Knowledge (XXG)

Chaotic cryptology

Source πŸ“

148:
digital images were proposed. However, there were three main aspects of the design of an image encryption that was usually modified in different algorithms (chaotic map, application of the map and structure of algorithm). The initial and perhaps most crucial point was the chaotic map applied in the design of the algorithms. The speed of the cryptosystem is always an important parameter in the evaluation of the efficiency of a cryptography algorithm, therefore, the designers were initially interested in using simple chaotic maps such as tent map, and the logistic map. However, in 2006 and 2007, the new image encryption algorithms based on more sophisticated chaotic maps proved that application of chaotic map with higher dimension could improve the quality and security of the cryptosystems.
22: 114:
One of the most important issues for any cryptographic primitive is the security of the system. However, in numerous cases, chaos-based cryptography algorithms are proved insecure. The main issue in many of the cryptanalyzed algorithms is the inadequacy of the chaotic maps implemented in the system.
110:
share unique characteristics that allow for the chaotic systems to be applied to cryptography. If chaotic parameters, as well as cryptographic keys, can be mapped symmetrically or mapped to produce acceptable and functional outputs, it will make it next to impossible for an adversary to find the
147:
Bourbakis and Alexopoulos in 1991 proposed supposedly the earliest fully intended digital image encryption scheme which was based on SCAN language. Later on, with the emergence of chaos-based cryptography hundreds of new image encryption algorithms, all with the aim of improving the security of
111:
outputs without any knowledge of the initial values. Since chaotic maps in a real life scenario require a set of numbers that are limited, they may, in fact, have no real purpose in a cryptosystem if the chaotic behavior can be predicted.
164:
The unpredictable behavior of the chaotic maps can be used in the generation of random numbers. Some of the earliest chaos-based random number generators tried to directly generate random numbers from the logistic map.
85:
in 1989, the use of chaos in cryptography has attracted much interest. However, long-standing concerns about its security and implementation speed continue to limit its implementation.
1088:
Liu, Quan; Li, Pei-yue; Zhang, Ming-chao; Sui, Yong-xin; Yang, Huai-jiang (2015-02-01). "A novel image encryption algorithm based on chaos maps with Markov properties".
81:, the study or techniques used to privately and securely transmit information with the presence of a third-party or adversary. Since first being investigated by 99:. Cryptography refers to encrypting information for secure transmission, whereas cryptanalysis refers to decrypting and deciphering encoded encrypted messages. 1018:
Behnia, S.; Akhshani, A.; Ahadpour, S.; Mahmodi, H.; Akhavan, A. (2007-07-02). "A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps".
102:
In order to use chaos theory efficiently in cryptography, the chaotic maps are implemented such that the entropy generated by the map can produce required
295:
Akhavan, A.; Samsudin, A.; Akhshani, A. (2015-09-01). "Cryptanalysis of "an improvement over an image encryption method based on total shuffling"".
1249:
Akhavan, Amir; Mahmodi, Hadi; Akhshani, Afshin (2006-11-01). "A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps".
1340: 1299: 1266: 651: 425: 1282:
Akhshani, A.; Mahmodi, H.; Akhavan, A. (2006-10-01). "A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps".
1214:
Kwok, H. S.; Tang, Wallace K. S. (2007-05-01). "A fast image encryption system based on chaotic maps with finite precision representation".
737:
Behnia, S.; Akhshani, A.; Mahmodi, H.; Akhavan, A. (2008-01-01). "A novel algorithm for image encryption based on mixture of chaotic maps".
677:
Akhavan, A.; Samsudin, A.; Akhshani, A. (2011-10-01). "A symmetric image encryption scheme based on combination of nonlinear chaotic maps".
566:
Arroyo, David; Alvarez, Gonzalo; Fernandez, Veronica (2008-05-28). "On the inadequacy of the logistic map for cryptographic applications".
513:
Solak, Ercan; Γ‡okal, Cahit; Yildiz, Olcay Taner; Biyikoğlu, TΓΌrker (2010-05-01). "Cryptanalysis of fridrich's chaotic image encryption".
