2011 International Conference on Multimedia, Signal Processing and Communication Technologies 2011
DOI: 10.1109/mspct.2011.6150443
|View full text |Cite
|
Sign up to set email alerts
|

Chaos based PN sequence generator for cryptographic applications

Abstract: Strength of cryptographic cipher depends on the statistical performance of its generated keystream. Generation of high quality keystream is a challenging task, which decides the level of security offered by the cipher. A lot of key generation techniques based on linear feedback shift registers for stream ciphering have been suggested in the literature. In this paper, the features of one-dimensional chaotic systems are exploited to construct a PN sequence generator. The integration of chaotic Logistic maps and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3
1

Relationship

4
5

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…It provides a way to stay secure against unauthorized access and tampering in an insecure communication channel. e usage of cryptographic primitives such as data encryption methods, hash functions, and pseudorandom number generators depends upon the area of applications [1][2][3][4]. A block cipher is a symmetric encryption mechanism that relies on one private key for successful encryption and decryption of data at the sender side and at the receiver side, respectively.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It provides a way to stay secure against unauthorized access and tampering in an insecure communication channel. e usage of cryptographic primitives such as data encryption methods, hash functions, and pseudorandom number generators depends upon the area of applications [1][2][3][4]. A block cipher is a symmetric encryption mechanism that relies on one private key for successful encryption and decryption of data at the sender side and at the receiver side, respectively.…”
Section: Introductionmentioning
confidence: 99%
“…Chaos-based cryptography has coveted to design and use the chaotic maps for the development of security methods such as multimedia encryption algorithms, watermarking, steganography, hash functions, substitution-box design, pseudorandom number generators, and authentication protocols [4,[30][31][32][33][34][35][36][37]. e robustness of these cryptographic primitives is significantly based on the dynamical characteristics of employed chaotic maps.…”
Section: Introductionmentioning
confidence: 99%
“…The major drawbacks include the unethical intrusion over the channels to steal the important information from the sender. To reduce the information leakage over the channels, various encryption methods [13,14] have been proposed. With the advancement in technology, the security of digital images has become more and more crucial since the communications of digital products over internet are taking place more and more frequently.…”
Section: Introductionmentioning
confidence: 99%
“…Chaotic systems have properties like sensitivity to the initial condition, long periods and high randomness which are useful to design a robust encryption algorithm. Some of the chaos based algorithms can be referred to in [2][3][4][5][6][7][8]. In addition to this, many new encryption algorithms have been developed which encrypt the image by reducing computation time to increase efficiency and provides ample security.…”
Section: Introductionmentioning
confidence: 99%