Handbook of Applied Cryptography
Handbook of Applied Cryptography
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
One-way hash function construction based on 2D coupled map lattices
Information Sciences: an International Journal
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
Information Sciences: an International Journal
A secret key cryptosystem by iterating a chaotic map
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Cryptanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT'91
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Secure group key agreement protocol based on chaotic Hash
Information Sciences: an International Journal
Algebraic break of image ciphers based on discretized chaotic map lattices
Information Sciences: an International Journal
A chaos-based symmetric image encryption scheme using a bit-level permutation
Information Sciences: an International Journal
Chaotic keystream generator using coupled NDFs with parameter perturbing
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Statistics of chaotic binary sequences
IEEE Transactions on Information Theory
Breaking an orbit-based symmetric cryptosystem
Mathematical and Computer Modelling: An International Journal
Hi-index | 0.07 |
Chaotic cryptography has been widely investigated in the past few years. However, the undesirable dynamical properties of the underlying chaotic systems degrade the security of chaotic ciphers and thereby discourage their applications. To address this issue, this paper first presents discrimination criteria for secure chaotic systems (SCSs) whose dynamical properties make them useful for the construction of secure ciphers and then discusses a class of chaotic systems, digital dynamical filters (DDFs), that meet the SCS criteria. Then, a DDF-based pseudorandom bit generator (DDF-PRBG) for constructing stream ciphers is proposed. Theoretical analysis and simulation results demonstrate that both the DDF and the DDF-PRBG, which satisfy the SCS criteria, have desirable cryptographic properties. Consequently, the SCS criteria and the DDF reference model can be used to overcome the problems caused by the dynamical properties of the underlying chaotic systems and increase the security of chaotic ciphers.