Ilyas et al., 2012 - Google Patents
A study on binary sequences generated by tent map having cryptographic viewIlyas et al., 2012
- Document ID
- 17913517107635122269
- Author
- Ilyas A
- Luca A
- Vlad A
- Publication year
- Publication venue
- 2012 9th International Conference on Communications (COMM)
External Links
Snippet
The paper brings into evidence the inherent flaws of the tent map when used for generating binary sequences for cryptographic purpose. In this respect, the possibility to use tent map parameter as element of the secret key is evaluated. An original method to estimate the tent …
- 238000005070 sampling 0 description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Herbadji et al. | Colour image encryption scheme based on enhanced quadratic chaotic map | |
Usama et al. | Chaos-based secure satellite imagery cryptosystem | |
Ye et al. | A chaotic image encryption algorithm based on information entropy | |
Liu et al. | Chaos‐based fast colour image encryption scheme with true random number keys from environmental noise | |
Abanda et al. | Image encryption by chaos mixing | |
Huang et al. | Efficient symmetric image encryption by using a novel 2D chaotic system | |
Broumandnia | The 3D modular chaotic map to digital color image encryption | |
Boriga et al. | A new hyperchaotic map and its application in an image encryption scheme | |
CN108683669B (en) | Data verification method and secure multi-party computing system | |
Liu et al. | An Improved Image Encryption Algorithm based on Chaotic System. | |
Ahmed et al. | An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption | |
Ping et al. | Image encryption based on non-affine and balanced cellular automata | |
Wang et al. | A one-time pad color image cryptosystem based on SHA-3 and multiple chaotic systems | |
Boriga et al. | A new fast image encryption scheme based on 2D chaotic maps | |
Bao et al. | A new chaotic system for image encryption | |
Ayoup et al. | Efficient selective image encryption | |
CN105262843A (en) | Data anti-leakage protection method for cloud storage environment | |
Gafsi et al. | Efficient encryption system for numerical image safe transmission | |
CN104038493B (en) | Bilinear pairing-free cloud storage data security audit method | |
Balaska et al. | Image encryption using a combination of Grain‐128a algorithm and Zaslavsky chaotic map | |
Bahrami et al. | Image encryption using a lightweight stream encryption algorithm | |
Boriga et al. | A New One‐Dimensional Chaotic Map and Its Use in a Novel Real‐Time Image Encryption Scheme | |
Liu et al. | Chaos-based color image encryption using one-time keys and Choquet fuzzy integral | |
Sinha et al. | Chaotic image encryption scheme based on modified arnold cat map and henon map | |
Ganesan et al. | Image encryption using eight dimensional chaotic cat map |