Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Baptista MS (1999) Cryptography with Chaos. Phys Lett A 240: 50-54
Baranovsky A, Daems D (1995) Design of One-dimensional Chaotic Maps with Prescribed Statistical Properties. Int J Bifurcation and Chaos 5 (6): 1585-1598
Batista AM, de S. Pinto SE, Viana RL, Lopes SR (2002) Lyapunov Spectrum and Synchronization of Piecewise Linear Map Lattices with Power-law Coupling. Physical Review E, 65:056209(9)
Garcia P, Parravano A, Cosenza MG, Jimenez J, Marcano A (2002) Coupled Map Networks as Communication Schemes. Physical Review E, 65:045201
Habutsu T, Nishio Y, Sasase I, Mori S (1991) A Secret Key Cryptosystem by Iter-ating a Chaotic Map. LNCS 547: 127-140
Kaneko K (ed) (2003) Theory and Application of Coupled Map Lattices, Ch. 1. John Wiley and Sons
Kocarev L (2001) Chaos-based Cryptography: A Brief Overview. IEEE Circuits and Systems Magazine 1 (3): 6-21
Kohda T, Tsuneda A (1993) Pseudonoise Sequence by Chaotic Nonlinear Maps and Their Correlation Properties. IEICE Trans Commun E76-B: 855-862
Lasota A, Mackey MC (1997) Chaos, Fractals and Noise: Stochastic Aspects of Dynamics. Springer, New York
Li P, Li Z, Halang WA, Chen GR (2006) A Multiple Pseudo-random-bit Generator based on a Spatiotemporal Chaotic Map. Phys Lett A 349: 467-473
Li P, Li Z, Halang WA, Chen GR (2006) Analysis of a Multiple Output Pseudo-random-bit Generator based on a Spatiotemporal Chaotic System. Int J Bifurca-tion and Chaos, 16 (10)
Li P, Li Z, Halang WA, Chen GR (2006) A Stream Cipher based on a Spatiotem-poral Chaotic System. Chaos, Solitons and Fractals. To appear
Li SJ (2003) Analysis and New Designs of Digital Chaotic Ciphers. PhD thesis, School of Electronics and Information Engineering, Xi’an Jiaotong University. http://www.hooklee.com/pub.html
Li SJ, Mou XQ, Cai YL (2001) Pseudo-random Bit Generator based on Coupled Chaotic Systems and its Application in Stream-ciphers Cryptography. LNCS 2247: 316-329
Li SJ, Mou XQ, Cai YL, Ji Z, Zhang JH (2003) On the Security of a Chaotic Encryp-tion Scheme: Problems with Computerized Chaos in Finite Computing Precision. Computer Physics Communications 153 (1): 52-58
Lu HP, Wang SH, Li XW, Tang GN, Kuang JY, Ye WP, Hu G (2004) A New Spa-tiotemporally Chaotic Cryptosystem and its Security and Performance Analyses. Chaos 14 (3): 617-629
Luekepohl H (1998) Handbook of Matrices. John Wiley and Sons
Masuda N, Aihara K (2002) Cryptosystems with Discretized Chaotic Maps. IEEE Trans Circuits and Systems-I 49 (1): 28-40
National Institute of Standards and Technology (2001) Security Require- ments for Cryptographic Modules. FIPS PUB 140-2. http://csrc.nist.gov/publications/fips/fips140- 2/fips1402.pdf
Protopopescu VA, Santoro RT, JS Tollover (1995) Fast and Secure Encryp-tion/Decryption Method based on Chaotic Dynamics. US Patent No 5479513
Sang T, Wang R, Yan Y (1998) Perturbance-based Algorithm to Expand Cycle Length of Chaotic Key Stream. Electronics Letters 34: 873-874
Short KM (1997) Signal Extraction from Chaotic Communication. Int J Bifurca-tion and Chaos 7 (7): 1579-1597
Tang G, Wang S, Lu¨ H, Hu G (2003) Chaos-based Cryptograph Incorporated with S-box Algebraic Operation. Phys Lett A 318: 388-398
Wang SH, Liu WR, Lu HP, Kuang JY, Hu G (2004) Periodicity of Chaotic Trajec-tories in Realizations of Finite Computer Precisions and its Implication in Chaos Communications. Int J of Modern Physics B 18 (17-19): 2617-2622
Wheeler DD (1989) Problems with Chaotic Cryptosystems. Cryptologia XIII (3): 243-250
Yang T (2004) A Survey of Chaotic Secure Communication Systems. Int J of Com-putational Cognition 2 (2): 81-130
Yang T, Yang LB, Yang CM (1998) Cryptanalyzing Chaotic Secure Communica-tions Using Return Maps. Phys Lett A 245: pp 495-510
Zhang H, Wang H, Chen W (2002) Oversampled Chaotic Binary Sequences with Good Security. J Circuits, Systems and Computers 11: 173-185
Zhou H, Ling XT (1997) Problems with the Chaotic Inverse System Encryption Approach. IEEE Trans Circuits and Systems-I 44 (3): 268-271.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Li, P., Li, Z., Halang, W.A., Chen, G. (2007). Securing Communication by Chaos-based Encryption. In: Krämer, B.J., Halang, W.A. (eds) Contributions to Ubiquitous Computing. Studies in Computational Intelligence, vol 42. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-44910-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-44910-2_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44909-6
Online ISBN: 978-3-540-44910-2
eBook Packages: EngineeringEngineering (R0)