Chaos in Cryptography What is Chaos in Cryptography Chaos Functions

Slides:



Advertisements
Similar presentations
Data Security 1 El_Gamal Cryptography. Data Security2 Introduction El_Gamal is a public-key cryptosystem technique El_Gamal is a public-key cryptosystem.
Advertisements

CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Physics Core Group Material Science Theoretical Nonlinear Physics Dr. Vinod Patidar Mr. G. Sharma Mrs. S. Kumari Dr. S. Dalela Mr. V. Kishore.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
Chaos Theory and Encryption
Chaotic Dynamical Systems Experimental Approach Frank Wang.
1 Chaotic Generator in Digital Secure Communication 張 書 銘 交通大學應用數學系 2008 年 12 月 20 日.
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme Chengqing Li a, Shujun Li b, Dan Zhang a and Guanrong Chen b a Zhejiang University,
CHAOS BASED ENCRYPTION NEIL PARMAR DEPARTMENT OF COMPUTER SCIENCE.
1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV
PRBG Based on Couple Chaotic Systems & its Applications in Stream- Cipher Cryptography Li Shujun, Mou Xuanqin, Cai Yuanlong School of Electronics & Information.
Intro to Life32. 1)Zoom to 10 That will allow you to see the grid and individual cells.
Research on Non-linear Dynamic Systems Employing Color Space Li Shujun, Wang Peng, Mu Xuanqin, Cai Yuanlong Image Processing Center of Xi’an Jiaotong.
Discrete Dynamic Systems. What is a Dynamical System?
 Plain Text : The original message (text, image,video,… etc.  Cipher Key : Encryption works by running the data (represented as numbers) through a special.
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography & Pseudo-Random Coding Li ShujunLi Shujun 1, Li Qi 2, Li.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
Institute of Physics (IOP), Bhubaneswar
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Introduction Applications: Pay-TV, Confidential video conferencing,
Chaos Analysis.
Asymmetric-Key Cryptography
Issues of Random Numbers and Cryptography
Cryptography Dr. X.
MD5 A Hash Algorithm….
ATM using fingerprint
Modern symmetric-key Encryption
Vernam Cipher Group Members: Muhammad Awais Muhammad Hasnain khan
Cryptography.
Simplified IDEA Cryptography and Network Security.
A cryptographically secure pseudorandom number generator for Julia
Digital Signatures Last Updated: Oct 14, 2017.
M3: Encryption r By Andrew Stringer.
Cryptographic Protocols (Secret Splitting)
Handout #21 Nonlinear Systems and Chaos Most important concepts
File service architecture
Achieving Perfect Secrecy
Integer transform and Triangular matrix scheme
CSE 311 Foundations of Computing I
The Seduction of the One-Time Pad
Security in Network Communications
بسم الله الرحمن الرحيم الموضوع:الوضوء صفته وفرائضه وسننه
BY: GOKUL RAMADOSS AND FIONA ZHANG feat. Mr. Olsson and Sunny
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
ICS 454: Principles of Cryptography
Chaos Theory and Encryption
B504/I538: Introduction to Cryptography
Cryptography: Basics (2)
The Application of Elliptic Curves Cryptography in Embedded Systems
STREAM CIPHERS by Jennifer Seberry.
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Secret Sharing CPS Computer Security Nisarg Raval Sep 24, 2014
By: Bahareh Taghizadeh
Section 2: Cryptography
CSE 321 Discrete Structures
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
One Time Signature.
CSC 774 Advanced Network Security
A new chaotic algorithm for image encryption
Cryptography Lecture 3.
Information and Computer Security CPIS 312 Lab 4 & 5
Cryptography Lecture 25.
CRYPTOGRAPHY & NETWORK SECURITY
Crypto for CTFs.
A Light-weight Oblivious Transfer Protocol Based on Channel Noise
Finding the Popular Frequency!
Presentation transcript:

Chaos in Cryptography What is Chaos in Cryptography Chaos Functions Application in Cryptography Why it isn’t used

What does it mean? Use Chaos Functions Pseudo Random Generation One-Time Pad

Chaos Functions Sensitive to Initial Value Sequence Based on Seed Non-Computable Generation

The Logistic Map Xn+1 = R * Xn (1 – Xn) R = 4 Bifurcation Diagram Diagram shows accuracy based on initial seed.

Application in Cryptography Seed Unique to Key Generate One-Time Pad Symmetric Key System

64 Bit Example Generate Key Convert to Seed Iterate XOR with Data Symmetrical Operation

Why it isn’t used Security Cannot Be Proven Attractors Computationally Expensive

References Dr. Ranjan Bose and Amitabha Banerjee. “Implementing Symmetric Cryptography Using Chaos Functions” Wikipedia http://en.wikipedia.org/wiki/Logistic_map M. S. Baptista, “Cryptography with Chaos” Physics Letters A , Vol. 240, Pages 50–54, 1998 Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou, and Yuanlong Cai. “Baptista-type chaotic cryptosystems: Problems and countermeasures”