Lorenz's attractor applied to the stream cipher (Ali-Pacha generator)

被引:7
作者
Ali-Pacha, Adda
Hadj-Said, Naima
M'Hamed, A.
Belgoraf, A.
机构
[1] Univ Sci & Technol Oran, Oran 31036, Algeria
[2] Inst Natl Telecommun, F-91011 Evry, France
关键词
D O I
10.1016/j.chaos.2006.03.009
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The safety of information is primarily founded today on the calculation of algorithms whose confidentiality depends on the number of the necessary bits for the definition of a cryptographic key. If this type of system has proved reliable, then the increasing power of the means of calculation threatens the confidentiality of these methods. The powerful computers are certainly able to quantify and decipher information quickly, but their computing speed allows parallel cryptanalysis, which aims "to break" a code by discovering the key, for example, by testing all the possible keys. The only evocation of the principle of the quantum computer, with the potentially colossal capacities of calculation, has started a shock, even in the most savaged who are convinced of algorithmic cryptography. To mitigate this concern, we will introduce in this article a new cryptographic system based on chaotic concepts. (C) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1762 / 1766
页数:5
相关论文
共 7 条
[1]  
GLEICK J, 1989, CHAOS THEORY
[2]  
LANGLOIS M, 1999, QUANTUM CRYPTOGRAPHY
[3]  
LARGER L, 1997, THESIS UFR SCI TECHN
[4]   Chaotic behavior for the secrete key of cryptographic system [J].
Pacha, AA ;
Hadj-Said, N ;
Belmeki, B ;
Belgoraf, A .
CHAOS SOLITONS & FRACTALS, 2005, 23 (05) :1549-1552
[5]  
Schneier B, 1996, APPL CRYPTOGRAPHY
[6]  
STEVEN HS, 1994, NONLINEAR SYSTEMS CH
[7]  
STEWART W, 1992, GOD DOES IT PLAY DIC