2009
DOI: 10.1016/j.chaos.2007.08.013
|View full text |Cite
|
Sign up to set email alerts
|

Applications of tripled chaotic maps in cryptography

Abstract: Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them fundamentally were flawed by a lack of robustness and security. For getting higher security and higher complexity, in the current paper, we introduce a new kind of symmetric key block cipher algorithm that is based on \emph{tripled chaotic maps}. In this algor… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(19 citation statements)
references
References 32 publications
0
19
0
Order By: Relevance
“…Due to these properties, chaotic systems have become a very good candidate for use in the field of cryptography. The existing related research progress includes chaos-based symmetric encryptions [1][2][3][4][5][6][7], security protocols [8,9], asymmetric encryptions [10,11], and hash functions [12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Due to these properties, chaotic systems have become a very good candidate for use in the field of cryptography. The existing related research progress includes chaos-based symmetric encryptions [1][2][3][4][5][6][7], security protocols [8,9], asymmetric encryptions [10,11], and hash functions [12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…To the best of our knowledge, only a few chaos-based hash functions with high-dimensional dynamical systems have been reported http://asp.eurasipjournals.com/content/2013/1/126 [30,32,38]. For instance, an algorithm for image encryption based on a high-dimensional chaotic map with high efficiency is proposed in [4]. The high-dimensional chaotic maps [4] possess remarkable dynamical properties such as invariant measure, ergodicity, the possibility of KS-entropy calculation, and bifurcation without any period doubling [4,39,40].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Statistical analysis helps to demonstrate the strength of cryptography algorithms [18] . It is well known that many zero-knowledge proof of identity protocols have been successfully proved and analyzed by using statistical analysis.…”
Section: Discussionmentioning
confidence: 99%
“…With such properties, chaos-based hash algorithms have consequently been of much interest as an alternative to those of typical hash functions. Several chaos-based hash function algorithms have been proposed recently [6][7][8][9]. Despite the fact that these algorithms have offered satisfied statistical performances in terms of statistical performance and collision resistance, the difficulty in small key space, flexibility, low performance, and weak security functions are obstacles that elevate an attempt in designing efficient and secure hash functions.…”
Section: Introductionmentioning
confidence: 99%