247:
Xie, Eric Yong; Li, Chengqing; Yu, Simin; LΓΌ, Jinhu (2017-03-01). "On the cryptanalysis of Fridrich's chaotic image encryption scheme".
922:
Behnia, Sohrab; Akhshani, Afshin; Mahmodi, Hadi; Akhavan, Amir (2008-01-01). "Chaotic cryptographic scheme based on composition maps".
721: 212:
Chen, Yong; Liao, Xiaofeng (2005-07-25). "Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm".
130:
Asymmetric chaos cryptography, where one key of the cryptosystem is public. Some of the few proposed systems have been broken.
330:
Akhavan, A.; Samsudin, A.; Akhshani, A. (2017-10-01). "Cryptanalysis of an image encryption algorithm based on DNA encoding".
1126:
Behnia, S.; Akhshani, A.; Akhavan, A.; Mahmodi, H. (2009-04-15). "Applications of tripled chaotic maps in cryptography".
82: 134:
The majority of chaos-based cryptographic algorithms are symmetric. Many use discrete chaotic maps in their process.
772:
Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor (2004-11-15). "Public-key encryption with chaos".
452:
Alvarez, Gonzalo; Li, Shujun (2006-08-01). "Some basic cryptographic requirements for chaos-based cryptosystems".
1179:
Kanso, A.; Ghebleh, M. (2015-07-01). "An efficient and robust image encryption scheme for medical applications".
823:
Kocarev, L.; Makraduli, J.; Amato, P. (2005-10-01). "Public-Key Encryption Based on Chebyshev Polynomials".
107: 103: 587:
Li, C. (January 2016). "Cracking a hierarchical chaotic image encryption algorithm based on permutation".
530: 1375: 1370: 1323:
Chuanmu, Li; Lianxi, H. (2007-04-01). "A New Image Encryption Scheme based on Hyperchaotic Sequences".
1253:. Lecture Notes in Computer Science. Vol. 4263. Springer, Berlin, Heidelberg. pp. 963–971. 1223: 1188: 1145: 1097: 1062: 1027: 992: 941: 781: 746: 522: 471: 377: 339: 304: 221: 1053:
Ghebleh, M.; Kanso, A. (2014-06-01). "A robust chaotic algorithm for digital image steganography".
535: 32: 1346: 1305: 1161: 1135: 965: 931: 897: 879: 848: 614: 596: 567: 495: 461: 431: 274: 256: 196: 181: 1336: 1295: 1262: 957: 840: 805: 797: 717: 647: 548: 487: 421: 1328: 1287: 1254: 1231: 1196: 1153: 1105: 1070: 1035: 1000: 949: 889: 832: 789: 754: 709: 686: 639: 606: 540: 479: 413: 403:
Li, Shujun; Zheng, Xuan (2002-01-01). "Cryptanalysis of a chaotic image encryption method".
385: 347: 312: 266: 229: 406:
2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353)
197:"Supercomputer investigations of a chaotic encryption algorithm" DD Wheeler, RAJ Matthews 51: 1227: 1192: 1149: 1101: 1066: 1031: 996: 945: 785: 750: 526: 475: 381: 343: 308: 225: 127:
Symmetric chaos cryptography, where the same secret key is used by sender and receiver.
1325:
2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID)
983:
Bourbakis, N.; Alexopoulos, C. (1992). "Picture data encryption using scan patterns".
389: 1364: 1165: 1004: 852: 499: 95: 1350: 1309: 901: 690: 435: 351: 278: 1039: 969: 618: 404: 233: 78: 74: 610: 316: 270: 1235: 1200: 1157: 1109: 1074: 758: 1332: 417: 953: 836: 643: 544: 483: 1291: 961: 893: 844: 801: 552: 491: 713: 633: 41: 867: 809: 21: 182:"On the derivation of a β€œchaotic” encryption algorithm." Matthews, R.A.J. 1258: 793: 936: 868:"Security of public-key cryptosystems based on Chebyshev polynomials" 466: 884: 601: 261: 1140: 572: 866:
Bergamo, P.; D'Arco, P.; De Santis, A.; Kocarev, L. (July 2005).
123:
Chaos-based cryptography has been divided into two major groups:
15: 1181:
Communications in Nonlinear Science and Numerical Simulation
1090:
Communications in Nonlinear Science and Numerical Simulation
1055:
Communications in Nonlinear Science and Numerical Simulation
774:
Chaos: An Interdisciplinary Journal of Nonlinear Science
88:
Chaotic cryptology consists of two opposite processes:
46: 36: 368:Baptista, M.S. (1998). "Cryptography with chaos". 1284:2006 International Conference on Image Processing 708:. Springer Berlin Heidelberg. pp. 231–265. 363: 361: 1251:Computer and Information Sciences – ISCIS 2006 924:International Journal of Bifurcation and Chaos 515:International Journal of Bifurcation and Chaos 454:International Journal of Bifurcation and Chaos 156:Chaotic behavior can generate hash functions. 412:. Vol. 2. pp. II–708–II–711 vol.2. 8: 872:IEEE Transactions on Circuits and Systems I 704:Mao, Yaobin; Chen, Guanrong (2005-01-01). 1139: 935: 883: 600: 571: 534: 465: 260: 825:Circuits, Systems and Signal Processing 174: 632:Kocarev, Ljupco; Lian, Shiguo (2011). 1121: 1119: 672: 670: 7: 447: 445: 290: 288: 106:. Properties in chaotic systems and 73:is the application of mathematical 14: 679:Journal of the Franklin Institute 20: 706:Handbook of Geometric Computing 691:10.1016/j.jfranklin.2011.05.001 352:10.1016/j.optlastec.2017.04.022 1216:Chaos, Solitons & Fractals 1128:Chaos, Solitons & Fractals 1040:10.1016/j.physleta.2007.01.081 739:Chaos, Solitons & Fractals 234:10.1016/j.physleta.2005.05.048 1: 390:10.1016/s0375-9601(98)00086-3 332:Optics & Laser Technology 1005:10.1016/0031-3203(92)90074-s 611:10.1016/j.sigpro.2015.07.008 317:10.1016/j.optcom.2015.03.079 271:10.1016/j.sigpro.2016.10.002 1236:10.1016/j.chaos.2005.11.090 1201:10.1016/j.cnsns.2014.12.005 1158:10.1016/j.chaos.2007.08.013 1110:10.1016/j.cnsns.2014.06.005 1075:10.1016/j.cnsns.2013.10.014 759:10.1016/j.chaos.2006.05.011 1392: 1333:10.1109/IWASID.2007.373734 418:10.1109/ISCAS.2002.1011451 954:10.1142/S0218127408020288 837:10.1007/s00034-005-2403-x 644:10.1007/978-3-642-20542-2 545:10.1142/S0218127410026563 484:10.1142/S0218127406015970 1292:10.1109/ICIP.2006.312889 894:10.1109/TCSI.2005.851701 635:Chaos-Based Cryptography 186:13, no. 1 (1989): 29-42. 160:Random number generation 108:cryptographic primitives 714:10.1007/3-540-28247-5_8 104:Confusion and diffusion 35:, as no other articles 1286:. pp. 1993–1996. 297:Optics Communications 1327:. pp. 237–240. 1259:10.1007/11902140_100 90:Chaotic cryptography 1228:2007CSF....32.1518K 1193:2015CNSNS..24...98K 1150:2009CSF....40..505B 1102:2015CNSNS..20..506L 1067:2014CNSNS..19.1898G 1032:2007PhLA..366..391B 997:1992PatRe..25..567B 985:Pattern Recognition 946:2008IJBC...18..251B 786:2004Chaos..14.1078K 751:2008CSF....35..408B 638:. Springer-Verlag. 