WO2000007327A1 - Method of evaluating encryption algorithms using chaos analysis - Google Patents

Method of evaluating encryption algorithms using chaos analysis Download PDF

Info

Publication number
WO2000007327A1
WO2000007327A1 PCT/US1999/017095 US9917095W WO0007327A1 WO 2000007327 A1 WO2000007327 A1 WO 2000007327A1 US 9917095 W US9917095 W US 9917095W WO 0007327 A1 WO0007327 A1 WO 0007327A1
Authority
WO
WIPO (PCT)
Prior art keywords
measuring
algorithm
time series
encryption
key
Prior art date
Application number
PCT/US1999/017095
Other languages
French (fr)
Inventor
Jong Uk Choi
Won Ha Lee
Sang Ki Lee
Original Assignee
Jong Uk Choi
Won Ha Lee
Sang Ki Lee
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jong Uk Choi, Won Ha Lee, Sang Ki Lee filed Critical Jong Uk Choi
Priority to AU52377/99A priority Critical patent/AU5237799A/en
Priority to JP2000563031A priority patent/JP2002521740A/en
Publication of WO2000007327A1 publication Critical patent/WO2000007327A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Definitions

  • the present invention relates to a method of analyzing encryption algorithms. More specifically, the present invention relates to a method of analyzing an encryption algorithm using chaos analysis, which can analyzing non- linearity of the algorithm using the Fractal structure analysis technique in the case where a public key or a secret key become exposed to others.
  • Information protection methods may be classified into a primary method of restricting physical access to the information to be protected and a secondary method of encrypting the information to be protected in case when the first method fails.
  • Encryption converts a plain text to a cipher text whose meaning cannot be discerned. Decryption changes the cipher text received to a plain text using various keys used to encrypt the text. Reliable encryption of a plain text to a cipher text requires the secrecy to allow only the authorized personnel to access the information in the computer system, the integrity to allow only the authorized personal to correct the information, and the availability to allow only the authorized personnel to use the information.
  • Encryption techniques may be classified into a conventional key system and a public key system, depending on the existence of a public key.
  • the conventional key system both encryption and decryption use the same key.
  • a representative example is the Data Encryption Standard (DES) announced by the U.S. Department of Commerce in 1977.
  • DES Data Encryption Standard
  • the public key system different keys are used for encryption and decryption. Although its processing speed is slow, the public key system has an advantage of dispensing with the transmission of keys. Examples are the RAS encryption method, the Merkle-Hellmam encryption method, and the limited-body- phase encryption method, etc.
  • RAS encryption method the Merkle-Hellmam encryption method
  • the limited-body- phase encryption method etc.
  • an embodiment of the present invention which provides a method including the steps of: reconstructing a new phase space by mapping the output values of an encrypted message with sequentially generated key values into a time series data set; measuring the Lyapunov coefficients of the data set generated with sequential modification of key values in the new phase; measuring the correlation dimension based on the phase space; and analyzing the stability of the algorithm by generating attractors based on the correlation dimension.
  • Figure 1 is a diagram of an apparatus which evaluates an encryption algorithm using chaos analysis.
  • Figure 2 is a flow chart showing a preferred embodiment for analyzing an encryption algorithm using chaos chart.
  • Figure 1 illustrates a computer 100 having an encryption key generator 110 connected to an evaluator 120.
  • Encryption key generator 110 generates encryption keys using encryption algorithms to encrypt text.
  • Evaluator 120 determines the stability of encryption algorithms.
  • a display device 130 being connected to computer 100 displays outputs from the computer.
  • Encryption key generator 110 When a public or secret key generated by encryption key generator 110 becomes exposed to unauthorized users, a new public or secret key must be generated.
  • Encryption key generator 110 When a public or secret key generated by encryption key generator 110 becomes exposed to unauthorized users, a new public or secret key must be generated.
  • evaluator 120 analyzes a rescaled range (R/S) of the keys to determine the possibility of predicting the new key. Evaluator 120 generates an output displayed on display 130 which displays the stability of the encryption algorithm and will show the possibility of determining whether the new key can be predicted by others.
  • R/S rescaled range
  • the random walk property may be used to gauge the possibility of cracking.
  • Two methods are suggested for identifying the random walk property: a method based on the classical statistics and a method based on the chaos analysis which can prove nonlinearity of the system.
  • the present invention uses chaos analysis to verify an encryption algorithm. If a system has the chaotic property , it is possible to explain and predict the system's nonlinearity because the system is deterministic.
  • a reliable encryption algorithm requires, in addition to the non-linearity element, that others may not be able to predict a new key replacing the old key when the old key was exposed to others.
  • a text encrypted using the algorithm is mapped into a continuous-time series pattern, and its property is analyzed using chaos analysis.
  • the rescaled range (R/S) of the keys for maintaining the security of a randomly selected encryption algorithm is analyzed to determine the possibility of prediction of the key by others.
  • i 1,2,...., (M - 1 )
  • Nk 1,2,...., A
  • Nk 1,2,...., A
  • ⁇ a is the average value of N, that has the length n and includes la.
  • the rescaled range Ria of the other key can be obtained from the difference between the maximum and minimum value of Xk.a within the subperiod la as follows :
  • the rescaled range defined in equation 6 is normalized by the ratio of standard deviation Sia as defined in equation 7, the rescaled range (R/S) is the same as Ria / Sia on each label la.
  • n can be used at the starting and ending points of the time series by repeating the above process up to n - (M - 1 ) / 2. Accordingly, least squared regression is performed on a graph plotted using log(n) as an independent variable and log ( R/Sa ) as a dependent variable, and the Hurst exponent " " can be obtained from the slope of the graph.
  • the Lyapunov exponent is initialized as follows:
  • the correlation dimensions are observed as one of the coefficients of the time series, it has a limitation of having value between 1 and 2.
  • the correlation dimension ( ) is measured, by increasing the diameter of Fractal structure using the following equation:
  • a correlation dimension means a probability that there will be two points within the Fractal diameter between t and t-1.
  • the correlation dimension is derived by measuring the slope of a graph of log ⁇ Cm[R ⁇ ) versus log([i?]) based on the above result .
  • Attractors are reconstructed at step 104.
  • a random time series pattern having n numbers of data with their sampling interval of ⁇ t is expressed as X ⁇ t) , X ⁇ t + ⁇ t) , X ⁇ t + 2 • ⁇ t) , X ⁇ t + 3 • ⁇ t) , .... , X ⁇ t + (n-1) • ⁇ t) .
  • a three-dimensional vector column is obtained, expressed as X(t), X(t + 2 • ⁇ t) , X ⁇ t + 4 • ⁇ t) , X ⁇ t + 1 • ⁇ t) , X(t + 3 • ⁇ t) , ... , X ⁇ t + ( ⁇ -5) • ⁇ t) , X(t + (n-3) • ⁇ t) , X ⁇ t + ⁇ n-1) • ⁇ t) .
  • a three-dimensional attractor may be obtained showing the dynamic property of the system. If the value of n equals or is larger than the original dimension and is properly selected, the vector column will show the same dynamic property as the original movement.
  • the strange attractor reconstructed by the same method described above in general, has a transformed shape, not precisely the same shape as the original attractor. However, since the Lyapunov exponent and the Fractal dimension are not altered by such a transformation, these values can be calculated from the reconstructed attractor.
  • the present invention provides reliability and safeness in developing an encryption algorithm by providing a method for determining the safeness of the algorithm where a new key replaces the old when a public key or secret key becomes exposed to others.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Complex Calculations (AREA)

Abstract

A method of evaluating an encryption algorithm using fractal structure analysis techniques to analyze linearity or nonlinearity of the algorithm. It includes the steps of reconstructing a new phase space by mapping the output values of an encrypted message with sequentially generated key values into a time series data set, measuring the Lypunov coefficients of the time series associated with the phase space (S102), measuring the correlation dimension based on the phase space (S103), and determining the stability of the algorithm after generating attractors based on the correlation dimension (S104). The method provides improved reliability in developing encryption algorithms since it can provide a measure of the safeness of a particular encryption algorithm against possible tampering by analysing whether the algorithm is safe in the case where a new key replaces the old key, when a public or secret key becomes exposed to others.

