Do you want to publish a course? Click here

Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps

الفوضى و التشفير: مشفرات الكتلة المعتمدة على التصاوير الفوضوية

2802   2   222   0 ( 0 )
 Publication date 2014
  fields Mathematics
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

This paper is devoted to the analysis of the impact of chaos-based techniques on block encryption ciphers. We present several chaos based ciphers. Using the well-known principles in the cryptanalysis we show that these ciphers do not behave worse than the standard ones, opening in this way a novel approach to the design of block encryption ciphers.

References used
C. E. Shannon، ―Communication theory of secrecy systems،‖ Bell Syst.Tech. J.، vol. 28، pp. 656–715، 1949
J. Gickenheimer and P. Holmes ، Nonlinear Oscillations، Dynamical Systemsand Bifurcations of Vector Fields. Berlin، Germany: Springer،1983
B. Schneier، Applied Cryptography: Protocols، Algorithms، and SourceCode in C. New York: Wiley، 1996
T. Habutsu، Y. Nishio، I. Sasase، and S. Mori، ―A secret key cryptosystemby iterating a chaotic map،‖ in Proc. Advances in Cryptology—EUROCRYPT’91. Berlin، Germany: Springer- Verlag، 1991، pp. 127–140
Z. Kotulski and J. Szczepanski ، ―Discrete chaotic cryptography،‖ Ann. Phys.، vol. 6، pp. 381–394، 1997
rate research

Read More

We take an IDEA Algorithm and add to it some stages depend on BBM to get an Enhanced Algorithm, which had 3keys, 128-bit input block.
A Mobile Ad hoc Network (MANET) is a network of wireless mobile devices deployed without the aid of any pre-existing infrastructure or centralized administration.
In this paper, I study the motion of the double pendulum . I write the Euler -Lagrange equations and canonical Hamilton's equations. I study the special case in which one angle is constant, where the double pendulum behaves as a simple pendulum. I also mention small oscillator's case, where the numerical solution converges to the analytical solution, for unequal lengths and masses.
This paper presents a new type of encryption, using a matrix asymmetric and symmetric matrix inverse matrix clear text, which is an internal encryption. As well as asymmetric encryption, where the ciphertext is inversely symmetric matrix. Decryp tion matrix related to any asymmetric encryption keys depends on public and private, and is applied to the coded messages used in the current system ASCII our computers.
Quantum Computers can be considered the biggest threat against cryptography algorithms especially the public key algorithms. In this seminar, we will discuss Quantum Computers starting from a simple explanation about the physics and mathematics basic s behind these computers, then explaining why these computers are special in regard of cracking the public key algorithms. Finally, we will describe an example of quantum resistant algorithms.

suggested questions

comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا