Cryptographic pseudo-random sequences from the chaotic Hénon map

@article{Suneel2006CryptographicPS,
  title={Cryptographic pseudo-random sequences from the chaotic H{\'e}non map},
  author={Madhekar Suneel},
  journal={Sadhana},
  year={2006},
  volume={34},
  pages={689-701}
}
  • M. Suneel
  • Published 6 April 2006
  • Computer Science, Physics, Mathematics
  • Sadhana
A scheme for pseudo-random binary sequence generation based on the two-dimensional discrete-time Hénon map is proposed. Properties of the proposed sequences pertaining to linear complexity, linear complexity profile, correlation and auto-correlation are investigated. All these properties of the sequences suggest a strong resemblance to random sequences. Results of statistical testing of the sequences are found encouraging. An estimate of the keyspace size is presented. 
Cryptographic pseudo-random sequence from the spatial chaotic map
Abstract A scheme for pseudo-random binary sequence generation based on the spatial chaotic map is proposed. In order to face the challenge of using the proposed PRBS in cryptography, the proposed
Pseudo-Random Bit Generation Based on 2D Chaotic Maps of Logistic Type and Its Applications in Chaotic Cryptography
TLDR
This work considers PRBG based on 2D symmetrical chaotic mappings of logistic type valid for cryptography and the size of the available key space is calculated.
A New Pseudo-random Sequence Generator Based on a Discrete Hyperchaotic System
TLDR
The research results in this paper will provide theoretical basis and experimental basis for the application of chaotic pseudo-random sequences in information security fields such as secure communication.
Marotto's theorem-based chaotic pseudo-random number generator and performance analysis
Based on Marotto's theorem for discrete chaotic systems, this paper introduces a new 2-dimensional non-autonomous discrete chaotic system. A chaotic pseudo-random number generator (CPNG) is designed
Role of Symmetry and Geometry in a chaotic Pseudo-Random Bit Generator
TLDR
It is shown that the novel mechanism called 'symmetry-swap' can increase the degrees of freedom of the key space, while maintaining the speed and performance in the PRBG.
An image encryption approach using chaos and stream cipher
TLDR
Experimental results illustrate that the scheme is highly key sensitive and shows a good resistance against brute-force and statistical attacks.
A bidirectional generalized synchronization theorem-based chaotic pseudorandom number generator
In order to design good pseudorandom number generator, using a bidirectional generalized synchronization theorem for discrete chaos system, this paper introduces a new 5 -dimensional bidirectional
Image Encryption Algorithm Based on a Novel 4D Chaotic System
In this paper, a novel four-dimensional chaotic system has been created, which has characteristics such as high sensitivity to the initial conditions and parameters. It also has two a positive
A novel and efficient approach to encrypt images using chaotic logistic map and stream cipher
  • M. Rani, Sudesh Kumar
  • Computer Science
    2015 International Conference on Green Computing and Internet of Things (ICGCIoT)
  • 2015
This research gives a novel approach for fast encryption of images using chaotic maps and pixel shuffling using modified RC4 stream cipher algorithm. In this, the given image will be first divided
Notions of Chaotic Cryptography: Sketch of a Chaos Based Cryptosystem
Chaotic cryptography describes the use of chaos theory (in particular physical dynamical systems working in chaotic regime as part of communication techniques and computation algorithms) to perform
...
1
2
3
...

References

SHOWING 1-10 OF 47 REFERENCES
On pseudo-random bit generator based on couple chaotic systems
The cryptographic properties of digital pseudo-random bit generator based on couple chaotic systems(CCS-PRBG) was studied and the output keystream of CCS-PRBG being i.i.d.sequence was proved.
Properties making a chaotic system a good pseudo random number generator.
TLDR
The multidimensional Anosov symplectic (cat) map is proposed as a pseudo random number generator and it is shown what chaotic features of this map are useful for generating pseudo random numbers and investigate numerically which of them survive in the discrete state version of the map.
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography
TLDR
A novel pseudo-random bit generator based on a couple of chaotic systems called CCS-PRBG is presented, and detailed theoretical analyses show that it has perfect cryptographic properties, and can be used to construct stream cipher with higher security than other chaotic ciphers.
Chaos-based cryptography: a brief overview
Over the past decade, there has been tremendous interest in studying the behavior of chaotic systems. They are characterized by sensitive dependence on initial conditions, similarity to random
p-adic Chaos and Random Number Generation
TLDR
The propert ies of p-adic analogues of the logistic and Smale horseshoe maps are discussed, and adapted to form possible practical pseudo-random number generators in the case p = 2.
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
Abstract : This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generators may he used in many cryptographic applications, such as
Chaos and cryptography
In this paper, the authors present their opinion and research results collected during the last ten years on the conjunction of chaos and cryptography. Special consideration is taken to show some
Shift Register Sequences
TLDR
The Revised Edition of Shift Register Sequences contains a comprehensive bibliography of some 400 entries which cover the literature concerning the theory and applications of shift register sequences.
Shift-register synthesis and BCH decoding
  • J. Massey
  • Computer Science
    IEEE Trans. Inf. Theory
  • 1969
It is shown in this paper that the iterative algorithm introduced by Berlekamp for decoding BCH codes actually provides a general solution to the problem of synthesizing the shortest linear feedback
An introduction to cryptography
  • R. Mollin
  • Computer Science
    CRC Press series on discrete mathematics and its applications
  • 2001
From the Publisher: An Introduction to Cryptography is intended for the person wanting an introduction to the subject of cryptography, however, it contains enough advanced, optional material to
...
1
2
3
4
5
...