scispace - formally typeset
Journal ArticleDOI

A stream cipher based on a spatiotemporal chaotic system

TLDR
Numerical investigation shows that the cryptographic properties of the generated keystream are satisfactory, and the cipher seems to have higher security, higher efficiency and lower computation expense than the stream cipher based on a spatiotemporal chaotic system proposed recently.
Abstract
A stream cipher based on a spatiotemporal chaotic system is proposed. A one-way coupled map lattice consisting of logistic maps is served as the spatiotemporal chaotic system. Multiple keystreams are generated from the coupled map lattice by using simple algebraic computations, and then are used to encrypt plaintext via bitwise XOR. These make the cipher rather simple and efficient. Numerical investigation shows that the cryptographic properties of the generated keystream are satisfactory. The cipher seems to have higher security, higher efficiency and lower computation expense than the stream cipher based on a spatiotemporal chaotic system proposed recently.

read more

Citations
More filters
Journal ArticleDOI

Color image encryption based on one-time keys and robust chaotic maps

TL;DR: A stream-cipher algorithm based on one-time keys and robust chaotic maps, in order to get high security and improve the dynamical degradation, and is suitable for application in color image encryption.
Journal ArticleDOI

Logistic chaotic maps for binary numbers generations

TL;DR: Two pseudorandom binary sequence generators, based on logistic chaotic maps intended for stream cipher applications, are proposed, which possess high linear complexity and very good statistical properties.
Journal ArticleDOI

Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator

TL;DR: Through the comparison to compound chaos with 2D baker and DES encryption methods, it is concluded that the new image encryption method with speed and high security solves the problem unable to resist chosen plaintext attack and low precision of one-dimensional chaotic function by perturbation.
Journal ArticleDOI

A novel image encryption scheme based on spatial chaos map

TL;DR: Several experimental results, key sensitivity tests, key space analysis, and statistical analysis show that the spatial chaos system for image cryptosystems provides an efficient and secure way for real time image encryption and transmission from the cryptographic viewpoint.
Journal ArticleDOI

Selective image encryption using a spatiotemporal chaotic system.

TL;DR: A universal selective image encryption algorithm, in which the spatiotemporal chaotic system is utilized, is proposed to encrypt gray-level images and is extended to encrypt RGB color images, showing high security and efficiency.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Journal ArticleDOI

A symmetric image encryption scheme based on 3D chaotic cat maps

TL;DR: The two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme that uses the 3D cat map to shuffle the positions of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks.
Book

Chaos and Nonlinear Dynamics: An Introduction for Scientists and Engineers

TL;DR: The phenomenology of chaos Towards a theory of nonlinear dynamics and chaos Quantifying chaos Special topics Appendices Index
Journal ArticleDOI

Cryptography with chaos

TL;DR: It is possible to encrypt a message using the ergodic property of the simple low-dimensional and chaotic logistic equation, in order to transfer the trajectory from an initial condition towards an ϵ-interval inside the logistic chaotic attractor.
Related Papers (5)