A generalized synchronization theorem for discrete-time chaos system with application in data encryption scheme

Author(s):  
Hongyan Zang ◽  
Lequan Min ◽  
Geng Zhao
2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Mei Zhang ◽  
Danling Wang ◽  
Lequan Min ◽  
Xue Wang

Firstly, this study introduces a definition of generalized stability (GST) in discrete-time nonautonomous chaos system (DNCS), which is an extension for chaos generalized synchronization. Secondly, a constructive theorem of DNCS has been proposed. As an example, a GST DNCS is constructed based on a novel 4-dimensional discrete chaotic map. Numerical simulations show that the dynamic behaviors of this map have chaotic attractor characteristics. As one application, we design a chaotic pseudorandom number generator (CPRNG) based on the GST DNCS. We use the SP800-22 test suite to test the randomness of four 100-key streams consisting of 1,000,000 bits generated by the CPRNG, the RC4 algorithm, the ZUC algorithm, and a 6-dimensional CGS-based CPRNG, respectively. The numerical results show that the randomness performances of the two CPRNGs are promising. In addition, theoretically the key space of the CPRNG is larger than 21116. As another application, this study designs a stream avalanche encryption scheme (SAES) in RGB image encryption. The results show that the GST DNCS is able to generate the avalanche effects which are similar to those generated via ideal CPRNGs.


2017 ◽  
Vol 6 (3) ◽  
pp. 219-227
Author(s):  
Edwin R. Arboleda ◽  
Joel L. Balaba ◽  
John Carlo L. Espineli

Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.


Author(s):  
D.B. Ojha ◽  
Ramveer Singh ◽  
Ajay Sharma ◽  
Awakash Mishra ◽  
Swati garg

Author(s):  
Min Yoon ◽  
Miyoung Jang ◽  
Young-Sung Shin ◽  
Jae-Woo Chang

2019 ◽  
Vol 13 (3) ◽  
pp. 60-73
Author(s):  
Vinay Pathak

In this article, the authors propose a system to gather patient information continuously, perform proper non-intrusive checking, and propose restorative or potentially way of life engagements, at whatever point required and proper. The structure, which depends on administration arranged service as application(SOAs) and the Cloud, permits a consistent combination of various innovations, applications, also, administrations. It additionally integrates mobile advances to easily gather, convey imperative information from a patient's wearable biosensors while considering a cell phones' restricted abilities and control seepage, notwithstanding discontinuous system detachments. At that point, information is put away in the Cloud and made accessible by means of SOA to permit access by doctors, paramedics, or other approved authorities. A contextual investigation has been created to assess the convenience of the structure, and the preparatory outcomes that have been broken down are demonstrating exceptionally encouraging outcomes. To secure the data transmission, they have applied identity-based data encryption scheme. It enhances the security in the authors' framework.


Sign in / Sign up

Export Citation Format

Share Document