Cryptography Chaos Theory

Authors:
Bulai Rodica, Technical University of Moldova, Faculty of Computers, Informatics and Microelectronics
Victor Fanari, Technical University of Moldova, Faculty of Computers, Informatics and Microelectronics

Abstract:

The development of information society, which has led to an impressive increase in the volume of information, mainly economic, circulated in computer networks, accelerated the development and mostly the use of modern cryptography tools. In the last years, researchers have pointed out that there is a possible similarity between chaos and cryptography, many of the properties of chaotic dynamic systems having correlation among the cryptographic systems that are based on computational methods. Studies carried out on chaotic dynamic systems usage in digital crypto-systems have determined the occurrence of similar to classic techniques, but also of some specific techniques and methods that have been analyzed and evaluated. The attempts to develop new encryption аlgorithms based on chaos theory have evolved gradually from simple solutions, which suppose the iteration of a dinаmic system to obtain binary sequence used for text masking, to methods that imply coupled dinаmic systems and hybrid techniques that would combine the chaos advantages with classical methods. In this article there are presented 3 encryption algorithms based on chaos theory: RC4, Fractal Encryption and Cellular Automata, implemented in a system of encryption and operation mode analysis for each algorithm separately.

References:

[1] MOGOLLON, M., Cryptography and Security Services: Mechanisms and Applications, New York, Cybertech Publishing, 2008, 26-27. [2] KONHEIM, A. G., Computer Security and Cryptography, John Wiley & Sons, Inc., 2007, 99, 350. [3] МАО, В., Современная криптография (теория и практика), М.: Вильямс, 2005. [4] BREDIN, S., Chaos theory and Cryptography, https://docs.google.com/viewer?a=v&pid= sites&srcid=ZGVmYXVsdGRvbWFpbnxicmVkaW5jcnlwdG8yfGd4OmRkZmRlOWVhNmFkMThjYg [5] GUPTA, S. S., Analysis and Implementation of RC4 Stream Cipher, Indian Statistical Institute, India, 2013. [6] WOLFRAM, S., Cryptography with Cellular Automata, http://www.stephenwolfram.com/ publications/academic/cryptography-cellular-automata.pdf [7] HENRIQUES, M. A. A., New Possibilities for Cellular Automata in Cryptography, http://www.criptored.upm.es/cibsi/cibsi2011/info/Ponencias/5.%20New%20Possibilities%20for%20Cellular%20Automata%20in%20Cryptography.pdf [8] AL-AKAIDI, M., Fractal Speech Processing, http://assets.cambridge.org/97805218/ 14584/frontmatter/9780521814584_frontmatter.pdf [9] Fractal-Based Encryption, http://www.techbriefs.com/component/content/article/ntb/tech-briefs/photonics/2579 [10] GUPTA S., BANSAL, N., Image Encryption Techniques using Fractal Geometry, http://www.iosrjournals.org/iosr-jce/papers/Vol16-issue5/Version-1/F016513135.pdf

Publication:

Central and Eastern European e|Dem and e|Gov Days 2018

Including a Workshop on Smart Cities organized by the Congress of Local and Regional Authorities of the Council of Europe
Proceedings of the Central and Eastern European E|Dem and E|Gov Days, May 3-4, 2018, Budapest
Facultas, 1. Ed. (14 May 2018), 506 p.
ISBN-10: 9783708917375,
ISBN-13: 978-3708917375,
ASIN: 3708917375506

Editors: Hendrik Hansen, Robert Müller-Török, András Nemeslaki, Alexander Prosser, Dona Scola, Tamás Szádeczky