On the reliability of computational chaos-based cryptography for information exchange

10/14/2019
by   T. A. Santos, et al.
0

This paper investigates the use of dynamical chaotic systems to encrypt and exchange images between different devices. Two devices were used to simulate the Cubic Map, having the same set of initial conditions, to generate an encryption key. Although both devices are floating-point compliant, the simulations, and consequently the encryption key, turned out to differ from one another. This indicates that many existing chaos-based encryption schemes are just special cases of computational arithmetic properties, in which some characteristics in the construction of the devices coincided. A method to mitigate such flaw was also presented.

READ FULL TEXT
research
01/13/2023

An RTL Implementation of the Data Encryption Standard (DES)

Data Encryption Standard (DES) is based on the Feistel block cipher, dev...
research
12/26/2018

Image Encryption Algorithm Using Natural Interval Extensions

It is known that chaotic systems have widely been used in cryptography. ...
research
03/25/2020

Cryptography using generalized Fibonacci matrices with Affine-Hill cipher

In this article, we have proposed a public key cryptography using Affine...
research
10/29/2021

A hybrid chaos map with two control parameters to secure image encryption algorithms

In this paper, we introduce a hybrid chaos map for image encryption meth...
research
07/10/2020

Hardware Implementation of Keyless Encryption Scheme for Internet of Things Based on Image of Memristors

The Internet of Things (IoT) is rapidly increasing the number of connect...
research
06/07/2023

High-Performance Caching of Homomorphic Encryption for Cloud Databases

While homomorphic encryption (HE) has garnered significant research inte...
research
10/08/2018

Fully Homomorphic Image Processing

Fully homomorphic encryption has allowed devices to outsource computatio...

Please sign up or login with your details

Forgot password? Click here to reset