13,280 research outputs found
A new image encryption and decryption approach based on chaotic analog signal generator
In the last one and half decade, chaos has occurred as a new favorable candidate for network security because many chaos important features such as very much sensitivity to initial conditions and ergodicity, are directly related with two basic properties of cipher texts: confusion and diffusion. In this paper a new image encryption and decryption method is proposed which is based on the chaotic signal generator and 2D baker maps. A 144 bit external secrete key acts as the input of the chaotic signal generator. Baker maps used for the confusion of the main input image after that XOR operation used in diffusion process. The proposed method is simulated using Matlab and the results are secure with all type of cryptanalytic tests and statistical analysis tests
Applications of tripled chaotic maps in cryptography
Security of information has become a major issue during the last decades. New
algorithms based on chaotic maps were suggested for protection of different
types of multimedia data, especially digital images and videos in this period.
However, many of them fundamentally were flawed by a lack of robustness and
security. For getting higher security and higher complexity, in the current
paper, we introduce a new kind of symmetric key block cipher algorithm that is
based on \emph{tripled chaotic maps}. In this algorithm, the utilization of two
coupling parameters, as well as the increased complexity of the cryptosystem,
make a contribution to the development of cryptosystem with higher security. In
order to increase the security of the proposed algorithm, the size of key space
and the computational complexity of the coupling parameters should be increased
as well. Both the theoretical and experimental results state that the proposed
algorithm has many capabilities such as acceptable speed and complexity in the
algorithm due to the existence of two coupling parameter and high security.
Note that the ciphertext has a flat distribution and has the same size as the
plaintext. Therefore, it is suitable for practical use in secure
communications.Comment: 21 pages, 10 figure
Some hints for the design of digital chaos-based cryptosystems: lessons learned from cryptanalysis
In this work we comment some conclusions derived from the analysis of recent
proposals on the field of chaos-based cryptography. These observations remark
the main problems detected in some of those schemes under examination.
Therefore, this paper is a list of what to avoid when considering chaos as
source of new strategies to conceal and protect information
Deciphering a novel image cipher based on mixed transformed Logistic maps
Since John von Neumann suggested utilizing Logistic map as a random number
generator in 1947, a great number of encryption schemes based on Logistic map
and/or its variants have been proposed. This paper re-evaluates the security of
an image cipher based on transformed logistic maps and proves that the image
cipher can be deciphered efficiently under two different conditions: 1) two
pairs of known plain-images and the corresponding cipher-images with
computational complexity of ; 2) two pairs of chosen plain-images
and the corresponding cipher-images with computational complexity of ,
where is the number of pixels in the plain-image. In contrast, the required
condition in the previous deciphering method is eighty-seven pairs of chosen
plain-images and the corresponding cipher-images with computational complexity
of . In addition, three other security flaws existing in most
Logistic-map-based ciphers are also reported.Comment: 10 pages, 2 figure
- …