Journal ArticleDOI
Public-key encryption with chaos.
Reads0
Chats0
TLDR
This work proposes public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman, ElGamal, and Rabin, and shows that this algorithm is as secure as RSA algorithm.Abstract:
We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest–Shamir–Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.read more
Citations
More filters
Journal ArticleDOI
Cryptanalysis of the public key encryption based on multiple chaotic systems
TL;DR: Experimental result shows Ruanjan’s encryption technique is inefficient, and detailed theoretic analysis shows that the complexity to break the cryptosystem is overestimated.
Journal ArticleDOI
Encryption and decryption of images with chaotic map lattices
TL;DR: A secure algorithm for direct encryption and decryption of digital images with chaotic map lattices that converts, pixel by pixel, the image color to chaotic logistic maps one-way coupled by initial conditions.
Journal ArticleDOI
Theory and practice of chaotic cryptography
TL;DR: This Letter addresses some basic questions about chaotic cryptography, not least the very definition of chaos in discrete systems, and proposes a conceptual framework and illustrates it with different examples from private and public key cryptography.
Book ChapterDOI
Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers
TL;DR: The idea of using chaotic transformations in cryptography is explicit in the foundational papers of Shannon on secrecy systems and the number of proposals which exploited the properties of chaotic maps for cryptographical purposes, grew in a spectacular way.
IJCSI Publicity Board 2010
TL;DR: This paper presents a systematic analysis of a variety of different ad hoc network topologies in terms of node placement, node mobility and routing protocols through several simulated scenarios.
References
More filters
Book
The Art of Computer Programming
TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
Synchronization in chaotic systems
TL;DR: This chapter describes the linking of two chaotic systems with a common signal or signals and highlights that when the signs of the Lyapunov exponents for the subsystems are all negative the systems are synchronized.
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.