×

zbMATH — the first resource for mathematics

A block encryption algorithm based on dynamic sequences of multiple chaotic systems. (English) Zbl 1221.94067
Summary: A block encryption algorithm using dynamic sequences generated by multiple chaotic systems is proposed in this paper. In this algorithm, several one-dimension chaotic maps generate pseudo-random sequences, which are independent and approximately uniform. After a series of transformations, the sequences constitute a new pseudo-random sequence uniformly distributing in the value space, which covers the plaintext by executing Exclusive-OR and shifting operations some rounds to form the cipher. This algorithm makes the pseudo-random sequence possess more concealment and noise like characteristic, and overcomes the periodic malpractice caused by the computer precision and single chaotic system. Simulation results show that the algorithm is efficient and useable for the security of communication system.

MSC:
94A60 Cryptography
37D45 Strange attractors, chaotic dynamics of systems with hyperbolic behavior
37N35 Dynamical systems in control
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] Matthews, R., On the derivation of a “chaotic” encryption algorithm, Cryptologia, 13, 29-42, (1989)
[2] Wang, X.Y., Chaos in complex nonlinear system, (2003), Publishing House of Electronics Industry Beijing
[3] Brown, R.; Chua, L.O., Clarifying chaos: examples and counterexamples, Int J bifur chaos, 6, 219-249, (1996) · Zbl 0874.58038
[4] Baptista, M.S., Cryptography with chaos, Phys lett A, 240, 50-54, (1998) · Zbl 0936.94013
[5] Alvarez, E.; Fernández, A.; Garcı´a, P.; Jiménez, J.; Marcano, A., New approach to chaotic encryption, Phys lett A, 263, 373-375, (1999)
[6] Kocarev L, Jakimoski G, Stojanovski T, Parlitz U. From chaotic maps to encryption schemes. In: IEEE international symposium circuits and systems; 1998. p. 514-7.
[7] Alvarez G, Pastor G, Montoya F, Romera M. Chaotic cryptosystems. In: Proceedings of the IEEE international carnahan conference on security technology; 1999. p. 332-8.
[8] Li, S.J.; Mou, X.Q.; Cai, Y.L., On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision, Comput phys commun, 153, 52-58, (2003) · Zbl 1196.94057
[9] Pareek, N.K.; Patidar, V.; Sud, K.K., Cryptography using multiple one-dimensional chaotic maps, Commun nonlinear sci numer simul, 10, 715-723, (2005) · Zbl 1075.68027
[10] Pareek, N.K.; Patidar, V.; Sud, K.K., Discrete chaotic cryptography using external key, Phys lett A, 309, 75-82, (2003) · Zbl 1010.68063
[11] Feldmann U, Hasler M, Schwarz W. Communication by chaotic signals: the inverse system approach. In: IEEE international symposium circuits and systems; 1995. p. 680-3.
[12] Wong, W.K.; Lee, L.P.; Wong, K.W., A modified chaotic cryptographic method, Comput phys commun, 138, 234-236, (2001) · Zbl 0987.94033
[13] Jakimoski, G.; Kocarev, L., Chaos and cryptography: block encryption ciphers based on chaotic maps, IEEE trans circuit syst I, 48, 163-169, (2001) · Zbl 0998.94016
[14] Wong, K.W., A fast chaotic cryptographic scheme with dynamic lookup table, Phys lett A, 298, 238-242, (2002) · Zbl 0995.94029
[15] Wong, K.W., A combined chaotic cryptographic and hashing scheme, Phys lett A, 307, 292-298, (2003) · Zbl 1008.94018
[16] Stinson, D.R., Cryptography: theory and practice, (1995), CRC Press Boca Raton · Zbl 0855.94001
[17] Biham, E.; Shamir, A., Differential cryptanalysis of data encryption standard, (1993), Springer-Verlag Berlin · Zbl 0778.94005
[18] Jakimoski, G.; Kocarev, L., Differential and linear probabilities of a block-encryption cipher, IEEE trans circuit syst I, 50, 121-123, (2003) · Zbl 1368.94103
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.