TY - CHAP
T1 - Securing communication by chaos-based encryption
AU - Li, Ping
AU - Li, Zhong
AU - Halang, Wolfgang A.
AU - Chen, Guanrong
PY - 2007
Y1 - 2007
N2 - As a prerequisite for data encryption, a special spatiotemporal chaotic system, viz., a coupled map lattice (CML), is employed to design a multiple-output pseudo-random bit generator (PRBG). The CML can exhibit complicated chaotic phenomena both in space and in time, which is highly desirable for the PRBG to be applicable for encryption purposes as it guarantees random behaviour of the generated bit sequences. Cryptographic properties such as probability distribution, auto- and cross-correlation, and FIPS 140-2 tests of the PRBG are numerically investigated to determine certain parameter ranges where the PRBG has good cryptographic properties. Based on this PRBG, a stream cipher is presented. Its security is assessed by analysing diffusion and confusion, using various typical attacks. In addition, the encryption speed of the cipher is evaluated. As an example, an image is encrypted with the cipher. It is shown that the cipher has both low computation expense and high security and efficiency. © Springer-Verlag Berlin Heidelberg 2007.
AB - As a prerequisite for data encryption, a special spatiotemporal chaotic system, viz., a coupled map lattice (CML), is employed to design a multiple-output pseudo-random bit generator (PRBG). The CML can exhibit complicated chaotic phenomena both in space and in time, which is highly desirable for the PRBG to be applicable for encryption purposes as it guarantees random behaviour of the generated bit sequences. Cryptographic properties such as probability distribution, auto- and cross-correlation, and FIPS 140-2 tests of the PRBG are numerically investigated to determine certain parameter ranges where the PRBG has good cryptographic properties. Based on this PRBG, a stream cipher is presented. Its security is assessed by analysing diffusion and confusion, using various typical attacks. In addition, the encryption speed of the cipher is evaluated. As an example, an image is encrypted with the cipher. It is shown that the cipher has both low computation expense and high security and efficiency. © Springer-Verlag Berlin Heidelberg 2007.
KW - Cipher
KW - Coupled map lattice
KW - Cryptographic properties
KW - Cryptography
KW - Pseudo-random bit generator
KW - r-adic map
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=34247260875&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-34247260875&origin=recordpage
U2 - 10.1007/978-3-540-44910-2_14
DO - 10.1007/978-3-540-44910-2_14
M3 - RGC 12 - Chapter in an edited book (Author)
SN - 3540449094
SN - 9783540449096
T3 - Studies in Computational Intelligence
SP - 285
EP - 306
BT - Contributions to Ubiquitous Computing
PB - Springer
ER -