15 research outputs found
On the Security of the Yi-Tan-Siew Chaos-Based Cipher
This paper presents a comprehensive analysis on the security of the
Yi-Tan-Siew chaotic cipher proposed in [IEEE TCAS-I 49(12):1826-1829 (2002)]. A
differential chosen-plaintext attack and a differential chosen-ciphertext
attack are suggested to break the sub-key K, under the assumption that the time
stamp can be altered by the attacker, which is reasonable in such attacks.
Also, some security Problems about the sub-keys and are
clarified, from both theoretical and experimental points of view. Further
analysis shows that the security of this cipher is independent of the use of
the chaotic tent map, once the sub-key is removed via the proposed
suggested differential chosen-plaintext attack.Comment: 5 pages, 3 figures, IEEEtrans.cls v 1.
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps
Recently, a chaotic cryptographic scheme based on composition maps was
proposed. This paper studies the security of the scheme and reports the
following findings: 1) the scheme can be broken by a differential attack with
chosen-plaintext, where is the size of
plaintext and is the number of different elements in plain-text; 2) the
scheme is not sensitive to the changes of plaintext; 3) the two composition
maps do not work well as a secure and efficient random number source.Comment: 9 pages, 7 figure
A NOVEL APPROACH IMAGE ENCRYPTION BASED ON LOGISTIC MAP
The paper present s a novel approach image encryption based on logistic map. Present days, multimedia messages are exchanged based on internet. Security threats are drastically increasing over the internet. So, security messages are handling by different cryptographic methods in digital image processing. In the paper, proposed method follows 4 steps. Firstly, apply logistic map to the original image and cover image. The original image pixel values are subtract with the summation of corresponding pixel values of the resultant of original and cover image pixel values. The attackers are difficult to decrypt the original image from encode image because of the exact parameter pixels used for the logistic maps to get the original image, which is difficult to guess the parameters. The proposed method has analysis the results and different measurement analysis as shown in experimental section
A Review of Resonant Converter Control Techniques and The Performances
paper first discusses each control technique and then gives experimental results and/or performance to highlights their merits. The resonant converter used as a case study is not specified to just single topology instead it used few topologies such as series-parallel resonant converter (SPRC), LCC resonant converter and parallel resonant converter (PRC). On the other hand, the control techniques presented in this paper are self-sustained phase shift modulation (SSPSM) control, self-oscillating power factor
control, magnetic control and the H-â robust control technique
SIMULATING SEISMIC WAVE PROPAGATION IN TWO-DIMENSIONAL MEDIA USING DISCONTINUOUS SPECTRAL ELEMENT METHODS
We introduce a discontinuous spectral element method for simulating seismic wave in 2- dimensional elastic media. The methods combine the flexibility of a discontinuous finite
element method with the accuracy of a spectral method. The elastodynamic equations are discretized using high-degree of Lagrange interpolants and integration over an element is
accomplished based upon the Gauss-Lobatto-Legendre integration rule. This combination of discretization and integration results in a diagonal mass matrix and the use of discontinuous finite element method makes the calculation can be done locally in each element. Thus, the algorithm is simplified drastically. We validated the results of one-dimensional problem by comparing them with finite-difference time-domain method and exact solution. The comparisons show excellent agreement