Skip to main content

Chaos-Based Information Security

Chaos-Based Block and Stream Ciphers in Information Security

  • Chapter
Handbook of Information and Communication Security
  • 4827 Accesses

Abstract

This chapter presents new possibilities for a design of chaotic cryptosystems on the basis of paradigms of continuous and discrete chaotic maps. The most promising are discrete chaotic maps that enable one to design stream ciphers and block ciphers similar to conventional ones. This is the result of the fact that discrete-time dynamic chaotic systems naturally enable one to hide relations between final and initial states. These properties are very similar to the requirements for stream ciphers and block ciphers; therefore, they enable one to design complete ciphers or their components.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. S. Li: When chaos meets computers (2004), available at http://arxiv.org/abs/nlin/0405038v3

  2. S. Li: Analyses and new designs of digital chaotic ciphers. Ph.D. Thesis (Xi’an Jiaotong Unversity, Xi’an 2005)

    Google Scholar 

  3. F. Dachselt, W. Schwarz: Chaos and cryptography, IEEE Trans. Circuits Syst. I 48(12), 1498–1509 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  4. G. Millérioux, J.M. Amigó, J. Daafouz: A connection between chaotic and conventional cryptography, IEEE Trans. Circuits Syst. I 55(6), 1695–1703 (2008)

    Article  Google Scholar 

  5. F. Dachselt, K. Kelber, W. Schwarz, J. Vandewalle: Chaotic versus classical stream ciphers – a comparative study, IEEE Trans. Circuits Syst. 4, 518–521 (1998)

    Google Scholar 

  6. N.H. René, G. Gallagher: Multi-gigahertz encrypted communication using electro-optical chaos cryptography. Ph.D. Thesis (School of Electrical and Computer Engineering, Georgia Institute of Technology 2007)

    Google Scholar 

  7. L.M. Pecora, T.L. Carroll: Synchronization in chaotic systems, Phys. Rev. Lett. 64, 821–824 (1990)

    Article  MathSciNet  Google Scholar 

  8. H. Nijmeijer, I.M.Y. Mareels: An observer looks at synchronization, IEEE Trans. Circuits Syst. I 44, 882–890 (1997)

    Article  MathSciNet  Google Scholar 

  9. T.B. Flower: Application of stochastic control techniques to chaotic nonlinear systems, IEEE Trans. Auto. Control 34, 201–205 (1989)

    Article  Google Scholar 

  10. H. Leung, Z. Zhu: Performance evaluation of EKF based chaotic synchronization, IEEE Trans. Circuits Syst. I 48, 1118–1125 (2001)

    Article  Google Scholar 

  11. J. Fridrich: Symmetric ciphers based on two-dimensional chaotic maps, Int. J. Bifurc. Chaos 8, 1259–1284 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  12. K.M. Short: Signal extraction from chaotic communications, Int. J. Bifurc. Chaos 7(7), 1579–1597 (1997)

    Article  MATH  Google Scholar 

  13. A.T. Parker, K.M. Short: Reconstructing the keystream from a chaotic encryption scheme, IEEE Trans. Circuits Syst. I 48(5), 624–630 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  14. H. Guojie, F. Zhengjin, M. Ruiling: Chosen ciphertext attack on chaos communication based on chaotic synchronization, IEEE Trans. Circuits Syst. I 50(2), 275–279 (2003)

    Article  MathSciNet  Google Scholar 

  15. X. Wu, Z. Wang: Estimating parameters of chaotic systems synchronized by external driving signal, Chaos Solitons Fractals 33, 588–594 (2007)

    Article  Google Scholar 

  16. L. Liu, X. Wu, H. Hu: Estimating system parameters of Chua’s circuit from synchronizing signal, Phys. Lett. A 324, 36–41 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  17. P.G. Vaidya, S. Angadi: Decoding chaotic cryptography without access to the superkey, Chaos Solitons Fractals 17, 379–386 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  18. B.D.O. Anderson, J.B. Moore: Optimal Filtering, Information and System Sciences Series (Prentice-Hall, Englewood Cliffs, NJ 1979)

    MATH  Google Scholar 

  19. G. Grassi, S. Mascolo: Nonlinear observer design to synchronize hyperchaotic systems via a scalar signal, IEEE Trans. Circuits Syst. 44(10), 1011–1014 (1997)

    Article  Google Scholar 

  20. U. Feldmann, M. Hasler, W. Schwarz: Communication by chaotic signals: the inverse system approach, Int. J. Circuit Theory Appl. 24(5), 551–579 (1996)

    Article  MATH  Google Scholar 

  21. K. Kelber, W. Schwarz: General design rules for chaos-based encryption systems, International Symposium on Nonlinear, Theory and its Applications (NOLTA2005) (2005)

    Google Scholar 

  22. G. Alvarez, S. Li: Some basic cryptographic requirements for chaos-based cryptosystems, Int. J. Bifurc. Chaos 16, 2129–2151 (2006)

    Article  MathSciNet  Google Scholar 

  23. M.S. Baptista: Cryptography with chaos, Phys. Lett. A 240, 50–54 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  24. L. Kocarev, G. Jakimoski: Logistic map as a block encryption algorithm, Phys. Lett. A 289, 199–206 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  25. N.K. Pareek, Vinod Patidar, K.K. Sud: Discrete chaotic cryptography using external key, Phys. Lett. A 309, 75–82 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  26. T. Habutsu, Y. Nishio, I. Sasase, S. Mori: A secret key cryptosystem by iterating a chaotic map. In: Advances in Cryptology – EuroCrypt’91, Lecture Notes in Computer Science, Vol. 0547, ed. by D.W. Davies (Springer, Berlin 1991) pp. 127–140

    Google Scholar 

  27. E. Biham: Cryptoanalysis of the chaotic-map cryptosystem suggested at EuroCrypt’91. In: Advances in Cryptology – EuroCrypt’91, Lecture Notes in Computer Science, Vol. 0547, ed. by D.W. Davies (Springer, Berlin 1991) pp. 532–534

    Google Scholar 

  28. G. Jakimoski, L. Kocarev: Analysis of some recently proposed chaos-based encryption algorithms, Phys. Lett. A 291(6), 381–384 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  29. S. Li, X. Mou, Z. Ji, J. Zhang, Y. Cai: Performance analysis of Jakimoski–Kocarev attack on a class of chaotic cryptosystems, Phys. Lett. A 307, 22–28 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  30. G. Álvarez, F. Montoya, M. Romera, G. Pastor: Cryptanalysis of an ergodic chaotic cipher, Phys. Lett. A 311, 172–179 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  31. H. Hu, X. Wu, B. Zhang: Parameter estimation only from the symbolic sequences generated by chaos system, Chaos Solitons Fractals 22, 359–366 (2004)

    Article  Google Scholar 

  32. A. Skrobek: Approximation of chaotic orbit as a cryptanalytical method on Baptista’s cipher, Phys. Lett. A 372, 849–859 (2008)

    Article  Google Scholar 

  33. S. Li, G. Chen, K.-W. Wong, X. Mou, Y. Cai: Baptista-type chaotic cryptosystems: problems and countermeasures, Phys. Lett. A 332, 368–375 (2004)

    Article  MATH  Google Scholar 

  34. S. Li, G. Chen, K.-W. Wong, X. Mou, C. Yuanlong: Problems of Baptista’s chaotic cryptosystems and countermeasures for enhancement of their overall performances, CoRR, cs.CR/0402004 (2004)

    Google Scholar 

  35. W. Wong, L. Lee, K. Wong: A modified chaotic cryptographic method, Comput. Phys. Commun. 138, 234–236 (2001)

    Article  MATH  Google Scholar 

  36. K.W. Wong: A fast chaotic cryptographic scheme with dynamic look-up table, Phys. Lett. A 298, 238–242 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  37. K.W. Wong: A combined chaotic cryptographic and hashing scheme, Phys. Lett. A 307, 292–298 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  38. K.W. Wong, S.W. Ho, C.K. Yung: A chaotic cryptography scheme for generating short ciphertext, Phys. Lett. A 310, 67–73 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  39. F. Huang, Z.-H. Guan: A modified method of a class of recently presented cryptosystems, Chaos Solitons Fractals 298, 1893–1899 (2005)

