TITLE

A chaotic block encryption algorithm

AUTHOR(S)
WEI Feng
PUB. DATE
December 2014
SOURCE
Journal of Zhengzhou University of Light Industry, Natural Scien;Dec2014, Vol. 29 Issue 6, p73
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Aiming at the security problem of chaos theory in cryptography application, a chaotic block encryption algorithm was designed based on the theory of discrete coupled map lattice and asymptotic deterministic randomness. The algorithm used aymptotic deterministic randomness key to diffuse the plaintext, and through the iteration of the discrete coupled map lattice the plaintext was encrypted. Then the validity, sensitivity and resistance of algorithm were tested and analyzed. The results showed that the security of chaotic encryption algorithm was higher.
ACCESSION #
100338459

 

Related Articles

  • Development of a Lattice-based Cryptosystem. Anyanwu, S. I.; Alese, B. K.; Obe, O. O. // International Journal of Computer Applications;Nov2013, Vol. 81, p11 

    This work proposes a lattice-based cryptosystem using embedded technique of the closest vector problem (CVP). It adopts the key-gen algorithms of and improves on vector reduction method for encryption/decryption. With this we achieved great implementation speed and time for an acceptable...

  • New chaotic encryption algorithm based on chaotic sequence and plain text. Xing-Yuan Wang; Sheng-Xian Gu // IET Information Security;2014, Vol. 8 Issue 3, p213 

    A new chaotic encryption algorithm is proposed. Its key is based on chaotic sequence and plain text. First, the chaotic sequence and the plain text are used; the result is the key, so even someone obtains the initial value he cannot decrypt the cipher text. The initial value is destroyed. Then...

  • A New Approach for Chaotic Encrypted Data Hiding in Color Image. Talee, Ghada TH.; Jelmeran, Melad J.; Mohammed, Saja J. // International Journal of Computer Applications;Jan2014, Vol. 86, p23 

    Sending encrypted messages frequently will draw the attention of third parties, i.e. crackers and hackers, perhaps causing attempts and revealing the original messages. In digital world, Steganography is introduced to hide the existence of the communication by concealing encryption message...

  • Chaotic Encryption Technique for Color Images by Coupling Two Chaotic Maps. Asmita; Lade, Shrikant // International Journal of Computer Science & Network Security;Oct2014, Vol. 14 Issue 10, p90 

    With the increasing demand of providing security for images/videos with private information, chaos-based cryptosystems have played an important role in image encryption because of their excellent random properties and encryption performance. However, existing chaos-based systems have the...

  • Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks. Xianfeng Guo; Jiashu Zhang; Khan, Muhammad Khurram; Alghathbar, Khaled // Sensors (14248220);2011, Vol. 11 Issue 2, p1607 

    Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its...

  • An Efficient IBE Scheme using IFP and DDLP. Meshram, Chandrashekhar // International Journal of Information Technology & Computer Scien;May2013, Vol. 5 Issue 6, p65 

    In 1984, Shamir introduced the concept of an identity-based encryption. In this system, each user needs to visit a private key generation (PKG) and identify him- self before joining a communication network. Once a user is accepted, the PKG will provide him with a secret key. In this way, if a...

  • Randomness Analysis of 128 bits Blowfish Block Cipher on ECB and CBC Modes. ALabaichi, Ashwak; Mahmod, Ramlan; Ahmad, Faudziah // International Journal of Digital Content Technology & its Applic;Nov2013, Vol. 7 Issue 15, p77 

    Randomness of output is a significant factor in measuring the security of any cryptographic algorithm. A non-random block cipher is vulnerable to any type of attack. This paper presents the National Institute of Standard and Technology (NIST) statistical tests of the 128-bit BA to investigate...

  • Cryptographic Properties of Bipermutive Cellular Automata Rules. LEPORATI, ALBERTO; MARIOT, LUCA // Journal of Cellular Automata;2014, Vol. 9 Issue 5/6, p437 

    Bipermutive rules are known to induce both expansive and mixing chaotic cellular automata. In this paper, we study some cryptographic properties of bipermutive rules, initially proving that they also satisfy 1-resiliency, which combines balancedness and first order correlation immunity. We thus...

  • A Novel Identity-Based Multi-Signcryption Scheme. Zhang, Jianhong; Yang, Yixian; Niu, Xinxin // International Journal of Distributed Sensor Networks;Jan/Feb2009, Vol. 5 Issue 1, p28 

    Message security and the sender's identity authentication for communication in the open channel is a basic and important technology of the internet. For keeping the message confidential and unforgeable, the sender can use a digital signature algorithm with his private key to sign the message,...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics