0% found this document useful (0 votes)
115 views

Chaos - Based Cryptography

The document discusses using chaotic dynamical systems for cryptography by exploring the similarities and differences between cryptographic algorithms and chaotic systems, noting how chaotic systems can produce complex and unpredictable behavior from simple equations. It raises unanswered questions about whether and under what conditions chaotic systems could be considered computationally unpredictable. Potential applications mentioned include using chaotic signals to encrypt information for secure communications.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views

Chaos - Based Cryptography

The document discusses using chaotic dynamical systems for cryptography by exploring the similarities and differences between cryptographic algorithms and chaotic systems, noting how chaotic systems can produce complex and unpredictable behavior from simple equations. It raises unanswered questions about whether and under what conditions chaotic systems could be considered computationally unpredictable. Potential applications mentioned include using chaotic signals to encrypt information for secure communications.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CHAOS-BASED CRYPTOGRAPHY

NOT as a Development Program/Project


but as a University Research Program/Project

1. Chaotic dynamical systems


2. Similarities and differences between
cryptographic algorithms and chaotic systems
3. Unanswerable questions about chaos-based
cryptography
4. Potential applications and research perspectives

1
1. Chaotic dynamical systems
Low-dimensional nonlinear dynamical systems are capable of
complex and unpredictable behavior. In this case, a dynamical
system is called CHAOTIC.
xn+1 = F(xn)
The set of points: {x0, F(x0), F2(x0), … } is called a trajectory (or
orbit) of the initial condition x0 . x
k
x2
x0 x1

x0’=x0+∆x
x1’
x2’
xk’

x0 is a plaintext to be encrypted
xk is a ciphertext

No finite computer program can predict a chaotic trajectory!


2
2. Similarities and differences between
CRYPTOGRAPHIC ALGORITHMS and CHAOTIC SYSTEMS

„ Phase space: finite set of „ Phase space: (sub)set of real


integers numbers
„ Algebraic methods „ Analytic methods
„ Rounds „ Iterations
„ Key (Boolean) - Discrete „ Parameters (real) - Continuous
keyspace keyspace
„ Diffusion „ Sensitivity to a change in
- initial condition/parameters
„ Digital realizations „ Digital realization by non integer
by integer arithmetic arithmetic which approximates
continuous-value systems

„ Security and performance „ ?


A deep relation between chaos and cryptography 3

has not been established yet!


3. Questions about chaos-based cryptography
not answered yet
Chaotic
Pseudo-
signals
random
(Chaotic
ensembles
system)
Probabilistic
unpredictable polynomial-time ?
Turing-machines
Infinite powerful
? unpredictable
machines

Central question of chaos-based cryptography:


Whether and under what conditions a chaotic system is unpredictable
by probabilistic polynomial-time machines?
4
Many questions but yet few answers!
4. CHAOS-BASED SECURE COMMUNICATIONS
The basic properties characterizing a secure object are
“randomness-increasing” and “computationally unpredictable”

Information
signal

Encrypted
signal

Recovered
signal 5

You might also like