527:2010IJBC...20.1405S 476:2006IJBC...16.2129A 382:1998PhLA..240...50B 344:2017OptLT..95...94A 309:2015OptCo.350...77A 226:2005PhLA..342..389C 77:to the practice of 71:Chaotic cryptology 54:for suggestions. 44:to this page from 1342:978-1-4244-1035-4 1301:978-1-4244-0480-3 1268:978-3-540-47242-1 1020:Physics Letters A 794:10.1063/1.1821671 653:978-3-642-20542-2 589:Signal Processing 427:978-0-7803-7448-5 370:Physics Letters A 249:Signal Processing 214:Physics Letters A 68: 67: 1383: 1355: 1354: 1320: 1314: 1313: 1279: 1273: 1272: 1246: 1240: 1239: 1222:(4): 1518–1529. 1211: 1205: 1204: 1176: 1170: 1169: 1143: 1123: 1114: 1113: 1085: 1079: 1078: 1061:(6): 1898–1907. 1050: 1044: 1043: 1026:(4–5): 391–396. 1015: 1009: 1008: 980: 974: 973: 939: 919: 913: 912: 910: 908: 887: 878:(7): 1382–1393. 863: 857: 856: 820: 814: 813: 780:(4): 1078–1082. 769: 763: 762: 734: 728: 727: 701: 695: 694: 685:(8): 1797–1813. 674: 665: 664: 662: 660: 629: 623: 622: 604: 584: 578: 577: 575: 563: 557: 556: 538: 521:(5): 1405–1413. 510: 504: 503: 469: 460:(8): 2129–2151. 449: 440: 439: 411: 400: 394: 393: 365: 356: 355: 327: 321: 320: 292: 283: 282: 264: 244: 238: 237: 220:(5–6): 389–396. 209: 203: 194: 188: 179: 143:Image encryption 63: 60: 49: 47:related articles 24: 16: 1391: 1390: 1386: 1385: 1384: 1382: 1381: 1380: 1361: 1360: 1359: 1358: 1343: 1322: 1321: 1317: 1302: 1281: 1280: 1276: 1269: 1248: 1247: 1243: 1213: 1212: 1208: 1187:(1–3): 98–116. 1178: 1177: 1173: 1125: 1124: 1117: 1087: 1086: 1082: 1052: 1051: 1047: 1017: 1016: 1012: 982: 981: 977: 921: 920: 916: 906: 904: 865: 864: 860: 822: 821: 817: 771: 770: 766: 736: 735: 731: 724: 703: 702: 698: 676: 675: 668: 658: 656: 654: 631: 630: 626: 586: 585: 581: 565: 564: 560: 512: 511: 507: 451: 450: 443: 428: 409: 402: 401: 397: 367: 366: 359: 329: 328: 324: 294: 293: 286: 246: 245: 241: 211: 210: 206: 201:15 (2), 140-152 195: 191: 180: 176: 171: 162: 154: 145: 140: 121: 83:Robert Matthews 64: 58: 55: 45: 42:introduce links 25: 12: 11: 5: 1389: 1387: 1379: 1378: 1373: 1363: 1362: 1357: 1356: 1341: 1315: 1300: 1274: 1267: 1241: 1206: 1171: 1134:(1): 505–519. 1115: 1096:(2): 506–515. 1080: 1045: 1010: 991:(6): 567–581. 975: 930:(1): 251–261. 914: 858: 831:(5): 497–517. 815: 764: 745:(2): 408–419. 729: 722: 696: 666: 652: 624: 579: 558: 536:10.1.1.226.413 505: 441: 426: 395: 376:(1–2): 50–54. 