Securing communication by chaos-based encryption

Ping Li, Zhong Li, Wolfgang A. Halang, Guanrong Chen

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 12 - Chapter in an edited book (Author)peer-review

Abstract

As a prerequisite for data encryption, a special spatiotemporal chaotic system, viz., a coupled map lattice (CML), is employed to design a multiple-output pseudo-random bit generator (PRBG). The CML can exhibit complicated chaotic phenomena both in space and in time, which is highly desirable for the PRBG to be applicable for encryption purposes as it guarantees random behaviour of the generated bit sequences. Cryptographic properties such as probability distribution, auto- and cross-correlation, and FIPS 140-2 tests of the PRBG are numerically investigated to determine certain parameter ranges where the PRBG has good cryptographic properties. Based on this PRBG, a stream cipher is presented. Its security is assessed by analysing diffusion and confusion, using various typical attacks. In addition, the encryption speed of the cipher is evaluated. As an example, an image is encrypted with the cipher. It is shown that the cipher has both low computation expense and high security and efficiency. © Springer-Verlag Berlin Heidelberg 2007.
Original languageEnglish
Title of host publicationContributions to Ubiquitous Computing
PublisherSpringer 
Pages285-306
ISBN (Print)3540449094, 9783540449096
DOIs
Publication statusPublished - 2007

Publication series

NameStudies in Computational Intelligence
Volume42
ISSN (Print)1860-949X

Research Keywords

  • Cipher
  • Coupled map lattice
  • Cryptographic properties
  • Cryptography
  • Pseudo-random bit generator
  • r-adic map
  • Security

Fingerprint

Dive into the research topics of 'Securing communication by chaos-based encryption'. Together they form a unique fingerprint.

Cite this