Chaos in cryptography
Download
1 / 8

- PowerPoint PPT Presentation


  • 451 Views
  • Uploaded on

Chaos in Cryptography. What is Chaos in Cryptography Chaos Functions Application in Cryptography Why it isn’t used. What does it mean?. Use Chaos Functions Pseudo Random Generation One-Time Pad. Chaos Functions. Sensitive to Initial Value Sequence Based on Seed

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about '' - jacob


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Chaos in cryptography l.jpg

Chaos in Cryptography

  • What is Chaos in Cryptography

  • Chaos Functions

  • Application in Cryptography

  • Why it isn’t used


What does it mean l.jpg
What does it mean?

  • Use Chaos Functions

  • Pseudo Random Generation

  • One-Time Pad


Chaos functions l.jpg
Chaos Functions

  • Sensitive to Initial Value

  • Sequence Based on Seed

  • Non-Computable Generation


Slide4 l.jpg

Bifurcation Diagram

Diagram shows accuracy based on initial seed.


Application in cryptography l.jpg

Application in Cryptography

  • Seed Unique to Key

  • Generate One-Time Pad

  • Symmetric Key System


64 bit example l.jpg

64 Bit Example

  • Generate Key

  • Convert to Seed

  • Iterate

  • XOR with Data

  • Symmetrical Operation


Why it isn t used l.jpg

Why it isn’t used

  • Security Cannot Be Proven

  • Attractors

  • Computationally Expensive


References l.jpg

References

Dr. Ranjan Bose and Amitabha Banerjee. “Implementing Symmetric Cryptography Using Chaos Functions”

Wikipedia http://en.wikipedia.org/wiki/Logistic_map

M. S. Baptista, “Cryptography with Chaos” Physics Letters A , Vol. 240, Pages 50–54, 1998

Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou, and Yuanlong Cai. “Baptista-type chaotic cryptosystems:

Problems and countermeasures”


ad