    MathSciNet  Google Scholar 

  40. G. Álvarez, F. Montoya, M. Romera, G. Pastor: Keystream cryptanalysis of a chaotic cryptographic method, Comput. Phys. Commun. 156, 205–207 (2004)

    Article  Google Scholar 

  41. G. Álvarez, F. Montoya, M. Romera, G. Pastor: Cryptanalysis of dynamic look-up table based chaotic cryptosystems, Phys. Lett. A 326, 211–218 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  42. E. Álvarez, A. Fernández, P. García, J. Jiménez, A. Marcano: New approach to chaotic encryption, Phys. Lett. A 263, 373–375 (1999)

    Article  Google Scholar 

  43. G. Alvarez, F. Montoya, M. Romera, G. Pastor: Cryptanalysis of a chaotic encryption system, Phys. Lett. A 276, 191–196 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  44. S. Li, X. Mou, Y. Cai: Improving security of a chaotic encryption approach, Phys. Lett. A 290(3-4), 127–133 (2001)

    Article  MathSciNet  Google Scholar 

  45. N.S. Philip, K.B. Joseph: Chaos for stream cipher, CoRR, cs.CR/0102012 (2001)

    Google Scholar 

  46. A. Skrobek: Cryptanalysis of chaotic stream cipher, Phys. Lett. A 363, 84–90 (2007)

    Article  Google Scholar 

  47. G. Álvarez, F. Montoya, M. Romera, G. Pastor: Cryptanalysis of a discrete chaotic cryptosystem using external key, Phys. Lett. A 319, 334–339 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  48. N.K. Pareek, V. Patidar, K.K. Sud: Cryptography using multiple one-dimensional chaotic maps, Commun. Nonlin. Sci. Numer. Simul. 10, 715–723 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  49. C. Li, S. Li, G. Álvarez, G. Chen, K.-T. Lo: Cryptanalysis of a chaotic block cipher with external key and its improved version, ArXiv Nonlinear Sciences e-prints (August 2006)

    Google Scholar 

  50. J.-C. Yen, J.-I. Guo: A new chaotic key based design for image encryption and decryption, Proceedings IEEE International Conference Circuits and Systems (2000)

    Google Scholar 

  51. S. Li, X. Zheng, X. Mou, Y. Cai: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI, Proceedings of SPIE, Vol. 4666, ed. by N. Kehtarnavaz (SPIE, Bellingham 2002) pp. 149–160

    Google Scholar 

  52. T. Zhou, X. Liao, Y. Chen: A novel symmetric cryptography based on chaotic signal generator and a clipped neural network, ISNN (2) (2004) pp. 639–644

    Google Scholar 

  53. S. Lian, J. Sun, Z. Wang: A block cipher based on a suitable use of the chaotic standard map, Chaos Solitons Fractals 26, 117–129 (2005)

    Article  MATH  Google Scholar 

  54. X. Tong, M. Cui: Image encryption with compound chaotic sequence cipher shifting dynamically, Image Vis. Comput. 26, 843–850 (2008)

    Google Scholar 

  55. S. Behnia, A. Akhshani, H. Mahmodi, A. Akhavan: A novel algorithm for image encryption based on mixture of chaotic maps, Chaos Solitons Fractals 35, 408–419 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  56. K.M. Roskin, J.B. Casper: From chaos to cryptography, available at http://xcrypt.theory.org/ (1998)

  57. G. Alvarez, S. Li: Cryptographic requirements for chaotic secure communications, ArXiv Nonlinear Sciences e-prints (2003)

    Google Scholar 

  58. P. Cvitanovic: Classical and quantum chaos, version 7.0.1, available at http://www.nbi.dk/ChaosBook (Niels Bohr Institute, August 2000)

