Applications of tripled chaotic maps in cryptography

被引:21
作者
Behnia, S. [1 ]
Akhshani, A. [2 ]
Akhavan, A. [3 ]
Mahmodi, H. [2 ]
机构
[1] IAU, Dept Phys, Orumiyeh, Iran
[2] Univ Sains Malaysia, Sch Phys, George Town 11800, Malaysia
[3] Univ Sains Malaysia, Sch Comp Sci, George Town 11800, Malaysia
关键词
LOOK-UP TABLE; ENCRYPTION SCHEME; DENIABLE AUTHENTICATION; COMMUNICATION-SYSTEM; SECURITY; SYNCHRONIZATION; CRYPTOSYSTEM;
D O I
10.1016/j.chaos.2007.08.013
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Security of information has become it major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them fundamentally were flawed by a lack of robustness and security. For getting higher security and higher complexity, in the current paper, we introduce a new kind of symmetric key block cipher algorithm that is based on tripled chaotic maps. in this algorithm, the utilization of two coupling parameters, as well as the increased complexity of the cryptosystem, make a contribution to the development of cryptosystem with higher security. In order to increase the security of the proposed algorithm, the size of key space and the computational complexity of the coupling parameters should be increased as well. Both the theoretical and experimental results state that the proposed algorithm has many capabilities such its acceptable speed and complexity in the algorithm due to the existence of two coupling parameters and high security. Note that the ciphertext has a flat distribution and has the same size its the plain-text. Therefore, it is suitable for practical use in secure communications. (C) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:505 / 519
页数:15
相关论文
共 46 条
[1]   Security analysis of communication system based on the synchronization of different order chaotic systems [J].
Alvarez, G ;
Hernández, L ;
Muñoz, J ;
Montoya, F ;
Li, SJ .
PHYSICS LETTERS A, 2005, 345 (4-6) :245-250
[2]   Security problems with a chaos-based deniable authentication scheme [J].
Alvarez, G .
CHAOS SOLITONS & FRACTALS, 2005, 26 (01) :7-11
[3]   Breaking parameter modulated chaotic secure communication system [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
CHAOS SOLITONS & FRACTALS, 2004, 21 (04) :783-787
[4]   Keystream cryptanalysis of a chaotic cryptographic method [J].
Alvarez, G ;
Montoya, R ;
Romera, M ;
Pastor, G .
COMPUTER PHYSICS COMMUNICATIONS, 2004, 156 (02) :205-207
[5]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[6]  
[Anonymous], 1997, Chaos. An Introduction to Dynamical Systems
[7]  
[Anonymous], 1997, Discreteness and Continuity in Problems of Chaotic Dynamics (Monograph)
[8]  
[Anonymous], 2001, INTRO CRYPTOGRAPHY
[9]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[10]   A novel algorithm for image encryption based on mixture of chaotic maps [J].
Behnia, S. ;
Akhshani, A. ;
Mahmodi, H. ;
Akhavan, A. .
CHAOS SOLITONS & FRACTALS, 2008, 35 (02) :408-419