scispace - formally typeset
Journal ArticleDOI

Public-key encryption with chaos.

Ljupco Kocarev, +3 more
- 15 Nov 2004 - 
- Vol. 14, Iss: 4, pp 1078-1082
Reads0
Chats0
TLDR
This work proposes public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman, ElGamal, and Rabin, and shows that this algorithm is as secure as RSA algorithm.
Abstract
We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest–Shamir–Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

read more

Citations
More filters
Journal ArticleDOI

Cryptanalysis of the public key encryption based on multiple chaotic systems

TL;DR: Experimental result shows Ruanjan’s encryption technique is inefficient, and detailed theoretic analysis shows that the complexity to break the cryptosystem is overestimated.
Journal ArticleDOI

Encryption and decryption of images with chaotic map lattices

TL;DR: A secure algorithm for direct encryption and decryption of digital images with chaotic map lattices that converts, pixel by pixel, the image color to chaotic logistic maps one-way coupled by initial conditions.
Journal ArticleDOI

Theory and practice of chaotic cryptography

TL;DR: This Letter addresses some basic questions about chaotic cryptography, not least the very definition of chaos in discrete systems, and proposes a conceptual framework and illustrates it with different examples from private and public key cryptography.
Book ChapterDOI

Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers

TL;DR: The idea of using chaotic transformations in cryptography is explicit in the foundational papers of Shannon on secrecy systems and the number of proposals which exploited the properties of chaotic maps for cryptographical purposes, grew in a spectacular way.

IJCSI Publicity Board 2010

TL;DR: This paper presents a systematic analysis of a variety of different ad hoc network topologies in terms of node placement, node mobility and routing protocols through several simulated scenarios.
References
More filters
Book

The Art of Computer Programming

TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Synchronization in chaotic systems

TL;DR: This chapter describes the linking of two chaotic systems with a common signal or signals and highlights that when the signs of the Lyapunov exponents for the subsystems are all negative the systems are synchronized.
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Related Papers (5)