Description

Method of Evaluating Encryption Algorithms Using Chaos
Analysis
Field of Invention
The present invention relates to a method of analyzing encryption algorithms. More specifically, the present invention relates to a method of analyzing an encryption algorithm using chaos analysis, which can analyzing non- linearity of the algorithm using the Fractal structure analysis technique in the case where a public key or a secret key become exposed to others.
Background of the Invention
With rapid advances in scientific technology and information environments, major business tasks are being performed by computers networked via a ultra-high-speed information communication network. It has become necessary to protect against theft or illegal disclosure of important information that may be scattered over various areas in a network, or information being transmitted or received through a network.
Information protection methods may be classified into a primary method of restricting physical access to the information to be protected and a secondary method of encrypting the information to be protected in case when the first method fails.
Encryption converts a plain text to a cipher text whose meaning cannot be discerned. Decryption changes the cipher text received to a plain text using various keys used to encrypt the text. Reliable encryption of a plain text to a cipher text requires the secrecy to allow only the authorized personnel to access the information in the computer system, the integrity to allow only the authorized personal to correct the information, and the availability to allow only the authorized personnel to use the information.
Encryption techniques may be classified into a conventional key system and a public key system, depending on the existence of a public key. In the conventional key system, both encryption and decryption use the same key. A representative example is the Data Encryption Standard (DES) announced by the U.S. Department of Commerce in 1977. In the public key system, different keys are used for encryption and decryption. Although its processing speed is slow, the public key system has an advantage of dispensing with the transmission of keys. Examples are the RAS encryption method, the Merkle-Hellmam encryption method, and the limited-body- phase encryption method, etc. However, such existing encryption systems suffer the problem of lacking data security because the safeness of encryption algorithms cannot be tested due to mathematical difficulties. Objects of the Invention
Accordingly, it is an object of the present invention to provide reliability in developing an encryption algorithm for encrypting data being transmitted and received, by analyzing linearity or nonlinearity of the encryption algorithm, using the Fractal structure analysis, which tests whether others can predict a new key replacing the old key when a public or a secret key becomes exposed to others.
Summary of the Invention
The above and other objects are satisfied, at least in part, by an embodiment of the present invention, which provides a method including the steps of: reconstructing a new phase space by mapping the output values of an encrypted message with sequentially generated key values into a time series data set; measuring the Lyapunov coefficients of the data set generated with sequential modification of key values in the new phase; measuring the correlation dimension based on the phase space; and analyzing the stability of the algorithm by generating attractors based on the correlation dimension. Brief Description of the Drawing
Figure 1 is a diagram of an apparatus which evaluates an encryption algorithm using chaos analysis.
Figure 2 is a flow chart showing a preferred embodiment for analyzing an encryption algorithm using chaos chart.
Detailed Description of the Drawing
References will now be made in detail to a preferred embodiment of the present invention, illustrated in the drawings .
Figure 1 illustrates a computer 100 having an encryption key generator 110 connected to an evaluator 120. Encryption key generator 110 generates encryption keys using encryption algorithms to encrypt text. Evaluator 120 determines the stability of encryption algorithms. A display device 130 being connected to computer 100 displays outputs from the computer.
When a public or secret key generated by encryption key generator 110 becomes exposed to unauthorized users, a new public or secret key must be generated. Encryption key generator
110 generates a new key to replace the old key using the encryption algorithm. In order to determine the integrity of the new key, evaluator 120 analyzes a rescaled range (R/S) of the keys to determine the possibility of predicting the new key. Evaluator 120 generates an output displayed on display 130 which displays the stability of the encryption algorithm and will show the possibility of determining whether the new key can be predicted by others.
If an encryption algorithm does not possess the random walk property, ie, the algorithm possess the linear property, the keys generated by the algorithm may be predicted. Thus, the random walk property may be used to gauge the possibility of cracking.
Two methods are suggested for identifying the random walk property: a method based on the classical statistics and a method based on the chaos analysis which can prove nonlinearity of the system. The present invention uses chaos analysis to verify an encryption algorithm. If a system has the chaotic property , it is possible to explain and predict the system's nonlinearity because the system is deterministic.
But, a reliable encryption algorithm requires, in addition to the non-linearity element, that others may not be able to predict a new key replacing the old key when the old key was exposed to others. To determine the possibility of predicting the replacement key by others when a secret or a public key becomes exposed to others, a text encrypted using the algorithm is mapped into a continuous-time series pattern, and its property is analyzed using chaos analysis. As shown in Fig. 1, when a public or secret key or a particular encryption algorithm used to encrypt a text becomes exposed to others and the old key is replaced by a new key, the rescaled range (R/S) of the keys for maintaining the security of a randomly selected encryption algorithm is analyzed to determine the possibility of prediction of the key by others.
The rescaled range (R/S) of the corresponding key is defined as follow:
[Equation 1]
(R/S) n = C • nH (where H is the Hurst exponent)
The average value of the rescaled range from the above equation becomes "0" meaning a local variation. Taking logarithms of both sides of the above equation yields the following:
[Equation 2] log { R/S) n = H log(n) + log (C)
Since R/S in the above equation increases as fast as the increment of a square root of R/S, it is obtained through the following steps.
First, in the case of a time series of length M, it is transformed into a log ratio having the length N = M - 1 as follows :
[Equation 3]
N = log (Mu÷u /Mi ) , where i = 1,2,...., (M - 1 ) From the above equation, a subperiod of "A", having length n and satisfying the relation A • n = N is obtained. Then, the label la (a = 1,2,...., A) is attached to each subperiod. After the value of Nk,a ( k = 1,2,...., n) are defined on each elements of label la, the following equation is used to calculate an average value over the length n and the label la :
[Equation 4]
e> = n <=>
where βa is the average value of N, that has the length n and includes la.
In addition, the time series {Xk,a) representing the accumulated departures from the average values over each label la, is defined as follows: [Equation 5]
∑(M.β-e.) Xk = '=' , where £=1,2, •••—• , n
Therefore, from equation 4, the rescaled range Ria of the other key can be obtained from the difference between the maximum and minimum value of Xk.a within the subperiod la as follows :
[Equation 6]
Ria = Max [ Xk.a ) - Min { Xk.a ) , where k = 1 , 2 , . . . . , n . Also, the standard deviation Sia on each side label la is defined as follows: [Equation 7]
Figure imgf000010_0001
Since the rescaled range defined in equation 6 is normalized by the ratio of standard deviation Sia as defined in equation 7, the rescaled range (R/S) is the same as Ria / Sia on each label la.
Since the sequential value "A" of length n can be obtained by equation 3 above, it follows that
[Equation 8]
(RJS)„ - (
Figure imgf000010_0002
\)ln is an integer.
Here, since (M - l ) /n is an integer and the length n increases to a next value, n can be used at the starting and ending points of the time series by repeating the above process up to n - (M - 1 ) / 2. Accordingly, least squared regression is performed on a graph plotted using log(n) as an independent variable and log ( R/Sa ) as a dependent variable, and the Hurst exponent " " can be obtained from the slope of the graph.
After obtaining the Hurst exponent " #" in the rescaled range R/S through the same process as stated above, measurement of Lyapunov exponents is conducted at step 102. The Lyapunov exponent ( ) in i dimension (pι(t)) is measured as follows: [Equation 9]
,1, pit)
(^)
L, = L '—ϋ>0'°V ,l«og,: X°>
Since one must have input data, the embedding dimension, the time lag, the evolution time, the max/min distance, and the mean orbital period to measure the Lyapunov exponents, the embedding dimension is obtained from the correlation integral Cm; the time lag from the relation m *t { delay) = Q {period) ; the mean orbital period from the analysis of the reconstruction range; the max/min distance from the embedding dimension.
Once the input data, the embedding dimension, the time lag, the evolution time, the max/min distance, and the mean orbital period are determined, the distance between two points [ DI) - Lι {Xo) , separated at least by the mean orbital period, is measured, and the interval for measuring the Lyapunov exponent, ( DF) - Lι (Xo) , is determined. Then the Lyapunov exponent is initialized as follows:
[Equation 10]
-jMogsC -)
SUM= t j= (x) + SUM zLyap = [ SUM / Itera tion ] In the above, if the measurement distance of Lyapunov exponent DF > DistJMax and DF < Dis t_min , a new point, " DN" is selected. In this case, the time interval of the newly selected point must be at least one period. The new point must be between the min and the max distances, and the angle between DN and DF must be minimum in the phase space. If a new point is selected, DI is set to DN, and the steps of initializing the Lyapunov coefficient are repeated.
Once the measurement of Lyapunov exponents is completed using the steps above, measurement of a correlation dimension is performed at step 103. Although the correlation dimensions are observed as one of the coefficients of the time series, it has a limitation of having value between 1 and 2. However, in the case of reconstructing a time series in a phase space, since it is possible to observe all independent coefficients, the correlation dimension ( ) , starting from m=2, is measured, by increasing the diameter of Fractal structure using the following equation:
[Equation 11]
N" 1
Cm(R) = where Z { x) = 1 if R - I xi - J I > 0; otherwise N is the observation constant, R is the distance, and Cm is the correlation dimension integral function m.
Z { x) is called a Heaviside function. A correlation dimension means a probability that there will be two points within the Fractal diameter between t and t-1. The correlation dimension is derived by measuring the slope of a graph of log {Cm[R}) versus log([i?]) based on the above result .
Once the correlation dimension is derived, attractors are reconstructed at step 104. For example, a random time series pattern having n numbers of data with their sampling interval of δt is expressed as X{t) , X{t + δt) , X{t + 2 • δt) , X{t + 3 • δt) , .... , X{t + (n-1) • δt) . After setting the time lag (T) to twice the sampling time <5t(T = 2 δt) , a three-dimensional vector column is obtained, expressed as X(t), X(t + 2 • δt) , X{t + 4 • δt) , X{t + 1 • δt) , X(t + 3 • δt) , ... , X{t + (π-5) • δt) , X(t + (n-3) • δt) , X{t + {n-1) • δt) .
By plotting these points in the three-dimensional space, a three-dimensional attractor may be obtained showing the dynamic property of the system. If the value of n equals or is larger than the original dimension and is properly selected, the vector column will show the same dynamic property as the original movement.
The strange attractor reconstructed by the same method described above, in general, has a transformed shape, not precisely the same shape as the original attractor. However, since the Lyapunov exponent and the Fractal dimension are not altered by such a transformation, these values can be calculated from the reconstructed attractor.
As explained above, the present invention provides reliability and safeness in developing an encryption algorithm by providing a method for determining the safeness of the algorithm where a new key replaces the old when a public key or secret key becomes exposed to others.

Claims

What is claimed is :
1. A method for evaluating an encryption algorithm using chaos analysis, comprising the steps of: obtaining Hurst exponent in the analysis of a rescaled range with sequential generation of key values of encryption; measuring Lyapunov coefficients; measuring the correlation dimension based on a time series reconstructed in phase space; and determining stability of the algorithm after constructing attractors based on the correlation dimension.
2. The method of claim 1, wherein the step of analyzing a rescaled range further comprises the steps of: transforming the rescaled range into a log ratio value of length N = M - 1 where M is the length of the time series; calculating a mean value n and la where n is the length of a subperiod and la is a label that attaches to the subperiod; calculating accumulated departure of the time series and its range; calculating standard deviation for each said la and then calculating starting and ending points of the time series; and obtaining the Hurst exponent using least square regression.
3. The method of claim 1, wherein the step of measuring the Lyapunov coefficients further comprises of steps of: measuring at least one orbital period by measuring the distance between selected two separate points, ( DI) - Ll { χa) ; determining measurement distance of the Lyapunov exponent, { DF) - Ll { xι ) , and then initializing the Lyapunov exponent; selecting a new point " DN" if said measurement distance of the Lyapunov exponent DF > Dist_Max and DF < Dist_min ; and setting DI to DN, and repeating the above steps, including initializing of the Lyapunov exponent, if the new point is selected.
4. The method of claim 1, wherein the step of measuring a correlation dimension further comprises the steps of: increasing embedding dimension {m) from m - 2 ; increasing a diameter of Fractal structure; and drawing a graph to measure the correlation dimension.
PCT/US1999/017095 1998-07-29 1999-07-28 Method of evaluating encryption algorithms using chaos analysis WO2000007327A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU52377/99A AU5237799A (en) 1998-07-29 1999-07-28 Method of evaluating encryption algorithms using chaos analysis
JP2000563031A JP2002521740A (en) 1998-07-29 1999-07-28 An encryption algorithm analysis method using chaos analysis

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1998/30462 1998-07-29
KR1019980030462A KR20000009822A (en) 1998-07-29 1998-07-29 Encryption algorithm analysis method using chaos analysis

Publications (1)

Publication Number Publication Date
WO2000007327A1 true WO2000007327A1 (en) 2000-02-10

Family

ID=19545490

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/017095 WO2000007327A1 (en) 1998-07-29 1999-07-28 Method of evaluating encryption algorithms using chaos analysis

Country Status (4)

Country Link
JP (1) JP2002521740A (en)
KR (1) KR20000009822A (en)
AU (1) AU5237799A (en)
WO (1) WO2000007327A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7170997B2 (en) 2000-12-07 2007-01-30 Cryptico A/S Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data
CN110702786A (en) * 2019-09-30 2020-01-17 河海大学 Beam structure damage identification method based on multi-scale singular attractor prediction error
CN111447054A (en) * 2020-05-28 2020-07-24 北京邮电大学 FBMC passive optical network physical layer encryption method and device based on five-dimensional hyperchaos
CN114257402A (en) * 2021-11-12 2022-03-29 中国南方电网有限责任公司 Encryption algorithm determination method and device, computer equipment and storage medium
CN117852093A (en) * 2024-03-08 2024-04-09 湖南天联勘测设计有限公司 Electric power engineering data key information protection method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100371588B1 (en) * 2000-09-27 2003-02-11 정성용 Method for encrypting and decrypting information using chaos signal
KR101592104B1 (en) 2014-06-23 2016-02-18 조아람 System for Linking Internet Service According to Information Usage Pattern of Internet User and Method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5048086A (en) * 1990-07-16 1991-09-10 Hughes Aircraft Company Encryption system based on chaos theory
US5680462A (en) * 1995-08-07 1997-10-21 Sandia Corporation Information encoder/decoder using chaotic systems
US5696828A (en) * 1995-09-22 1997-12-09 United Technologies Automotive, Inc. Random number generating system and process based on chaos
US5751811A (en) * 1995-08-30 1998-05-12 Magnotti; Joseph C. 32N +D bit key encryption-decryption system using chaos

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5048086A (en) * 1990-07-16 1991-09-10 Hughes Aircraft Company Encryption system based on chaos theory
US5680462A (en) * 1995-08-07 1997-10-21 Sandia Corporation Information encoder/decoder using chaotic systems
US5751811A (en) * 1995-08-30 1998-05-12 Magnotti; Joseph C. 32N +D bit key encryption-decryption system using chaos
US5696828A (en) * 1995-09-22 1997-12-09 United Technologies Automotive, Inc. Random number generating system and process based on chaos

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
DACHSELT F, KELBER K, SCHWARZ W: "CHAOTIC CODING AND CRYPTOAN ALYSIS", ISCAS '97. PROCEEDINGS OF THE 1997 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS. CIRCUITS AND SYSTEMS IN THE INFORMATION AGE. HONG KONG, JUNE 9 - 12, 1997., NEW-YORK, NY : IEEE., US, vol. 02, 1 June 1997 (1997-06-01), US, pages 1061 - 1064, XP002925066, ISBN: 978-0-7803-3584-4, DOI: 10.1109/ISCAS.1997.621926 *
DING ET AL: "Enhancing synchronism of Chaotic Systems", PHYSICAL REVIEW E, vol. 49, no. 2, February 1994 (1994-02-01), pages R945 - R948, XP002925072 *
EDWARD OTT ET AL: "Controlling Chaos", PHYSICAL REVIEW LETTERS, vol. 64, no. 11, 12 March 1990 (1990-03-12), pages 1196 - 1199, XP002925071 *
HAYES ET AL: "Experimental Control of Chaos for Communications", PHYSICAL REVIEW LETTERS, vol. 73, no. 13, 26 September 1994 (1994-09-26), pages 1781 - 1784, XP002925070 *
KOCAREV L, ET AL.: "FROM CHAOTIC MAPS TO ENCRYPTION SCHEMES", ISCAS '98. PROCEEDINGS OF THE 1998 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS. MONTEREY, CA, MAY 31 - JUNE 3, 1998., NEW YORK, NY : IEEE., US, vol. 04, 1 May 1998 (1998-05-01), US, pages IV - 514, XP002925068, ISBN: 978-0-7803-4456-3, DOI: 10.1109/ISCAS.1998.698968 *
OGORZATEK M J, DEDIEU H: "SOME TOOLS FOR ATTACHKING SECURE COMMUNICATION SYSTEMS EMPLOYING CHAOTIC CARRIERS", ISCAS '98. PROCEEDINGS OF THE 1998 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS. MONTEREY, CA, MAY 31 - JUNE 3, 1998., NEW YORK, NY : IEEE., US, vol. 04, 1 May 1998 (1998-05-01), US, pages IV - 522, XP002925067, ISBN: 978-0-7803-4456-3, DOI: 10.1109/ISCAS.1998.698970 *
YANG TAO ET AL: "Cryptography Based on Chaotic Systems", IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: FUNDAMENTAL THEORY AND APPLICATIONS, vol. 44, no. 5, May 1997 (1997-05-01), pages 469 - 472, XP002925069 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7170997B2 (en) 2000-12-07 2007-01-30 Cryptico A/S Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data
CN110702786A (en) * 2019-09-30 2020-01-17 河海大学 Beam structure damage identification method based on multi-scale singular attractor prediction error
CN110702786B (en) * 2019-09-30 2022-06-17 河海大学 Beam structure damage identification method based on multi-scale singular attractor prediction error
CN111447054A (en) * 2020-05-28 2020-07-24 北京邮电大学 FBMC passive optical network physical layer encryption method and device based on five-dimensional hyperchaos
CN114257402A (en) * 2021-11-12 2022-03-29 中国南方电网有限责任公司 Encryption algorithm determination method and device, computer equipment and storage medium
CN114257402B (en) * 2021-11-12 2024-04-09 中国南方电网有限责任公司 Encryption algorithm determining method, device, computer equipment and storage medium
CN117852093A (en) * 2024-03-08 2024-04-09 湖南天联勘测设计有限公司 Electric power engineering data key information protection method
CN117852093B (en) * 2024-03-08 2024-05-14 湖南天联勘测设计有限公司 Electric power engineering data key information protection method

Also Published As

Publication number Publication date
KR20000009822A (en) 2000-02-15
JP2002521740A (en) 2002-07-16
AU5237799A (en) 2000-02-21

Similar Documents

Publication Publication Date Title
Provos et al. Hide and seek: An introduction to steganography
Usama et al. Chaos-based secure satellite imagery cryptosystem
Dridi et al. Cryptography of medical images based on a combination between chaotic and neural network
US20030182246A1 (en) Applications of fractal and/or chaotic techniques
Ayoup et al. Efficient selective image encryption
Buriachok et al. Invasion detection model using two-stage criterion of detection of network anomalies
CN112148801A (en) Method and device for predicting business object by combining multiple parties for protecting data privacy
US20030158876A1 (en) On-line randomness test through overlapping word counts
Karawia Image encryption based on Fisher‐Yates shuffling and three dimensional chaotic economic map
González et al. Chaotic and stochastic functions
Zhu et al. A novel iris and chaos-based random number generator
Mahdi et al. Digital chaotic scrambling of voice based on duffing map
WO2000007327A1 (en) Method of evaluating encryption algorithms using chaos analysis
Stanley et al. Extended logistic map for encryption of digital images
Bian et al. Research on computer 3D image encryption processing based on the nonlinear algorithm
JarJar Two Feistel rounds in image cryptography acting at the nucleotide level exploiting dna and rna property
CN116522386A (en) Electronic commerce data protection method and server applying artificial intelligence
Kharin et al. Statistical estimation of parameters for binary Markov chain models with embeddings
Abanda et al. Image encryption with fusion of two maps
Li et al. A multidimensional discrete digital chaotic encryption system
Kalashnykova et al. Sums of key functions generating cryptosystems
VLAD Investigation of chaotic behavior in Euro--Leu exchange rate.
CN110995749A (en) Block chain encryption method and device, electronic equipment and storage medium
Mehta et al. Combinational domain-based encryption using FrWT and hyper-chaotic system for biometric data security
CN111310198B (en) Heterogeneous data privacy protection and reliability judgment method in mobile group perception

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

ENP Entry into the national phase

Ref country code: JP

Ref document number: 2000 563031

Kind code of ref document: A

Format of ref document f/p: F

122 Ep: pct application non-entry in european phase