Academic literature on the topic 'Chaos-based cryptosystem'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Chaos-based cryptosystem.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Chaos-based cryptosystem"

1

Farajallah, Mousa, Safwan El Assad, and Olivier Deforges. "Fast and Secure Chaos-Based Cryptosystem for Images." International Journal of Bifurcation and Chaos 26, no. 02 (2016): 1650021. http://dx.doi.org/10.1142/s0218127416500218.

Full text
Abstract:
Nonlinear dynamic cryptosystems or chaos-based cryptosystems have been attracting a large amount of research since 1990. The critical aspect of cryptography is to face the growth of communication and to achieve the design of fast and secure cryptosystems. In this paper, we introduce three versions of a chaos-based cryptosystem based on a similar structure of the Zhang and Fridrich cryptosystems. Each version is composed of two layers: a confusion layer and a diffusion layer. The confusion layer is achieved by using a modified 2-D cat map to overcome the fixed-point problem and some other weakn
APA, Harvard, Vancouver, ISO, and other styles
2

Guglielmi, Véronique, Pierre Pinel, Danièle Fournier-Prunaret, and Abdel-Kaddous Taha. "Chaos-based cryptosystem on DSP." Chaos, Solitons & Fractals 42, no. 4 (2009): 2135–44. http://dx.doi.org/10.1016/j.chaos.2009.03.160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Murillo-Escobar, Miguel Angel, Manuel Omar Meranza-Castillón, Rosa Martha López-Gutiérrez, and César Cruz-Hernández. "Suggested Integral Analysis for Chaos-Based Image Cryptosystems." Entropy 21, no. 8 (2019): 815. http://dx.doi.org/10.3390/e21080815.

Full text
Abstract:
Currently, chaos-based cryptosystems are being proposed in the literature to provide confidentiality for digital images, since the diffusion effect in the Advance Encryption Standard (AES) algorithm is weak. Security is the most important challenge to assess in cryptosystems according to the National Institute of Standard and Technology (NIST), then cost and performance, and finally algorithm and implementation. Recent chaos-based image encryption algorithms present basic security analysis, which could make them insecure for some applications. In this paper, we suggest an integral analysis fra
APA, Harvard, Vancouver, ISO, and other styles
4

ALVAREZ, GONZALO, and SHUJUN LI. "SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS." International Journal of Bifurcation and Chaos 16, no. 08 (2006): 2129–51. http://dx.doi.org/10.1142/s0218127406015970.

Full text
Abstract:
In recent years, a large amount of work on chaos-based cryptosystems have been published. However, many of the proposed schemes fail to explain or do not possess a number of features that are fundamentally important to all kind of cryptosystems. As a result, many proposed systems are difficult to implement in practice with a reasonable degree of security. Likewise, they are seldom accompanied by a thorough security analysis. Consequently, it is difficult for other researchers and end users to evaluate their security and performance. This work is intended to provide a common framework of basic
APA, Harvard, Vancouver, ISO, and other styles
5

Luo, Yuling, Dezheng Zhang, Junxiu Liu, Yunqi Liu, Yi Cao, and Xuemei Ding. "Cryptanalysis of Chaos-Based Cryptosystem from the Hardware Perspective." International Journal of Bifurcation and Chaos 28, no. 09 (2018): 1850114. http://dx.doi.org/10.1142/s0218127418501146.

Full text
Abstract:
Chaos has been used in cryptography for years and many chaotic cryptographic systems have been proposed. Their securities are often evaluated by conducting conventional statistical tests, however few studies have referred to the security issue of the chaotic hardware cryptographic systems. This paper evaluates the security of the chaotic cryptographic system from a hardware perspective by using the side channel analysis attack. First, a chaotic block cryptosystem is designed and implemented based on an Atmel microcontroller. Then the conventional statistical security tests, including SP 800-22
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Ling Jiao, and Ao Dong Shen. "A Novel Public Key Image Cryptosystem Based on Elliptic Curve and Arnold Cat Map." Advanced Materials Research 989-994 (July 2014): 4183–86. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4183.

Full text
Abstract:
For decades, symmetric cryptosystems, such as chaos-based ones, are designed for image encryption. In this paper, a novel public key scheme for image encryption is presented. Based on the improved elliptic curve cryptosystem and Arnold cat map, the novel scheme can offer high security while avoid exchange and distribution of secret keys. The experiments illustrate that the presented scheme is computationally less complex than the traditional asymmetric cryptosystems and suitable for large image encryption.
APA, Harvard, Vancouver, ISO, and other styles
7

Dib, Samira, Asma Benchiheb, and Fadila Benmeddour. "Robust Chaos-Based Medical Image Cryptosystem." WSEAS TRANSACTIONS ON COMMUNICATIONS 21 (July 2, 2022): 230–43. http://dx.doi.org/10.37394/23204.2022.21.28.

Full text
Abstract:
In In this paper, we propose an efficient cryptosystem for medical images. While the confusion stage is ensured by an Arnold's cat map allowing the permutation of pixels; the diffusion stage is alleviated by an improved logistic map used by the chaotic key-based algorithm (CKBA). The simulation results attest that the proposed algorithm has superior security and enables efficient encryption/decryption of medical images. Performances were evaluated by several security analyses: the NPCR and UACI are improved over 99.60% and 33.46% respectively, and entropy is reported close to 7.8. What makes t
APA, Harvard, Vancouver, ISO, and other styles
8

Usama, Muhammad, Muhammad Khurram Khan, Khaled Alghathbar, and Changhoon Lee. "Chaos-based secure satellite imagery cryptosystem." Computers & Mathematics with Applications 60, no. 2 (2010): 326–37. http://dx.doi.org/10.1016/j.camwa.2009.12.033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Arroyo, David, Fernando Hernandez, and Amalia B. Orúe. "Cryptanalysis of a Classical Chaos-Based Cryptosystem with Some Quantum Cryptography Features." International Journal of Bifurcation and Chaos 27, no. 01 (2017): 1750004. http://dx.doi.org/10.1142/s0218127417500043.

Full text
Abstract:
The application of synchronization theory to build new cryptosystems has been a hot topic during the last two decades. In this paper, we analyze a recent proposal in this field. We pinpoint the main limitations of the software implementation of chaos-based systems designed on the grounds of synchronization theory. In addition, we show that the cryptosystem under evaluation possesses serious security problems that imply a clear reduction of the key space.
APA, Harvard, Vancouver, ISO, and other styles
10

Gonzalez, Jesus D. Terrazas, and Witold Kinsner. "Evaluating the Security Level of a Cryptosystem based on Chaos." International Journal of Software Science and Computational Intelligence 4, no. 3 (2012): 80–120. http://dx.doi.org/10.4018/jssci.2012070105.

Full text
Abstract:
This paper presents tests specially-designed for a cryptosystem based on chaotic continuous cellular automata (CCA). The degree of the cryptosystem security is assessed by evaluating its (i) stationarity, (ii) spectral fractal dimension, and (iii) surrogate data. These tools are verified with known signals before applying them to test the cryptosystem. This paper introduces (i) a robust method to determine the minimum stationary window in a given time series, and (ii) a technique to conceal a chaotic attractor based on surrogate data. These new ideas are relevant because the stationarity of a
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Chaos-based cryptosystem"

1

Yang, Chunxiao. "Fractional chaotic pseudo-random number generator design and application to image cryptosystem." Electronic Thesis or Diss., Ecole centrale de Nantes, 2022. http://www.theses.fr/2022ECDN0063.

Full text
Abstract:
Dans cette thèse, nous avons utilisé des systèmes chaotiques pour concevoir des générateurs de nombres pseudoaléatoires(PRNG) et appliqué ces derniers aux cryptosystèmes en raison de leurs caractéristiques prometteuses, telles que le caractèrealéatoire et la sensibilité aux conditions initiales. Les systèmes chaotiques fractionnaires, bien que moins discutés que les carteset systèmes chaotiques classiques d’ordre entier, possèdent une complexité inhérente qui apporte de la nouveauté, de la complexité et des clés secrètes supplémentaires à la conception Chaotic PRNG (CPRNG), qui à son tour amél
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Yung-Chih, and 陳勇志. "An RSA Cryptosystem Based on Montgomery Powering Ladder and Chaos-based Random Number Generator." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/85266260232456361252.

Full text
Abstract:
碩士<br>國立交通大學<br>電子研究所<br>99<br>This thesis introduces a scalable hardware implementation of RSA cryptosystem. The architecture of this work is modified by the Montgomery modular multiplier and it based on Montgomery powering ladder algorithm. It can work in any length less than 4096-bit. This proposed algorithm provides a shorter latency on modular exponentiation operations than other works. It takes 3.5 ms, 13.7 ms, and 106 ms to complete a 1024-bit, 2048-bit, and 4096-bit key length of RSA calculation time respectively. Furthermore, we modify random number generator based on chaotic map. Tes
APA, Harvard, Vancouver, ISO, and other styles
3

Terrazas, Gonzalez Jesus David. "A multi-modular dynamical cryptosystem based on continuous-interval cellular automata." 2013. http://hdl.handle.net/1993/14403.

Full text
Abstract:
This thesis presents a computationally efficient cryptosystem based on chaotic continuous-interval cellular automata (CCA). This cryptosystem increases data protection as demonstrated by its flexibility to encrypt/decrypt information from distinct sources (e.g., text, sound, and images). This cryptosystem has the following enhancements over the previous chaos-based cryptosystems: (i) a mathematical model based on a new chaotic CCA strange attractor, (ii) integration of modules containing dynamical systems to generate complex sequences, (iii) generation of an unlimited number of keys due to the
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Chaos-based cryptosystem"

1

Ahmad, Musheer. "Cryptanalysis of Chaos Based Secure Satellite Imagery Cryptosystem." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22606-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vidal, Gerard, and Mikel Hernaez. "Communication Services Empowered with a Classical Chaos Based Cryptosystem." In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39884-1_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rajendran, Sujarani, Manivannan Doraipandian, Kannan Krithivasan, Ramya Sabapathi, and Palanivel Srinivasan. "Hyper Chaos Random Bit-Flipping Diffusion-Based Colour Image Cryptosystem." In Intelligent Sustainable Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2894-9_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Jianyong, and Junwei Zhou. "Improvement of Security and Feasibility for Chaos-Based Multimedia Cryptosystem." In Computational Science and Its Applications - ICCSA 2011. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21898-9_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Jian, and Jun Wang. "A Chaos-Based Digital Image Cryptosystem with an Improved Diffusion Strategy." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40618-8_99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alia, Mohammad Ahmad. "Cryptosystems Based on Chaos Theory." In Chaos, Complexity and Leadership 2013. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09710-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bouteghrine, Belqassim, Camel Tanougast, and Said Sadoudi. "A Survey on Chaos-Based Cryptosystems: Implementations and Applications." In 14th Chaotic Modeling and Simulation International Conference. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96964-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chandrasekaran, Jeyamala, B. Subramanyan, and Raman Selvanayagam. "A Chaos Based Approach for Improving Non Linearity in S Box Design of Symmetric Key Cryptosystems." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-17878-8_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Carmen, Pellicer-Lostao, and Lpez-Ruiz Ricardo. "Notions of Chaotic Cryptography: Sketch of a Chaos Based Cryptosystem." In Applied Cryptography and Network Security. InTech, 2012. http://dx.doi.org/10.5772/36419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nishchal, Naveen K. "Chaos-based information security." In Optical Cryptosystems. IOP Publishing, 2019. http://dx.doi.org/10.1088/978-0-7503-2220-1ch9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Chaos-based cryptosystem"

1

Fawaz, Z., S. El Assad, M. Frajallah, A. Khalil, R. Lozi, and O. Deforges. "Lightweight chaos-based cryptosystem for secure images." In 2013 IEEE Third International Conference on Information Science and Technology (ICIST). IEEE, 2013. http://dx.doi.org/10.1109/icist.2013.6747499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fawaz, Z., S. El Assad, M. Frajallah, A. Khalil, R. Lozi, and O. Deforges. "Lightweight chaos-based cryptosystem for secure images." In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2013. http://dx.doi.org/10.1109/icitst.2013.6750156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kader Mastan, J. Mohamedmoideen, and R. Pandian. "Cryptanalytic attacks on a chaos-based image encrypting cryptosystem." In 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). IEEE, 2021. http://dx.doi.org/10.1109/icacite51222.2021.9404679.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ta Thi Kim Hue, Chu Van Lam, Thang Manh Hoang, and Safwan Al Assad. "Implementation of secure SPN chaos-based cryptosystem on FPGA." In 2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE, 2012. http://dx.doi.org/10.1109/isspit.2012.6621274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Garcia-Bosque, M., A. Perez-Resa, C. Sanchez-Azqueta, and S. Celma. "A new randomness-enhancement method for chaos-based cryptosystem." In 2018 IEEE 9th Latin American Symposium on Circuits & Systems (LASCAS). IEEE, 2018. http://dx.doi.org/10.1109/lascas.2018.8399959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Jing, Ya-Qi Wang, and Zhen Zhang. "A self-adaptive image cryptosystem based on hyper-chaos." In 2016 35th Chinese Control Conference (CCC). IEEE, 2016. http://dx.doi.org/10.1109/chicc.2016.7553721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bi, Dayuan, and Dahu Wang. "A Chaos Public-Key Cryptosystem Based on Semi-Group Features." In 2009 2nd International Conference on Biomedical Engineering and Informatics. IEEE, 2009. http://dx.doi.org/10.1109/bmei.2009.5305633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wei, Jun, Xu Zheng, Jing Yu, and Yong Shuai. "Application of unicity distance in a cryptosystem based on chaos." In 2012 7th International Conference on Computer Science & Education (ICCSE 2012). IEEE, 2012. http://dx.doi.org/10.1109/iccse.2012.6295088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Xiaoyan. "Two-Dimension Chaos-Based Signature Algorithm for Multivariate Public Cryptosystem." In International Conference on Electronics, Mechanics, Culture and Medicine. Atlantis Press, 2016. http://dx.doi.org/10.2991/emcm-15.2016.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hoang, Thang Manh. "A Chaos-based Image Cryptosystem Using Nonstationary Dynamics of Logistic Map." In 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019. http://dx.doi.org/10.1109/ictc46691.2019.8939826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!