Publikation: Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers
Dateien
Datum
Autor:innen
Herausgeber:innen
ISSN der Zeitschrift
Electronic ISSN
ISBN
Bibliografische Daten
Verlag
Schriftenreihe
Auflagebezeichnung
DOI (zitierfähiger Link)
Internationale Patentnummer
Angaben zur Forschungsförderung
Projekt
Open Access-Veröffentlichung
Core Facility der Universität Konstanz
Titel in einer weiteren Sprache
Publikationstyp
Publikationsstatus
Erschienen in
Zusammenfassung
The idea of using chaotic transformations in cryptography is explicit in the foundational papers of Shannon on secrecy systems (e.g., [96]). Although the word “chaos” was not minted till the 1970s [71], Shannon clearly refers to this very concept when he proposes the construction of secure ciphers by means of measure-preserving, mixing maps which depend ‘sensitively’ on their parameters. The implementation of Shannon’s intuitions had to wait till the development of Chaos Theory in the 1980s. Indeed, it was around 1990 when the first chaos-based ciphers were proposed (e.g., [78], [46]). Moreover, in 1990 chaos synchronization [91] entered the scene and shortly thereafter, the first applications to secure communications followed [56, 37]. The idea is remarkably simple: mask the message with a chaotic signal and use synchronization at the receiver to filter out the chaotic signal. The realization though had to overcome the desynchronization induced by the message itself. After this initial stage, the number of proposals which exploited the properties of chaotic maps for cryptographical purposes, grew in a spectacular way.
Zusammenfassung in einer weiteren Sprache
Fachgebiet (DDC)
Schlagwörter
Konferenz
Rezension
Zitieren
ISO 690
ALVAREZ, Gonzalo, Jose MARIA AMIGO, David ARROYO, Shujun LI, 2011. Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers. In: KOCAREV, Ljupco, ed., Shiguo LIAN, ed.. Chaos-based cryptography : theory, algorithms and applications. Berlin: Springer, 2011, pp. 257-295. Studies in computational intelligence. 354. ISBN 978-3-642-20541-5. Available under: doi: 10.1007/978-3-642-20542-2_8BibTex
@incollection{Alvarez2011Lesso-51210, year={2011}, doi={10.1007/978-3-642-20542-2_8}, title={Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers}, number={354}, isbn={978-3-642-20541-5}, publisher={Springer}, address={Berlin}, series={Studies in computational intelligence}, booktitle={Chaos-based cryptography : theory, algorithms and applications}, pages={257--295}, editor={Kocarev, Ljupco and Lian, Shiguo}, author={Alvarez, Gonzalo and Maria Amigo, Jose and Arroyo, David and Li, Shujun} }
RDF
<rdf:RDF xmlns:dcterms="http://purl.org/dc/terms/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:void="http://rdfs.org/ns/void#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/51210"> <bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/51210"/> <dc:contributor>Arroyo, David</dc:contributor> <dc:contributor>Maria Amigo, Jose</dc:contributor> <dcterms:abstract xml:lang="eng">The idea of using chaotic transformations in cryptography is explicit in the foundational papers of Shannon on secrecy systems (e.g., [96]). Although the word “chaos” was not minted till the 1970s [71], Shannon clearly refers to this very concept when he proposes the construction of secure ciphers by means of measure-preserving, mixing maps which depend ‘sensitively’ on their parameters. The implementation of Shannon’s intuitions had to wait till the development of Chaos Theory in the 1980s. Indeed, it was around 1990 when the first chaos-based ciphers were proposed (e.g., [78], [46]). Moreover, in 1990 chaos synchronization [91] entered the scene and shortly thereafter, the first applications to secure communications followed [56, 37]. The idea is remarkably simple: mask the message with a chaotic signal and use synchronization at the receiver to filter out the chaotic signal. The realization though had to overcome the desynchronization induced by the message itself. After this initial stage, the number of proposals which exploited the properties of chaotic maps for cryptographical purposes, grew in a spectacular way.</dcterms:abstract> <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/> <dc:creator>Arroyo, David</dc:creator> <dc:contributor>Li, Shujun</dc:contributor> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2020-10-06T07:31:18Z</dcterms:available> <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dc:creator>Alvarez, Gonzalo</dc:creator> <dcterms:issued>2011</dcterms:issued> <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <foaf:homepage rdf:resource="http://localhost:8080/"/> <dc:creator>Maria Amigo, Jose</dc:creator> <dc:language>eng</dc:language> <dc:creator>Li, Shujun</dc:creator> <dcterms:title>Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers</dcterms:title> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2020-10-06T07:31:18Z</dc:date> <dc:contributor>Alvarez, Gonzalo</dc:contributor> </rdf:Description> </rdf:RDF>