Skip to main content

Study on Chaotic Cipher with Robustness and Its Characteristics

  • Conference paper
  • First Online:
Book cover Methods and Applications for Modeling and Simulation of Complex Systems (AsiaSim 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 946))

Included in the following conference series:

Abstract

In this paper, we propose a robustness cryptosystem with a small amount of computation. By adopting a stream cipher not but block cipher like AES, the processing speed is improved. Furthermore, it has chaotic properties and improved randomness. Moreover, since an expression for synchronizing the encryption system and the decryption system is not used in the proposed method, even when a bit error occurs, it is correctly decrypted. In general, nonlinear signals such as chaotic map, Jacobian can be estimated from time series signals by Sano-Sawada method. In the chaotic cipher, the parameters in the expression are used as cryptography keys. Therefore, if Jacobian is a constant, the cryptographic key will be estimated. In the proposed system, we formulate the expression so that each element of Jacobian becomes time-variant as much as possible. Thereby the safety of the system is secured.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tsuruoka, Y., Nakasone, T., Kamiyama, K., Kamata, H.: The development of the chaotic block cipher. In: Proceeding to JSST 2015, pp. 125–128 (2015)

    Google Scholar 

  2. Abarbanel, H.D.I.: Analysis of Observed Chaotic Data. Springer, New York (1996). https://doi.org/10.1007/978-1-4612-0763-4

    Book  MATH  Google Scholar 

  3. Pecora, L.M., Carroll, T.L.: Synchronization in chaotic systems. Phys. Rev. Lett. 64(8), 821–824 (1990)

    Article  MathSciNet  Google Scholar 

  4. Restituto, M.D., Ahumada, R.L., Vazquez, A.R.: Secure communication using CMOS current-mode sampled-data circuits. In: Proceedings of Nonlinear Dynamics of Electronics System, pp. 237–240 (1995)

    Google Scholar 

  5. Koh, T., Powers, E.J.: Second-order Volterra filtering and its application to nonlinear system identification. IEEE Trans. Acoust. Speech Sig. Process. 33(6), 1445–1455 (1985)

    Article  Google Scholar 

  6. Kawanishi, Y., Yoshida, D., Watanabe, H., Nakayama, A., Sato, T., Kamata, H.: Chaotic modem system using nonlinear map with simultaneous Volterra filter. In: Proceedings of JSST 2011, pp. 456–459 (2011)

    Google Scholar 

  7. Murphy, S.: The power of NIST’s statistical testing of AES candidates. In: The Third AES Candidate Conference (2000)

    Google Scholar 

  8. Sano, M., Sawada, Y.: Measurement of Lyapunov spectrum from a chaotic time series. Phys. Rev. Lett. 55(10), 1082–1085 (1985)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Takashi Arai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arai, T., Kase, Y., Kamata, H. (2018). Study on Chaotic Cipher with Robustness and Its Characteristics. In: Li, L., Hasegawa, K., Tanaka, S. (eds) Methods and Applications for Modeling and Simulation of Complex Systems. AsiaSim 2018. Communications in Computer and Information Science, vol 946. Springer, Singapore. https://doi.org/10.1007/978-981-13-2853-4_32

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2853-4_32

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2852-7

  • Online ISBN: 978-981-13-2853-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics