Using different chaotic systems in secure communication, nonlinear control, and many other applications has revealed that these systems have several drawbacks in different aspects. This can cause unfavorable effects to chaos-based applications. Therefore, presenting a chaotic map with complex behaviors is considered important. In this paper, we introduce a new 2D chaotic map, namely, the 2D infinite-collapse-Sine model (2D-ICSM). Various metrics including Lyapunov exponents and bifurcation diagrams are used to demonstrate the complex dynamics and robust hyperchaotic behavior of the 2D-ICSM. Furthermore, the cross-correlation coefficient, phase space diagram, and Sample Entropy algorithm prove that the 2D-ICSM has a high sensitivity to initial values and parameters, extreme complexity performance, and a much larger hyperchaotic range than existing maps. To empirically verify the efficiency and simplicity of the 2D-ICSM in practical applications, we propose a symmetric secure communication system using the 2D-ICSM. Experimental results are presented to demonstrate the validity of the proposed system.
This paper presents an analysis toward estimating the algorithm running time on the Rabin-p cryptosystem. Next, we evaluate the memory cost for system parameters and accumulators for the Rabin-p encryption and decryption procedure, respectively. We then conduct a comparative analysis between three Rabin-like cryptosystems, namely the Rabin-p, the Rabin-Takagi and the HIME(R) cryptosystem. In summation, we conclude that Rabin-p cryptosystem performs faster and used less storage in comparison to the other two Rabin-like cryptosystems in consideration.
The present work introduces an analysis framework to comprehend the dynamics of a 3D plasma model, which has been proposed to describe the pellet injection in tokamaks. The analysis of the system reveals the existence of a complex transition from transient chaos to steady periodic behavior. Additionally, without adding any kind of forcing term or controllers, we demonstrate that the system can be changed to become a multi-stable model by injecting more power input. In this regard, we observe that increasing the power input can fluctuate the numerical solution of the system from coexisting symmetric chaotic attractors to the coexistence of infinitely many quasi-periodic attractors. Besides that, complexity analyses based on Sample entropy are conducted, and they show that boosting power input spreads the trajectory to occupy a larger range in the phase space, thus enhancing the time series to be more complex and random. Therefore, our analysis could be important to further understand the dynamics of such models, and it can demonstrate the possibility of applying this system for generating pseudorandom sequences.
Let N = pq be an RSA modulus where p and q are primes not necessarily of the same bit size. Previous cryptanalysis results on the difficulty of factoring the public modulus N = pq deployed on variants of RSA cryptosystem are revisited. Each of these variants share a common key relation utilizing the modified Euler quotient (p 2 − 1)(q 2 − 1), given by the key relation ed − k(p 2 − 1)(q 2 − 1) = 1 where e and d are the public and private keys respectively. By conducting continuous midpoint subdivision analysis upon an interval containing (p 2 − 1)(q 2 − 1) together with continued fractions on the key relation, we increase the security bound for d exponentially. INDEX TERMS Algebraic cryptanalysis, continued fractions method, integer factorization problem, RSA-variants.
Fermat’s Factoring Algorithm (FFA) is an integer factorisation methods factoring the modulus N using exhaustive search. The appearance of the Estimated Prime Factor (EPF) method reduces the cost of FFA’s loop count. However, the EPF does not work for balanced primes. This paper proposed the modified Fermat’s Factoring Algorithm 1-Estimated Prime Factor (mFFA1-EPF) that improves the EPF method. The algorithm works for factoring a modulus with unbalanced and balanced primes, respectively. The main results of mFFA1-EPF focused on three criteria: (i) the approach to select good candidates from a list of convergent continued fraction, (ii) the establishment of new potential initial values based on EPF, and (iii) the application of the above modification upon FFA. The resulting study shows the significant improvement that reduces the loop count of FFA1 via (improved) EPF compared to existing methods. The proposed algorithm can be executed without failure and caters for both the modulus N with unbalanced and balanced primes factor. The algorithm works for factoring a modulus with unbalanced and balanced primes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.