Skip to main content

Using the Deterministic Chaos in Variable Mode of Operation of Block Ciphers

  • Conference paper
Artificial Intelligence Perspectives and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 347))

Abstract

This paper describes creating the new variable mode of operation for block cipher, and it also discusses possibilities of using the deterministic chaos in this mode of operation. It discusses the use of deterministic chaos to make the mode of operation variable and pseudo-random. Main idea of this article is to design the mode of operation dependent on all parts of encryption process as plaintext, cipher text and previous used key, and to create the function controlled by deterministic chaos, where the chaotic system has role of pseudo-random number generator, which manages the rules how these parts are used. The logistic map as the simple deterministic chaos system is used for showing the example of the application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellovin, S.M.: Modes of Operation. Columbia University, Columbia, USA (2009), https://www.cs.columbia.edu/~smb/classes/s09/l05.pdf (cit. January 30, 2015)

  2. Weisstein, E.W.: Logistic Map. From MathWorld–A Wolfram Web Resource, http://mathworld.wolfram.com/LogisticMap.html

  3. Modes Development. In: National Institute of Standards and Technology: Computer Security Resource Center (2001) (October 16, 2014), http://csrc.nist.gov/groups/ST/toolkit/BCM/modes_development.html (cit. February 03, 2015)

  4. Sprott, J.C.: Chaos and Time-Series Analysis. Oxford University Press (2003)

    Google Scholar 

  5. Senkerik, R., Pluhacek, M., Zelinka, I., Davendra, D., Oplatkova, Z.: A Brief Survey on the Chaotic Systems as the Pseudo Random Number Generators. In: Sanayei, A., Rössler, O.E., Zelinka, I. (eds.) ISCS 2014: Interdisciplinary Symposium on Complex Systems. Emergence, Complexity and Computation, vol. 14, pp. 205–214. Springer International Publishing (2015), doi:10.1007/978-3-319-10759-2_22

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Petr Zacek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zacek, P., Jasek, R., Malanik, D. (2015). Using the Deterministic Chaos in Variable Mode of Operation of Block Ciphers. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Prokopova, Z., Silhavy, P. (eds) Artificial Intelligence Perspectives and Applications. Advances in Intelligent Systems and Computing, vol 347. Springer, Cham. https://doi.org/10.1007/978-3-319-18476-0_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18476-0_34

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18475-3

  • Online ISBN: 978-3-319-18476-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics