2017
DOI: 10.1155/2017/9040518
|View full text |Cite
|
Sign up to set email alerts
|

A Chaos-Based Authenticated Cipher with Associated Data

Abstract: In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new 128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…The watermark embedding procedure requires an input cover color image and a watermark binary image to gain the watermarked image [23][24][25]. Fig.…”
Section: A the Procedures Of Watermark Embeddingmentioning
confidence: 99%
“…The watermark embedding procedure requires an input cover color image and a watermark binary image to gain the watermarked image [23][24][25]. Fig.…”
Section: A the Procedures Of Watermark Embeddingmentioning
confidence: 99%
“…A practical information measurement method was used to determine the maximum allowable parameter range, and a current mode skew tent circuit was designed to verify the method. Teh and Samsudin [64] proposed a new AEAD (authenticated encryption with associated data) scheme that was implemented with true random number generators based on the chaotic tent map. However, there were small periodic and unstable periodic points in the tent iteration sequence, it would degrade the random performance and reduce the security.…”
Section: Discrete Time Chaotic Oscillator Discrete Time Chaoticmentioning
confidence: 99%
“…The main features of the chaotic systems, such as the sensitive dependence on initial conditions and control parameters, ergodicity, size of the parameter space, and mixing property, can be related to the confusion and diffusion conditions that must be applied to information to be protected by using cryptographic systems [22]. Therefore, many cryptographic systems and modules have been proposed based on chaotic systems [22][23][24][25][26][27][28][29][30][31][32][33]. In particular, chaotic maps have been successfully applied in the implementation of PRNGs [14,15,31,[34][35][36][37][38][39][40][41][42].…”
Section: Introductionmentioning
confidence: 99%