Research on General Permutation Encryption Module Based on Chaos Theory

Article Preview

Abstract:

Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

381-387

Citation:

Online since:

October 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Lorenz E N. Deteministic Nonperiodic Flow. J. Atmos. SCI, 1963, 20: 130-141.

Google Scholar

[2] Li T Y, Yorke J A. Period three implies chaos. The American Mathematical Monthly. 1975, 82(10): 985-992.

DOI: 10.1080/00029890.1975.11994008

Google Scholar

[3] Robert A, Matthews J. On the derivation of a chaotic, encryption algorithm Cryptologia, 1989, XIII(1): 29-42.

Google Scholar

[4] Habutsu T, Nishio Y, Sasase I. A secret key cryptosystem by iterating a chaotic map[A]. Advanees in Cryptology-EuroCrypt'91[C]. 1991: 127-140.

DOI: 10.1007/3-540-46416-6_11

Google Scholar

[5] Daniel D. Wheeler. Problems with chaotic cryptosystems. Cryptologia, 1989, 13(3): 243 – 250.

DOI: 10.1080/0161-118991863934

Google Scholar

[6] Wheeler D D, Mathews R A. Supercomputer investigationsof a choatic encryption algorithm. Cryptologia, 1991, 140-152.

Google Scholar

[7] Sang Tao, Wang Ruli, Yan Yixun. Perturbance-based algorithm to expand cycle length of chaotic key stream. Electronics Letters. 1998 34(9): 873-874.

DOI: 10.1049/el:19980680

Google Scholar

[8] Ghobad Heidari-Bateni, ClareD, McGillem A. choatic direct-sequence spread- spectrum communication system. IEEE Trnas. Communications, 1994, 42(2): 1524-1527.

DOI: 10.1109/tcomm.1994.582834

Google Scholar

[9] Ogorzatek M J, Dedieu H. Some tools for attacking secure communications systems employing chaotic carriers[A]. Symposium circuits and systems[c]. IEEE, (1998).

DOI: 10.1109/iscas.1998.698970

Google Scholar

[10] Ercan Solak, Cahit Cokal. Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps. Physics Letters A 372 (2008) 6922–6924.

DOI: 10.1016/j.physleta.2008.10.022

Google Scholar

[11] Alvarez G, Montoya F, Romera M, Pastor G. CryPtanalysis of a chaotic encryption system[J]. Physics letter A, 2000, 30(10): 191-196.

DOI: 10.1016/s0375-9601(00)00642-3

Google Scholar

[12] Z. Dawei,C. Guanrong,L. Wenbo. A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons and Fractals, 2004, 22: 47-54.

DOI: 10.1016/j.chaos.2003.12.104

Google Scholar