proposed chaos-based encryption algorithms
- An efficient entire chaos-based scheme for deniable authentication
- Security analysis of communication system based on the synchronization of different order chaotic systems
- An image encryption approach based on chaotic maps
- A novel algorithm for image encryption based on mixture of chaotic maps
- CLARIFYING CHAOS: EXAMPLES AND COUNTEREXAMPLES
- A fast chaotic cryptographic scheme with dynamic look-up table
- Hierarchy of chaotic maps with an invariant measure.
- A modified chaotic cryptographic method
- Security problems with a chaos-based deniable authentication scheme
- A more secure chaotic cryptographic scheme based on the dynamic look-up table
- Title not available (Why is that?)
- PROBLEMS WITH A PROBABILISTIC ENCRYPTION SCHEME BASED ON CHAOTIC SYSTEMS
- A new chaotic cryptosystem
Cited In (7)
- Design 2D nonlinear system for information storage
- Chaotic Synchronization of CNNs in Small-World Topology Applied to Data Encryption
- Performance improvement of chaotic encryption via energy and frequency location criteria
- A chaotic block cipher algorithm for image cryptosystems
- An image encryption scheme based on quantum logistic map
- Color image encryption based on coupled nonlinear chaotic map
- Pseudo-random bit generator based on multi-modal maps
This page was built for publication: Applications of tripled chaotic maps in cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q602178)