  59. R.L. Devaney: An Introduction to Chaotic Dynamical Systems, 2nd edn. (Westview Press, Boulder 2003)

    Google Scholar 

  60. A. Medino, M. Lines: Nonlinear Dynamics: a Primer (Cambridge University Press, Cambridge 2001)

    Google Scholar 

  61. E. Ott: Chaos in Dynamical Systems (Cambridge University Press, Cambridge 1993)

    MATH  Google Scholar 

  62. H.-O. Peitgen, H. Jurgens, D. Saupe: Fractals for the Classroom (Springer, New York 1992)

    Google Scholar 

  63. J.P. Sethna: Statistical Mechanics: Entropy, Order Parameters and Complexity (Oxford University Press, Oxford 2006)

    Google Scholar 

  64. J.C. Sprott, G. Rowlands: Improved correlation dimension calculation, Int. J. Bifurc. Chaos 11, 1865–1880 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  65. Z. Kotulski, J. Szczepañski, K. Górski, A. Górska, A. Paszkiewicz: On constructive approach to chaotic pseudorandom number generators, CIS Solutions for an enlarged NATO (RCMIS, 2000)

    Google Scholar 

  66. Q. Xu, S. Dai, W. Pei, L. Yang, Z. He: A chaotic map based on scaling transformation of nonlinear function, Neural Inf. Process. Lett. Rev. 3(2), 21–29 (2004)

    Google Scholar 

  67. J.A. Gonzalez, A.J. Moreno, L.E. Guerrero: Non-invertible transformations and spatiotemporal randomness (2006)

    Google Scholar 

  68. H. Zhou, X.-T. Ling, J. Yu: Secure communication via one-dimensional chaotic inverse systems, IEEE Int. Sympos. Circuits Syst. 2, 9–12 (1997)

    Google Scholar 

  69. R. Schmitz: Use of chaotic dynamical systems in cryptography, J. Franklin Inst. 338, 429–441 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  70. S. Li, X. Mou, Y. Cai: Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography. In: INDOCRYPT 2001, Lecture Notes in Computer Science, Vol. 2247, ed. by C. Pandu Rangan, C. Ding (Springer, Berlin 2001) pp. 316–329

    Google Scholar 

  71. T. Hiraoka, Y. Nishio: Analysis of a cryptosystem using a chaotic map extended to two dimensions, International Workshop on Nonlinear Circuit and Signal Processing (2004)

    Google Scholar 

  72. G. Alvarez, F. Montoya, M. Romera, G. Pastor: Cryptanalytic methods in chaotic cryptosystems, International Conference on Information Systems, Analysis and Synthesis (2001)

    Google Scholar 

  73. M.J.B. Robshaw: Stream ciphers, technical Report TR-701 (RSA Labs, July 1994)

    Google Scholar 

  74. A. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied Cryptography (CRC Press, Boca Raton 1997)

    MATH  Google Scholar 

  75. T.W. Cusick, C. Ding, A. Renvall: Stream Ciphers and Number Theory (Elsevier, Amsterdam 1998)

    MATH  Google Scholar 

  76. R.L. Rivest, A.T. Sherman: Randomized encryption techniques, technical report MIT/LCS/TM-234 (Massachusetts Institute of Technology, Laboratory for Computer Science, Cambridge, MA, USA, 1983)

    Google Scholar 

  77. V. Poulin, H. Touchette: On a generalization of the logistic map (2000)

    Google Scholar 

  78. N. Ferguson, B. Schneier: Practical Cryptography (John Wiley and Sons, New York 2003)

    Google Scholar 

  79. B. Schneier: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. (John Wiley and Sons, New York 1996)

    Google Scholar 

  80. A. Rukhin et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22, 2002

    Google Scholar 

  81. G. Rose, P. Hawkes: On the applicability of distinguishing attacks against stream ciphers, Cryptology ePrint Archive, Report 2002/142 (2002)

    Google Scholar 

  82. J. Daemen, P. Kitsos: Submission to encrypt call for stream ciphers: the self-synchronizing stream cipher mosquito (2005)

    Google Scholar 

  83. M. Boesgaard, M. Vesterager, T. Pedersen, J. Christiansen, O. Scavenius: Rabbit: A new high-performance stream cipher. In: Fast Software Encryption (FSE’03), Lecture Notes in Computer Science, Vol. 2887, ed. by T. Johansson (Springer, Berlin 2003) pp. 307–329

