2002
DOI: 10.1103/physreve.66.017202
|View full text |Cite
|
Sign up to set email alerts
|

Steps towards improving the security of chaotic encryption

Abstract: We present a method in which a chaotic signal is used to mask a message securely. It depends on separating the two tasks of synchronizing the chaotic oscillators and encrypting the message. A sporadic drive together with a function f of the ciphertext and response system variables is used to make extraction difficult. We give a choice of f that makes the method similar to a one-time pad, with pseudorandom numbers provided by the chaos.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2004
2004
2014
2014

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…It reveals a highly variable and specific DPC language, providing the individual with a large bandwidth communication platform, a situation that has a close resemblance to chaotic communication setups. [16][17][18][19][20][21][22][23][24] Male D, in particular, widely uses this expression space, which indicates that during courtship, more than mere group membership is conveyed. Transferred information might even include behaviorally encoded details on the sender's genetic configuration, as the base for situation-dependent decisions such as the "better mate versus no mate" trade-off.…”
Section: Discussionmentioning
confidence: 99%
“…It reveals a highly variable and specific DPC language, providing the individual with a large bandwidth communication platform, a situation that has a close resemblance to chaotic communication setups. [16][17][18][19][20][21][22][23][24] Male D, in particular, widely uses this expression space, which indicates that during courtship, more than mere group membership is conveyed. Transferred information might even include behaviorally encoded details on the sender's genetic configuration, as the base for situation-dependent decisions such as the "better mate versus no mate" trade-off.…”
Section: Discussionmentioning
confidence: 99%
“…I, the basic difference between conventional cryptography and chaos cryptography is that the conventional encryption is defined on discrete sets and the chaos encryption is defined on continuous sets. This makes the keyspace behavior of chaotic systems very different from that of conventional systems [8,15]. Due to its continuous-value property, in chaos encryption systems keys that are not identical but are very close can still be used to synchronize the two systems very well, thus will form a key basin around the actual secret key [7,9,13,15].…”
Section: Error Function Attackmentioning
confidence: 99%
“…This makes the keyspace behavior of chaotic systems very different from that of conventional systems [8,15]. Due to its continuous-value property, in chaos encryption systems keys that are not identical but are very close can still be used to synchronize the two systems very well, thus will form a key basin around the actual secret key [7,9,13,15]. Because of this, Eve will not need to try all the keys in the keyspace; she can, according to the special characters of key basin, find some optimization method to systematically adjust the trial key k ′ untill k ′ = k. By this way, the cryptanalysis time can be greatly reduced.…”
Section: Error Function Attackmentioning
confidence: 99%
See 2 more Smart Citations