357: 322: 284: 239: 204: 189: 173: 172: 170: 167: 161: 158: 153: 150: 144: 141: 139: 136: 132: 131: 128: 120: 117: 66: 65: 52:Find link tool 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 1388: 1377: 1374: 1372: 1369: 1368: 1366: 1352: 1348: 1344: 1338: 1334: 1330: 1326: 1319: 1316: 1311: 1307: 1303: 1297: 1293: 1289: 1285: 1278: 1275: 1270: 1264: 1260: 1256: 1252: 1245: 1242: 1237: 1233: 1229: 1225: 1221: 1217: 1210: 1207: 1202: 1198: 1194: 1190: 1186: 1182: 1175: 1172: 1167: 1163: 1159: 1155: 1151: 1147: 1142: 1137: 1133: 1129: 1122: 1120: 1116: 1111: 1107: 1103: 1099: 1095: 1091: 1084: 1081: 1076: 1072: 1068: 1064: 1060: 1056: 1049: 1046: 1041: 1037: 1033: 1029: 1025: 1021: 1014: 1011: 1006: 1002: 998: 994: 990: 986: 979: 976: 971: 967: 963: 959: 955: 951: 947: 943: 938: 933: 929: 925: 918: 915: 903: 899: 895: 891: 886: 881: 877: 873: 869: 862: 859: 854: 850: 846: 842: 838: 834: 830: 826: 819: 816: 811: 807: 803: 799: 795: 791: 787: 783: 779: 775: 768: 765: 760: 756: 752: 748: 744: 740: 733: 730: 725: 723:9783540205951 719: 715: 711: 707: 700: 697: 692: 688: 684: 680: 673: 671: 667: 655: 649: 645: 641: 637: 636: 628: 625: 620: 616: 612: 608: 603: 598: 594: 590: 583: 580: 574: 569: 562: 559: 554: 550: 546: 542: 537: 532: 528: 524: 520: 516: 509: 506: 501: 497: 493: 489: 485: 481: 477: 473: 468: 463: 459: 455: 448: 446: 442: 437: 433: 429: 423: 419: 415: 408: 407: 399: 396: 391: 387: 383: 379: 375: 371: 364: 362: 358: 353: 349: 345: 341: 337: 333: 326: 323: 318: 314: 310: 306: 302: 298: 291: 289: 285: 280: 276: 272: 268: 263: 258: 254: 250: 243: 240: 235: 231: 227: 223: 219: 215: 208: 205: 202: 200: 193: 190: 187: 185: 178: 175: 168: 166: 159: 157: 152:Hash function 151: 149: 142: 137: 135: 129: 126: 125: 124: 118: 116: 112: 109: 105: 100: 98: 97: 96:cryptanalysis 91: 86: 84: 80: 76: 72: 62: 53: 48: 43: 39: 38: 34: 29:This article 27: 23: 18: 17: 1376:Cryptography 1371:Chaos theory 1324: 1318: 1283: 1277: 1250: 1244: 1219: 1215: 1209: 1184: 1180: 1174: 1131: 1127: 1093: 1089: 1083: 1058: 1054: 1048: 1023: 1019: 1013: 988: 984: 978: 937:nlin/0601051 927: 923: 917: 905:. Retrieved 875: 871: 861: 828: 824: 818: 777: 773: 767: 742: 738: 732: 705: 699: 682: 678: 657:. Retrieved 634: 627: 592: 588: 582: 561: 518: 514: 508: 467:nlin/0311039 457: 453: 405: 398: 373: 369: 335: 331: 325: 300: 296: 252: 248: 242: 217: 213: 207: 198: 192: 183: 177: 163: 155: 146: 138:Applications 133: 122: 113: 101: 93: 89: 87: 79:cryptography 75:chaos theory 70: 69: 56: 30: 595:: 203–210. 255:: 150–154. 199:Cryptologia 184:Cryptologia 1365:Categories 907:29 October 885:cs/0411030 659:29 October 602:1505.00335 262:1609.05352 169:References 50:; try the 37:link to it 1166:120158218 1141:0705.2633 962:0218-1274 853:123533966 845:0278-081X 802:1054-1500 573:0805.4355 553:0218-1274 531:CiteSeerX 500:222179832 492:0218-1274 338:: 94–99. 303:: 77–82. 59:June 2017 40:. Please 1351:16930243 1310:14013123 902:18342884 810:15568922 436:14523625 279:12416264 94:Chaotic 1224:Bibcode 1189:Bibcode 1146:Bibcode 1098:Bibcode 1063:Bibcode 1028:Bibcode 993:Bibcode 970:9089024 942:Bibcode 782:Bibcode 747:Bibcode 619:7713295 523:Bibcode 472:Bibcode 378:Bibcode 340:Bibcode 305:Bibcode 222:Bibcode 1349:  1339:  1308:  1298:  1265:  1164:  968:  960:  900:  851:  843:  808:  800:  720:  650:  617:  551:  533:  498:  490:  434:  424:  277:  33:orphan 31:is an 1347:S2CID 1306:S2CID 1162:S2CID 1136:arXiv 966:S2CID 932:arXiv 898:S2CID 880:arXiv 849:S2CID 615:S2CID 597:arXiv 568:arXiv 496:S2CID 462:arXiv 432:S2CID 410:(PDF) 275:S2CID 257:arXiv 119:Types 1337:ISBN 1296:ISBN 1263:ISBN 958:ISSN 909:2021 841:ISSN 806:PMID 798:ISSN 718:ISBN 661:2021 648:ISBN 549:ISSN 488:ISSN 422:ISBN 92:and 1329:doi 1288:doi 1255:doi 1232:doi 1197:doi 1154:doi 1106:doi 1071:doi 1036:doi 1024:366 1001:doi 950:doi 890:doi 833:doi 790:doi 755:doi 710:doi 687:doi 683:348 640:doi 607:doi 593:118 541:doi 480:doi 414:doi 386:doi 374:240 348:doi 313:doi 301:350 267:doi 253:132 230:doi 218:342 1367:: 1345:. 1335:. 1304:. 1294:. 1261:. 1230:. 1220:32 1218:. 1195:. 1185:24 1183:. 1160:. 1152:. 1144:. 1132:40 1130:. 1118:^ 1104:. 1094:20 1092:. 1069:. 1059:19 1057:. 1034:. 1022:. 999:. 989:25 987:. 964:. 956:. 948:. 940:. 928:18 926:. 896:. 888:. 876:52 874:. 870:. 847:. 839:. 829:24 827:. 804:. 796:. 788:. 778:14 776:. 753:. 743:35 741:. 716:. 681:. 669:^ 646:. 613:. 605:. 591:. 547:. 539:. 529:. 519:20 517:. 494:. 486:. 478:. 470:. 458:16 456:. 444:^ 430:. 420:. 384:. 372:. 360:^ 346:. 336:95 334:. 311:. 299:. 287:^ 273:. 265:. 251:. 228:. 216:. 1353:. 1331:: 1312:. 1290:: 1271:. 1257:: 1238:. 1234:: 1226:: 1203:. 1199:: 1191:: 1168:. 1156:: 1148:: 1138:: 1112:. 1108:: 1100:: 1077:. 1073:: 1065:: 1042:. 1038:: 1030:: 1007:. 1003:: 995:: 972:. 952:: 944:: 934:: 911:. 892:: 882:: 855:. 835:: 812:. 792:: 784:: 761:. 757:: 749:: 726:. 712:: 693:. 689:: 663:. 642:: 621:. 609:: 599:: 576:. 570:: 555:. 543:: 525:: 502:. 482:: 474:: 464:: 438:. 416:: 392:. 388:: 380:: 354:. 350:: 342:: 319:. 315:: 307:: 281:. 269:: 259:: 236:. 232:: 224:: 61:) 57:(

Index


orphan
link to it
introduce links
related articles
Find link tool
chaos theory
cryptography
Robert Matthews
cryptanalysis
Confusion and diffusion
cryptographic primitives
"On the derivation of a β€œchaotic” encryption algorithm." Matthews, R.A.J. Cryptologia 13, no. 1 (1989): 29-42.
"Supercomputer investigations of a chaotic encryption algorithm" DD Wheeler, RAJ Matthews Cryptologia 15 (2), 140-152
Bibcode
2005PhLA..342..389C
doi
10.1016/j.physleta.2005.05.048
arXiv
1609.05352
doi
10.1016/j.sigpro.2016.10.002
S2CID
12416264


Bibcode
2015OptCo.350...77A
doi
10.1016/j.optcom.2015.03.079

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