Skip to main content

Securing Communication by Chaos-based Encryption

  • Chapter
Contributions to Ubiquitous Computing

Part of the book series: Studies in Computational Intelligence ((SCI,volume 42))

  • 414 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baptista MS (1999) Cryptography with Chaos. Phys Lett A 240: 50-54

    Article  MathSciNet  Google Scholar 

  2. Baranovsky A, Daems D (1995) Design of One-dimensional Chaotic Maps with Prescribed Statistical Properties. Int J Bifurcation and Chaos 5 (6): 1585-1598

    Article  MATH  MathSciNet  Google Scholar 

  3. Batista AM, de S. Pinto SE, Viana RL, Lopes SR (2002) Lyapunov Spectrum and Synchronization of Piecewise Linear Map Lattices with Power-law Coupling. Physical Review E, 65:056209(9)

    Article  MathSciNet  Google Scholar 

  4. Garcia P, Parravano A, Cosenza MG, Jimenez J, Marcano A (2002) Coupled Map Networks as Communication Schemes. Physical Review E, 65:045201

    Article  Google Scholar 

  5. Habutsu T, Nishio Y, Sasase I, Mori S (1991) A Secret Key Cryptosystem by Iter-ating a Chaotic Map. LNCS 547: 127-140

    MathSciNet  Google Scholar 

  6. Kaneko K (ed) (2003) Theory and Application of Coupled Map Lattices, Ch. 1. John Wiley and Sons

    Google Scholar 

  7. Kocarev L (2001) Chaos-based Cryptography: A Brief Overview. IEEE Circuits and Systems Magazine 1 (3): 6-21

    Article  Google Scholar 

  8. Kohda T, Tsuneda A (1993) Pseudonoise Sequence by Chaotic Nonlinear Maps and Their Correlation Properties. IEICE Trans Commun E76-B: 855-862

    Google Scholar 

  9. Lasota A, Mackey MC (1997) Chaos, Fractals and Noise: Stochastic Aspects of Dynamics. Springer, New York

    Google Scholar 

  10. Li P, Li Z, Halang WA, Chen GR (2006) A Multiple Pseudo-random-bit Generator based on a Spatiotemporal Chaotic Map. Phys Lett A 349: 467-473

    Article  Google Scholar 

  11. Li P, Li Z, Halang WA, Chen GR (2006) Analysis of a Multiple Output Pseudo-random-bit Generator based on a Spatiotemporal Chaotic System. Int J Bifurca-tion and Chaos, 16 (10)

    Google Scholar 

  12. Li P, Li Z, Halang WA, Chen GR (2006) A Stream Cipher based on a Spatiotem-poral Chaotic System. Chaos, Solitons and Fractals. To appear

    Google Scholar 

  13. Li SJ (2003) Analysis and New Designs of Digital Chaotic Ciphers. PhD thesis, School of Electronics and Information Engineering, Xi’an Jiaotong University. http://www.hooklee.com/pub.html

  14. Li SJ, Mou XQ, Cai YL (2001) Pseudo-random Bit Generator based on Coupled Chaotic Systems and its Application in Stream-ciphers Cryptography. LNCS 2247: 316-329

    MathSciNet  Google Scholar 

  15. Li SJ, Mou XQ, Cai YL, Ji Z, Zhang JH (2003) On the Security of a Chaotic Encryp-tion Scheme: Problems with Computerized Chaos in Finite Computing Precision. Computer Physics Communications 153 (1): 52-58

    Article  MathSciNet  Google Scholar 

  16. Lu HP, Wang SH, Li XW, Tang GN, Kuang JY, Ye WP, Hu G (2004) A New Spa-tiotemporally Chaotic Cryptosystem and its Security and Performance Analyses. Chaos 14 (3): 617-629

    Article  MathSciNet  Google Scholar 

  17. Luekepohl H (1998) Handbook of Matrices. John Wiley and Sons

    Google Scholar 

  18. Masuda N, Aihara K (2002) Cryptosystems with Discretized Chaotic Maps. IEEE Trans Circuits and Systems-I 49 (1): 28-40

    Article  MathSciNet  Google Scholar 

  19. National Institute of Standards and Technology (2001) Security Require- ments for Cryptographic Modules. FIPS PUB 140-2. http://csrc.nist.gov/publications/fips/fips140- 2/fips1402.pdf

  20. Protopopescu VA, Santoro RT, JS Tollover (1995) Fast and Secure Encryp-tion/Decryption Method based on Chaotic Dynamics. US Patent No 5479513

    Google Scholar 

  21. Sang T, Wang R, Yan Y (1998) Perturbance-based Algorithm to Expand Cycle Length of Chaotic Key Stream. Electronics Letters 34: 873-874

    Article  Google Scholar 

  22. Short KM (1997) Signal Extraction from Chaotic Communication. Int J Bifurca-tion and Chaos 7 (7): 1579-1597

    Article  MATH  Google Scholar 

  23. Tang G, Wang S, Lu¨ H, Hu G (2003) Chaos-based Cryptograph Incorporated with S-box Algebraic Operation. Phys Lett A 318: 388-398

    Article  MATH  MathSciNet  Google Scholar 

  24. Wang SH, Liu WR, Lu HP, Kuang JY, Hu G (2004) Periodicity of Chaotic Trajec-tories in Realizations of Finite Computer Precisions and its Implication in Chaos Communications. Int J of Modern Physics B 18 (17-19): 2617-2622

    Article  Google Scholar 

  25. Wheeler DD (1989) Problems with Chaotic Cryptosystems. Cryptologia XIII (3): 243-250

    Article  Google Scholar 

  26. Yang T (2004) A Survey of Chaotic Secure Communication Systems. Int J of Com-putational Cognition 2 (2): 81-130

    Google Scholar 

  27. Yang T, Yang LB, Yang CM (1998) Cryptanalyzing Chaotic Secure Communica-tions Using Return Maps. Phys Lett A 245: pp 495-510

    Article  Google Scholar 

  28. Zhang H, Wang H, Chen W (2002) Oversampled Chaotic Binary Sequences with Good Security. J Circuits, Systems and Computers 11: 173-185

    Google Scholar 

  29. Zhou H, Ling XT (1997) Problems with the Chaotic Inverse System Encryption Approach. IEEE Trans Circuits and Systems-I 44 (3): 268-271.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Li, P., Li, Z., Halang, W.A., Chen, G. (2007). Securing Communication by Chaos-based Encryption. In: Krämer, B.J., Halang, W.A. (eds) Contributions to Ubiquitous Computing. Studies in Computational Intelligence, vol 42. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-44910-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-44910-2_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44909-6

  • Online ISBN: 978-3-540-44910-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics