2005
DOI: 10.1016/j.cnsns.2004.03.006
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography using multiple one-dimensional chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
99
0
8

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 194 publications
(107 citation statements)
references
References 9 publications
0
99
0
8
Order By: Relevance
“…Many researches in the field of using chaotic maps in cryptography have been developed [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16]. In [2], a cryptosystem, with a symmetric key block cipher, used an external key of variable length (maximum 128-bits) to generate system parameters and initial conditions of the chaotic map.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Many researches in the field of using chaotic maps in cryptography have been developed [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16]. In [2], a cryptosystem, with a symmetric key block cipher, used an external key of variable length (maximum 128-bits) to generate system parameters and initial conditions of the chaotic map.…”
Section: Related Workmentioning
confidence: 99%
“…In [4], another chaotic map-based technique was proposed, in which multiple one-dimensional chaotic maps are used instead of a one-dimensional chaotic map. This algorithm uses an external secret key of variable length (maximum 128 bits).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A sign extension bug in one publication of C code has been identified. In 1996, Serge Vaudenay [6] found a known-plaintext attack requiring 2 8r + 1 known plaintexts to break, where r is the number of rounds. Moreover, he also found a class of weak keys that can be detected and broken by the same attack with only 2 4r + 1 known plaintexts.…”
Section: Blowfish -Algorithm Descriptionmentioning
confidence: 99%
“…Blowfish algorithm [6] requires 521 encryptions of itself to generate the sub keys namely 18 entries in P arrays and 1024 entries in S boxes. The proposed design replaces the 521 encryptions by adapting chaos functions in order to generate highly non linear and key dependant P arrays and S boxes.…”
Section: Proposed Key Generation Designmentioning
confidence: 99%