Chaos: making a new science
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Secure communication using a chaos based signal encryption scheme
IEEE Transactions on Consumer Electronics
Keyed hash function based on a chaotic map
Information Sciences: an International Journal
Hi-index | 0.00 |
Chaos functions are mainly used to develop mathematical models of non-linear systems. They have attracted the attention of many mathematicians owing to their extremely sensitive nature to initial conditions and their immense applicability to problems in daily life. In this paper, two widely used chaos functions the Logistic equation and the Lorenz equation are taken and analyzed. We found that these equations exhibit characteristics, which satisfy the expected properties of Message Authentication Code (MAC). We also provide a novel approach of generating MAC with higher security but with smaller key size. This is achieved by the design of the algorithm using variable Initialization Vectors (IV) instead of the constant IVs. Variable IV adds strength to the security of the message. The experimental results show that it satisfies the expected characteristics of a Message Authentication Code generation algorithm.