Enhanced Cryptography by Multiple Chaotic Dynamics

A potential security vulnerability of embedding compression in a chaos-based cryptography is studied. Furthermore, a scheme for improving its security is proposed. This correspondence considers the use of multiple chaotic dynamics and drive chaotic trajectory by both plaintext sequence and initial v...

Full description

Bibliographic Details
Main Authors: Jianyong Chen, Junwei Zhou, Kwok-Wo Wong, Zhen Ji
Format: Article
Language:English
Published: Hindawi Limited 2011-01-01
Series:Mathematical Problems in Engineering
Online Access:http://dx.doi.org/10.1155/2011/938454
id doaj-6d38ac6c9aeb4392926d3649b828acf3
record_format Article
spelling doaj-6d38ac6c9aeb4392926d3649b828acf32020-11-24T20:42:03ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472011-01-01201110.1155/2011/938454938454Enhanced Cryptography by Multiple Chaotic DynamicsJianyong Chen0Junwei Zhou1Kwok-Wo Wong2Zhen Ji3Shenzhen City Key Laboratory of Embedded System Design, College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, ChinaShenzhen City Key Laboratory of Embedded System Design, College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, ChinaDepartment of Electronic Engineering, City University of Hong Kong, Hong KongShenzhen City Key Laboratory of Embedded System Design, College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, ChinaA potential security vulnerability of embedding compression in a chaos-based cryptography is studied. Furthermore, a scheme for improving its security is proposed. This correspondence considers the use of multiple chaotic dynamics and drive chaotic trajectory by both plaintext sequence and initial values of a chaotic map. Chaotic trajectory is used for encryption that is never reused for different plaintext. This makes that scheme naturally resist chosen plaintext attack and cipher text-only attack. Its strong security is justified by the key space, key sensitivity, and tests of random number sequences. The results show that the security of the proposed scheme is stronger than the latest algorithm especially in resisting chosen plaintext attack, while its performance is not sacrificed.http://dx.doi.org/10.1155/2011/938454
collection DOAJ
language English
format Article
sources DOAJ
author Jianyong Chen
Junwei Zhou
Kwok-Wo Wong
Zhen Ji
spellingShingle Jianyong Chen
Junwei Zhou
Kwok-Wo Wong
Zhen Ji
Enhanced Cryptography by Multiple Chaotic Dynamics
Mathematical Problems in Engineering
author_facet Jianyong Chen
Junwei Zhou
Kwok-Wo Wong
Zhen Ji
author_sort Jianyong Chen
title Enhanced Cryptography by Multiple Chaotic Dynamics
title_short Enhanced Cryptography by Multiple Chaotic Dynamics
title_full Enhanced Cryptography by Multiple Chaotic Dynamics
title_fullStr Enhanced Cryptography by Multiple Chaotic Dynamics
title_full_unstemmed Enhanced Cryptography by Multiple Chaotic Dynamics
title_sort enhanced cryptography by multiple chaotic dynamics
publisher Hindawi Limited
series Mathematical Problems in Engineering
issn 1024-123X
1563-5147
publishDate 2011-01-01
description A potential security vulnerability of embedding compression in a chaos-based cryptography is studied. Furthermore, a scheme for improving its security is proposed. This correspondence considers the use of multiple chaotic dynamics and drive chaotic trajectory by both plaintext sequence and initial values of a chaotic map. Chaotic trajectory is used for encryption that is never reused for different plaintext. This makes that scheme naturally resist chosen plaintext attack and cipher text-only attack. Its strong security is justified by the key space, key sensitivity, and tests of random number sequences. The results show that the security of the proposed scheme is stronger than the latest algorithm especially in resisting chosen plaintext attack, while its performance is not sacrificed.
url http://dx.doi.org/10.1155/2011/938454
work_keys_str_mv AT jianyongchen enhancedcryptographybymultiplechaoticdynamics
AT junweizhou enhancedcryptographybymultiplechaoticdynamics
AT kwokwowong enhancedcryptographybymultiplechaoticdynamics
AT zhenji enhancedcryptographybymultiplechaoticdynamics
_version_ 1716823383455301632