    Google Scholar 

  84. H. Wu: A new stream cipher hC-256. In: Fast Software Encryption (FSE’04), Lecture Notes in Computer Science, Vol. 3017, ed. by B. Roy, W. Meier (Springer, Berlin 2005), 226–244

    Google Scholar 

  85. L. An-Ping: A new stream cipher: Dicing, Cryptology ePrint Archive (http://eprint.iacr.org/), Report 2006/354 (2006)

  86. S. Wang, H. Lv, G. Hu: A new self-synchronizing stream cipher (2005)

    Google Scholar 

  87. K. Chen, M. Henricksen, W. Millan, J. Fuller, L. Simpson, E. Dawson, H. Lee, S. Moon: Dragon: A fast word based stream cipher. In: Information Security and Cryptology – ICISC 2004, Lecture Notes in Computer Science, Vol. 3506, ed. by C. Park, S. Chee (Springer, Berlin 2005) pp. 33–50

    Google Scholar 

  88. A. Biryukov: A new 128-bit key stream cipher LEX, Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, Kasteelpark Arenberg, Heverlee, Belgium

    Google Scholar 

  89. T. Xiang, X. Liao, G. Tang, Y. Chen, K.-W. Wong: A novel block cryptosystem based on iterating a chaotic map, Phys. Lett. A 349, 109–115 (2006)

    Article  Google Scholar 

  90. Z. Kotulski, J. Szczepañski: On the application of discrete chaotic dynamical systems to cryptography. DCC method, Biuletyn WAT, Rok XLVIII 10(566), 111–123 (1999)

    Google Scholar 

  91. B. Preneel et al.: New trends in cryptology, technical report, STORK (2003)

    Google Scholar 

  92. L. Kocarev: Chaos-based cryptography: a brief overview, IEEE Circuits Syst. Mag. 1(3), 6–21 (2001)

    Article  Google Scholar 

  93. K. Kwangjo: A study on the construction and analysis of substitution boxes for symmetric cryptosystems. Ph.D. Thesis (Division of Electrical and Computer Engineering of Yokohama National University, Yokohama 1990)

    Google Scholar 

  94. C.E. Shannon: Communication theory of secrecy systems, Bell Syst. Tech. J. 28, 656–715 (1949)

    MATH  MathSciNet  Google Scholar 

  95. L. Kocarev, J. Szczepanski, J.M. Amigo, I. Tomovski: Discrete chaos – I: theory, IEEE Trans. Circuits Syst. I 53(6), 1300–1309 (2006)

    Article  MathSciNet  Google Scholar 

  96. P. García, J. Jiménez: Communication through chaotic map systems, Phys. Lett. A 298, 35–40 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  97. H. Gutowitz: Cryptography with dynamical systems. In: Cellular Automata and Cooperative Phenomena, ed. by E. Goles, N. Boccara (Kluwer Academic Press, Boston 1993)

    Google Scholar 

  98. IA-32 Intel Architecture Software Developer’s Manual, Volume 1: Basic Architecture, Intel, Order Number: 253665-015 (April 2005)

    Google Scholar 

  99. G. Jakimoski, L. Kocarev: Differential and linear probabilities of a block-encryption cipher, IEEE Trans. Circuits Syst. I 50(1), 121–123 (2003)

    Article  MathSciNet  Google Scholar 

  100. G. Jakimoski, L. Kocarev: Chaos and cryptography: block encryption ciphers based on chaotic maps, IEEE Trans. Circuits Syst. I 48(2), 163–169 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  101. G. Tang, S. Wang, H. Lü, G. Hu: Chaos-based cryptograph incorporated with S-box algebraic operation, Phys. Lett. A 318, 388–398 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  102. S.-J. Baek, E. Ott: Onset of synchronization in systems of globally coupled chaotic maps, Phys. Rev. E 69, 066210 (2004)

    Article  MathSciNet  Google Scholar 

  103. R. Carretero-Gonzalez: Low dimensional travelling interfaces in coupled map lattices, Int. J. Bifurc. Chaos 7, 2745 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  104. S. Wang, J. Kuang, J. Li, Y. Luo, H. Lu, G. Hu: Chaos-based secure communications in a large community, Phys. Rev. E 66(6), 065202 (2002)

    Article  Google Scholar 

  105. X. Wang, M. Zhan, C.-H. Lai, H. Gang: Error function attack of chaos synchronization based encryption schemes, Chaos 14, 128–137 (2004)

    Article  Google Scholar 

  106. J. Zhou, W. Pei, J. Huang, A. Song, Z. He: Differential-like chosen cipher attack on a spatiotemporally chaotic cryptosystem, ArXiv Nonlinear Sciences e-prints (2005)

    Google Scholar 

  107. D. Lind, B. Marcus: An Introduction to Symbolic Dynamics and Coding (Cambridge University Press, Cambridge 2003)

    Google Scholar 

  108. S.D. Pethel, N.J. Corron, E. Bollt: Symbolic dynamics of coupled map lattices, Phys. Rev. Lett. 96(3), 034105 (2006)

    Article  Google Scholar 

  109. F.H. Willeboordse, K. Kaneko: Pattern dynamics of a coupled map lattice for open flow, eprint arXiv:chao-dyn/9407001 (1994)

    Google Scholar 

  110. G. Chen, Y. Chen, X. Liao: An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps, Chaos Solitons Fractals 31, 571–579 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  111. G. Tang, X. Liao: A method for designing dynamical S-boxes based on discretized chaotic map, Chaos Solitons Fractals 23, 1901–1909 (2005)

    MATH  MathSciNet  Google Scholar 

  112. D. Xiao, X. Liao, S. Deng: One-way Hash function construction based on the chaotic map with changeable-parameter, Chaos Solitons Fractals 24, 65–71 (2005)

    MATH  MathSciNet  Google Scholar 

  113. X. Yi: Hash function based on chaotic tent maps, IEEE Trans. Circuits Syst. II 52(6), 354–357 (2005)

    Article  Google Scholar 

  114. R. Tenny, L.S. Tsimring, L. Larson, H.D.I. Abarbanel: Using distributed nonlinear dynamics for public key encryption, Phys. Rev. Lett. 90(4), 31 (2003)

    Article  Google Scholar 

  115. L. Kocarev, Z. Tasev, J. Makraduli: Public-key encryption and digital-signature schemes using chaotic maps, 16th European Conference on Circuits Theory and Design, ECCTD’03, Kraków, 1–4 September 2003, Poland

    Google Scholar 

  116. L. Kocarev, Z. Tasev: Public key encryption based on Chebyshev maps, Proc. 2003 IEEE Symposium on Circuits and Systems, Vol. 3, Bangkok, TH, pp. 28–31

    Google Scholar 

  117. D. Xiao, X. Liao, K. Wong: An efficient entire chaos-based scheme for deniable authentication, Chaos Solitons Fractals 23, 1327–1331 (2005)

    MATH  Google Scholar 

  118. P. Bergamo, P. D’Arco, A. Santis, L. Kocarev: Security of public key cryptosystems based on Chebyshev polynomials, IEEE Trans. Circuits Syst. I 52, 1382–1393 (2005)

    Article  Google Scholar 

  119. G. Alvarez: Security problems with a chaos-based deniable authentication scheme, Chaos Solitons Fractals 26, 7–11 (2005)

    Article  MATH  Google Scholar 

  120. D. Xiao, X. Liao, S. Deng: A novel key agreement protocol based on chaotic maps, Inf. Sci. 177, 1136–1142 (2007)

    Article  MathSciNet  Google Scholar 

  121. P.-H. Lee: Evidence of the correlation between positive Lyapunov exponents and good chaotic random number sequences, Comput. Phys. Commun. 160, 187–203 (2004)

    Article  Google Scholar 

  122. S.-C. Pei: Generating chaotic stream ciphers using chaotic systems, Chin. J. Phys. 41, 559–581 (2003)

    MathSciNet  Google Scholar 

  123. X. Zhang, et al.: A chaotic cipher mmohocc and its randomness evaluation, 6th International Conference on Complex Systems (ICCS), Boston, June 25–30, 2006

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Pejaś, J., Skrobek, A. (2010). Chaos-Based Information Security. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04117-4_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04116-7

  • Online ISBN: 978-3-642-04117-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics