Skip to main content

Chaos-Based Cryptography

  • Chapter

Part of the book series: Studies in Computational Intelligence ((SCI,volume 184))

Introduction

The story of chaos-based or “chaotic” cryptography is remarkable, for several reasons. To begin with, it appeared outside conventional cryptography, first as an application of chaos theory [56], and a short time later, also as an application of chaos synchronization [58], a property of coupled chaotic oscillators studied in the framework of communication techniques. The first approach exploits the random-like properties of the orbits generated by iterations of a chaotic map [25, 48]. The basic idea of the second approach is very simple: mask the message with a chaotic signal and use synchronization at the receiver to filter out the chaotic signal [15, 34]. For these reasons, chaotic cryptography has been mainly developed by engineers and physicists, generally not aware of the concepts and standards used by cryptographers. As a consequence their proposals, mostly published in journals of physics and engineering, are more often than not lacking of theoretical rigor, beside being cryptographically weak and computationally inefficient. This partially explains that after almost two decades, chaos-based cryptography is still considered a marginal phenomenon, although it embodies better than its competitor the confusion and diffusion principles put forward by Shannon in his foundational work [64].

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Addabbo, T., Alioto, M., Fort, A., Pasini, A., Rocchi, S., Vignoli, V.: IEEE Trans. Circ. Syst. I.  54, 816–828 (2007)

    Google Scholar 

  2. Agrawal, M., Kayal, N., Saxena, N.: Annals Math.  160, 781–793 (2004)

    Google Scholar 

  3. Álvarez, G., Li, S.: Comp. Comm. 27, 1679–1681 (2004)

    Google Scholar 

  4. Álvarez, G., Li, S.: Int. J. Bifurc. Chaos 16, 2129–2151 (2006)

    Google Scholar 

  5. Amigó, J.M., Szczepanski, J.: Int. J. Bifurc. Chaos 13, 1937–1948 (2003)

    Google Scholar 

  6. Amigó, J.M., Szczepanski, J., Kocarev, L.: Phys. Lett. A 343, 55–60 (2005)

    Google Scholar 

  7. Amigó, J.M., Kocarev, L., Szczepanski, J.: Phys. Lett. A 336, 211–216 (2007)

    Google Scholar 

  8. Amigó, J.M., Kocarev, L., Szczepanski, J.: IEEE Trans. Circ. Syst. II 54, 882–886 (2007)

    Google Scholar 

  9. Amigó, J.M., Kocarev, L., Tomovski, I.: Physica D 228, 77–85 (2007)

    Google Scholar 

  10. Amigó, J.M., Kocarev, L., Szczepanski, J.: Phys. Lett. A  372, 6265–6268 (2008)

    Google Scholar 

  11. Baptista, M.S.: Phys. Lett. A 240, 50–54 (1998)

    Google Scholar 

  12. Biham, E.: Cryptanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT’91. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 532–534. Springer, Heidelberg (1991)

    Google Scholar 

  13. Blum, L., Blum, M., Schub, M.: SIAM J. Comput. 15, 364–383 (1986)

    Google Scholar 

  14. Cornfeld, I.P., Fomin, S.V., Sinai, Y.G.: Ergodic Theory. Springer, New York (1982)

    MATH  Google Scholar 

  15. Cuomo, K.M., Oppenheim, A.V., Strogatz, S.H.: IEEE Trans. Circ. Syst. II 40, 626–633 (1993)

    Google Scholar 

  16. Dedieu, H., Kennedy, M.P., Hasler, M.: IEEE Trans. Circ. Syst. II 40, 634–641 (1993)

    Google Scholar 

  17. Diffie, W., Hellman, M.E.: IEEE Trans. Inform. Theory 22, 644–654 (1976)

    Google Scholar 

  18. Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Berlin (2002)

    MATH  Google Scholar 

  19. Erdmann, D., Murphy, S.: Electr. Lett. 28, 893–895 (1992)

    Google Scholar 

  20. Feldmann, U., Hasler, M., Schwarz, W.: Int. J. Circ. Theory Appl. 24, 551–579 (1996)

    Google Scholar 

  21. Forré, R.: EUROCRYPT 1991. LNCS, vol. 547, pp. 76–81. Springer, Heidelberg (1991)

    Google Scholar 

  22. Fridrich, J.: Int. J. Bifurc. Chaos 8, 1259–1284 (1998)

    Google Scholar 

  23. Gonzalez, J.A., Pino, R.: Physica A 276, 425–440 (2000)

    Google Scholar 

  24. González-Miranda, J.M.: Synchronization and control of chaos. Imperial College Press, London (2004)

    Google Scholar 

  25. Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127–140. Springer, Heidelberg (1991)

    Google Scholar 

  26. Hong, Z., Xieting, L.: Int. J. Bifurc Chaos 7, 205–213 (1997)

    Google Scholar 

  27. Impagliazzo, R., Luby, M.: Proc 30th IEEE Symp. Foundations Computer Science, pp. 230–235 (1989)

    Google Scholar 

  28. Inoue, E., Ushio, T.: Electro. Comm. Japan III 84, 21–27 (2001)

    Google Scholar 

  29. Itoh, M., Wu, C.W., Chua, L.O.: Int. J. Bifurc. Chaos 7, 275–286 (1997)

    Google Scholar 

  30. Jakimoski, G., Kocarev, L.: Phys. Lett. A 291, 381–384 (2001)

    Google Scholar 

  31. Jakimoski, G., Kocarev, L.: IEEE Trans. Circ. Syst. I 48, 163–169 (2001)

    Google Scholar 

  32. Jakimoski, G., Subbalakshmi, K.P.: IEEE Trans. Circ. Syst. II 54, 449–501 (2007)

    Google Scholar 

  33. Knuth, D.E.: The Art of Computer Programming, 3rd edn. Addison Wesley Longman, Reading (1998)

    Google Scholar 

  34. Kocarev, L., Halle, K.S., Eckert, K., Chua, L.O., Parlitz, U.: Int. J. Bifurc. Chaos 2, 709–713 (1992)

    Google Scholar 

  35. Kocarev, L.: IEEE Circ. Syst. Mag. 1, 6–21 (2001)

    Google Scholar 

  36. Kocarev, L., Jakimoski, G.: IEEE Trans. Circ. Syst. I 50, 123–126 (2003)

    Google Scholar 

  37. Kocarev, L., Sterjev, M., Fekete, A., Vattay, G.: Chaos 14, 1078–1082 (2004)

    Google Scholar 

  38. Kocarev, L., Szczepanski, J.: Phys. Rev. Lett. 93, 234101 (2004)

    Google Scholar 

  39. Kocarev, L., Makraduli, J., Amato, P.: Circ. Syst. Signal Process 24, 497–517 (2005)

    Google Scholar 

  40. Kocarev, L., Szczepanski, J., Amigó, J.M., Tomovski, I.: IEEE Trans. Circ. Syst. I 53, 1300–1309 (2006)

    Google Scholar 

  41. Kolumban, G., Kennedy, M.P., Chua, L.O.: IEEE Trans. Circ. Syst. I 45, 1129–1140 (1998)

    Google Scholar 

  42. Kotulski, Z., Szczepanski, J.: Ann. Phys. 6, 381–394 (1997)

    Google Scholar 

  43. Kotulski, Z., Szczepanski, J.: Int. J. Birfurc. Chaos 9, 1121–1135 (1999)

    Google Scholar 

  44. Lagarias, J.C.: Statistical Science 8, 31–39 (1993)

    Google Scholar 

  45. Levin, L.A.: Combinatoria 7, 357–363 (1987)

    Google Scholar 

  46. Li, M., Vitányi, P.: An introduction to Kolmogorov complexity and its applications. Springer, New York (1997)

    MATH  Google Scholar 

  47. Luby, M., Rackoff, C.: SIAM J. Comp. 17, 373–386 (1988)

    Google Scholar 

  48. Matthews, R.: Cryptologia XIII, 29–41 (1989)

    Google Scholar 

  49. Masuda, N., Aihara, K.: IEEE Trans. Circ. Syst. I 49, 28–40 (2002)

    Google Scholar 

  50. Masuda, N., Jakimoski, G., Aihara, K., Kocarev, L.: IEEE Trans. Circ. Syst. I 53, 1341–1352 (2006)

    Google Scholar 

  51. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  52. Millerioux, G.: Int. J. Bifurc. Chaos 7, 1635–1649 (1997)

    Google Scholar 

  53. Millerioux, G., Daafouz, J.: Int. J. Bifurc. Chaos 14, 1357–1368 (2004)

    Google Scholar 

  54. Millerioux, G., Amigó, J.M., Daafouz, J.: IEEE Trans. Circ. Syst. I 55, 1695–1703 (2008)

    Google Scholar 

  55. Nijmeijer, H., Mareels, I.M.Y.: IEEE Trans. Circ. Syst. I 44, 882–890 (1997)

    Google Scholar 

  56. Ott, E.: Chaos in Dynamical Systems, 2nd edn. Cambridge University Press, Cambridge (2002)

    MATH  Google Scholar 

  57. Parlitz, U., Chua, L.O., Kocarev, L., Halle, K.S., Shang, A.: Int. J. Bifurc. Chaos 2, 973–977 (1992)

    Google Scholar 

  58. Pecora, L.M., Carroll, T.L.: Phys. Rev. Lett. 64, 821–824 (1990)

    Google Scholar 

  59. Pérez, G., Cerdeira, H.A.: Phys. Rev. Lett. 74, 1970–1973 (1995)

    Google Scholar 

  60. Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of computer security. Springer, New York (2003)

    MATH  Google Scholar 

  61. Rivest, R.L., Shamir, A., Adleman, L.M.: Comm. to the ACM 21, 120–126 (1978)

    Google Scholar 

  62. Rosier, L., Millerioux, G., Bloch, G.: Syst. Control Lett. 55, 223–231 (2006)

    Google Scholar 

  63. Schneier, B.: Applied cryptography. Wiley, New York (1996)

    Google Scholar 

  64. Shannon, C.E.: Bell Syst. Tech. J. 28, 656–715 (1949)

    Google Scholar 

  65. Stojanovski, T., Kocarev, L.: IEEE Trans. Circ. Syst. I 48, 281–288 (2001)

    Google Scholar 

  66. Szczepanski, J., Amigó, J.M., Michalek, T., Kocarev, L.: IEEE Trans. Circ. Syst. I 52, 443–453 (2005)

    Google Scholar 

  67. Talbot, J., Welsh, D.: Complexity and cryptography. Cambridge University Press, Cambridge (2006)

    MATH  Google Scholar 

  68. Wheeler, D. (189) Cryptologia XIII, 243–250

    Google Scholar 

  69. Wu, C.W., Chua, L.O.: Int. J. Bifurc. Chaos 3, 1619–1627 (1993)

    Google Scholar 

  70. Wu, C.W.: Synchronization in coupled chaotic circuits and systems. World Scientific, New Jersey (1993)

    Google Scholar 

  71. Yang, T., Yang, L.B., Yang, C.M.: Phys. Lett. A 245, 495–510 (1998)

    Google Scholar 

  72. Yao, A.C.: Proc 23rd IEEE Symp. on Foundations of Computer Science, pp. 80–91 (1982)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Amigó, J.M. (2009). Chaos-Based Cryptography. In: Kocarev, L., Galias, Z., Lian, S. (eds) Intelligent Computing Based on Chaos. Studies in Computational Intelligence, vol 184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-95972-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-95972-4_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-95971-7

  • Online ISBN: 978-3-540-95972-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics