Enhanced Cryptography by Multiple Chaotic Dynamics
A potential security vulnerability of embedding compression in a chaos-based cryptography is studied. Furthermore, a scheme for improving its security is proposed. This correspondence considers the use of multiple chaotic dynamics and drive chaotic trajectory by both plaintext sequence and initial v...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2011-01-01
|
Series: | Mathematical Problems in Engineering |
Online Access: | http://dx.doi.org/10.1155/2011/938454 |
id |
doaj-6d38ac6c9aeb4392926d3649b828acf3 |
---|---|
record_format |
Article |
spelling |
doaj-6d38ac6c9aeb4392926d3649b828acf32020-11-24T20:42:03ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472011-01-01201110.1155/2011/938454938454Enhanced Cryptography by Multiple Chaotic DynamicsJianyong Chen0Junwei Zhou1Kwok-Wo Wong2Zhen Ji3Shenzhen City Key Laboratory of Embedded System Design, College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, ChinaShenzhen City Key Laboratory of Embedded System Design, College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, ChinaDepartment of Electronic Engineering, City University of Hong Kong, Hong KongShenzhen City Key Laboratory of Embedded System Design, College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, ChinaA potential security vulnerability of embedding compression in a chaos-based cryptography is studied. Furthermore, a scheme for improving its security is proposed. This correspondence considers the use of multiple chaotic dynamics and drive chaotic trajectory by both plaintext sequence and initial values of a chaotic map. Chaotic trajectory is used for encryption that is never reused for different plaintext. This makes that scheme naturally resist chosen plaintext attack and cipher text-only attack. Its strong security is justified by the key space, key sensitivity, and tests of random number sequences. The results show that the security of the proposed scheme is stronger than the latest algorithm especially in resisting chosen plaintext attack, while its performance is not sacrificed.http://dx.doi.org/10.1155/2011/938454 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jianyong Chen Junwei Zhou Kwok-Wo Wong Zhen Ji |
spellingShingle |
Jianyong Chen Junwei Zhou Kwok-Wo Wong Zhen Ji Enhanced Cryptography by Multiple Chaotic Dynamics Mathematical Problems in Engineering |
author_facet |
Jianyong Chen Junwei Zhou Kwok-Wo Wong Zhen Ji |
author_sort |
Jianyong Chen |
title |
Enhanced Cryptography by Multiple Chaotic Dynamics |
title_short |
Enhanced Cryptography by Multiple Chaotic Dynamics |
title_full |
Enhanced Cryptography by Multiple Chaotic Dynamics |
title_fullStr |
Enhanced Cryptography by Multiple Chaotic Dynamics |
title_full_unstemmed |
Enhanced Cryptography by Multiple Chaotic Dynamics |
title_sort |
enhanced cryptography by multiple chaotic dynamics |
publisher |
Hindawi Limited |
series |
Mathematical Problems in Engineering |
issn |
1024-123X 1563-5147 |
publishDate |
2011-01-01 |
description |
A potential security vulnerability of embedding compression in a chaos-based cryptography is studied. Furthermore, a scheme for improving its security is proposed. This correspondence considers the use of multiple chaotic dynamics and drive chaotic trajectory by both plaintext sequence and initial values of a chaotic map. Chaotic trajectory is used for encryption that is never reused for different plaintext. This makes that scheme naturally resist chosen plaintext attack and cipher text-only attack. Its strong security is justified by the key space, key sensitivity, and tests of random number sequences. The results show that the security of the proposed scheme is stronger than the latest algorithm especially in resisting chosen plaintext attack, while its performance is not sacrificed. |
url |
http://dx.doi.org/10.1155/2011/938454 |
work_keys_str_mv |
AT jianyongchen enhancedcryptographybymultiplechaoticdynamics AT junweizhou enhancedcryptographybymultiplechaoticdynamics AT kwokwowong enhancedcryptographybymultiplechaoticdynamics AT zhenji enhancedcryptographybymultiplechaoticdynamics |
_version_ |
1716823383455301632 |