57,977 research outputs found
A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application to Watermarking
In this paper, a new chaotic pseudo-random number generator (PRNG) is
proposed. It combines the well-known ISAAC and XORshift generators with chaotic
iterations. This PRNG possesses important properties of topological chaos and
can successfully pass NIST and TestU01 batteries of tests. This makes our
generator suitable for information security applications like cryptography. As
an illustrative example, an application in the field of watermarking is
presented.Comment: 11 pages, 7 figures, In WISM 2010, Int. Conf. on Web Information
Systems and Mining, volume 6318 of LNCS, Sanya, China, pages 202--211,
October 201
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps
Recently, a chaotic cryptographic scheme based on composition maps was
proposed. This paper studies the security of the scheme and reports the
following findings: 1) the scheme can be broken by a differential attack with
chosen-plaintext, where is the size of
plaintext and is the number of different elements in plain-text; 2) the
scheme is not sensitive to the changes of plaintext; 3) the two composition
maps do not work well as a secure and efficient random number source.Comment: 9 pages, 7 figure
A fast and light stream cipher for smartphones
We present a stream cipher based on a chaotic dynamical system. Using a
chaotic trajectory sampled under certain rules in order to avoid any attempt to
reconstruct the original one, we create a binary pseudo-random keystream that
can only be exactly reproduced by someone that has fully knowledge of the
communication system parameters formed by a transmitter and a receiver and
sharing the same initial conditions. The plaintext is XORed with the keystream
creating the ciphertext, the encrypted message. This keystream passes the NISTs
randomness test and has been implemented in a videoconference App for
smartphones, in order to show the fast and light nature of the proposed
encryption system
Cryptanalysis of a family of self-synchronizing chaotic stream ciphers
Unimodal maps have been broadly used as a base of new encryption strategies.
Recently, a stream cipher has been proposed in the literature, whose keystream
is basically a symbolic sequence of the (one-parameter) logistic map or of the
tent map. In the present work a thorough analysis of the keystream is made
which reveals the existence of some serious security problemsComment: 10 pages, 6 figure
- …