Nothing Special   »   [go: up one dir, main page]

Ilyas et al., 2012 - Google Patents

A study on binary sequences generated by tent map having cryptographic view

Ilyas et al., 2012

Document ID
17913517107635122269
Author
Ilyas A
Luca A
Vlad A
Publication year
Publication venue
2012 9th International Conference on Communications (COMM)

External Links

Snippet

The paper brings into evidence the inherent flaws of the tent map when used for generating binary sequences for cryptographic purpose. In this respect, the possibility to use tent map parameter as element of the secret key is evaluated. An original method to estimate the tent …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals

Similar Documents

Publication Publication Date Title
Herbadji et al. Colour image encryption scheme based on enhanced quadratic chaotic map
Usama et al. Chaos-based secure satellite imagery cryptosystem
Ye et al. A chaotic image encryption algorithm based on information entropy
Liu et al. Chaos‐based fast colour image encryption scheme with true random number keys from environmental noise
Abanda et al. Image encryption by chaos mixing
Huang et al. Efficient symmetric image encryption by using a novel 2D chaotic system
Broumandnia The 3D modular chaotic map to digital color image encryption
Boriga et al. A new hyperchaotic map and its application in an image encryption scheme
CN108683669B (en) Data verification method and secure multi-party computing system
Liu et al. An Improved Image Encryption Algorithm based on Chaotic System.
Ahmed et al. An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption
Ping et al. Image encryption based on non-affine and balanced cellular automata
Wang et al. A one-time pad color image cryptosystem based on SHA-3 and multiple chaotic systems
Boriga et al. A new fast image encryption scheme based on 2D chaotic maps
Bao et al. A new chaotic system for image encryption
Ayoup et al. Efficient selective image encryption
CN105262843A (en) Data anti-leakage protection method for cloud storage environment
Gafsi et al. Efficient encryption system for numerical image safe transmission
CN104038493B (en) Bilinear pairing-free cloud storage data security audit method
Balaska et al. Image encryption using a combination of Grain‐128a algorithm and Zaslavsky chaotic map
Bahrami et al. Image encryption using a lightweight stream encryption algorithm
Boriga et al. A New One‐Dimensional Chaotic Map and Its Use in a Novel Real‐Time Image Encryption Scheme
Liu et al. Chaos-based color image encryption using one-time keys and Choquet fuzzy integral
Sinha et al. Chaotic image encryption scheme based on modified arnold cat map and henon map
Ganesan et al. Image encryption using eight dimensional chaotic cat map