Security of Chaos-Based Communication and Encryption
During the last decade a new approach for secure communication, based on chaotic dynamics attracted the attention of the scientific community. In this chapter we give an overview and describe the research that was done at the Institute for Nonlinear Science (INLS) on this topic. We begin this chapter with a brief introduction to chaos-based encryption schemes. We then describe a new method for public key encryption that we have developed which is based on distributed chaotic dynamics. Next, we lay out a quantitative cryptanalysis approach for symmetric key encryption schemes that are based on active/passive decomposition of chaotic dynamics. We end this chapter with a summary and suggestions for future research.
KeywordsChaotic Dynamic Encryption Scheme Receiver Dynamic Chaotic Component Attractor Position
Unable to display preview. Download preview PDF.
- 2.R. Tenny, L. S. Tsimring, H. D. I. Abarbanel, L. E. Larson, Asymmetric Key Encryption using Distributed Chaotic Nonlinear Dynamics, Proc. of the IASTED International Conference on Communications Internet and Information Technology, St. Thomas, US Virgin Islands, pp. 338–345, 2002.Google Scholar
- 4.R. Tenny, Symmetric and Asymmetric Secure Communication Schemes using Nonlinear Dynamics, Ph.D. Dissertation, University of California, San Diego 2003.Google Scholar
- 28.V. S. Miller, Use of elliptic curves in Cryptology, Proc. of Crypto 85, pp. 417–426, 1986.Google Scholar
- 29.T. El-Gamal, A public key cyryptosystem and signature scheme based on discrete logarithms, Advances in Cryptography: Proc. of Crypto 84, Springer-Verlag, Berlin, pp. 10–18, 1985.Google Scholar
- 31.R. J. McEliece, A public-key cryptosystem based on algebric coding theory. JPL DSN Progress report, vol. 42–44, pp. 114–116, 1978.Google Scholar
- 33.DDE overview, images and updates may be found at: http://inls.ucsd.edu/~roy/DDE/MainPage/Google Scholar
- 34.K. Kaneko, Theory and Applications of Coupled Map Lattices, Nonlinear Science Theory and Applications (Wiley, New York, 1993).Google Scholar