1 Chaotic Generator in Digital Secure Communication 張 書 銘 交通大學應用數學系 2008 年 12 月 20 日.

Slides:



Advertisements
Similar presentations
On an Improved Chaos Shift Keying Communication Scheme Timothy J. Wren & Tai C. Yang.
Advertisements

國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Two IFEA-M Modifications to Withstand New Attack Alexander G. Chefranov Computer Engineering Department Eastern Mediterranean University.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
CIS 5371 Cryptography 3b. Pseudorandomness.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
Dynamical Systems and Chaos CAS Spring Introduction to Dynamical Systems Basic Concepts of Dynamics A dynamical system: –Has a notion of state,
Amir massoud Farahmand
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Practical Techniques for Searches on Encrypted Data Author:Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀汶承.
Chaos Control (Part III) Amir massoud Farahmand Advisor: Caro Lucas.
ASYMMETRIC CIPHERS.
Hybrid Cipher encryption Plain Text Key Cipher Text Key Plain Text IV Hybrid Cipher decryption Hybrid Cipher Note: IV used in encryption is not used in.
Public Key Model 8. Cryptography part 2.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
“Multiscroll Chaotic Oscillators Design in 1D, 2D 3D: Analysis, Theory and Applications” By: Dr. Carlos Sánchez-López Autonomous University of Tlaxcala,
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Strange Attractors From Art to Science J. C. Sprott Department of Physics University of Wisconsin - Madison Presented to the Society for chaos theory in.
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme Chengqing Li a, Shujun Li b, Dan Zhang a and Guanrong Chen b a Zhejiang University,
CHAOS BASED ENCRYPTION NEIL PARMAR DEPARTMENT OF COMPUTER SCIENCE.
Darci Miyashiro Math 480 April 29, 2013
1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV
UNIVERSITY OF MONTENEGRO ELECTRICAL ENGINEERING DEPARTMENT Igor DJUROVIĆ Vesna RUBEŽIĆ Time-Frequency Representations in Detection of Chaotic State in.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
PRBG Based on Couple Chaotic Systems & its Applications in Stream- Cipher Cryptography Li Shujun, Mou Xuanqin, Cai Yuanlong School of Electronics & Information.
Chaos Theory MS Electrical Engineering Department of Engineering
1 Effect of Asymmetry on Blow-Out Bifurcations in Coupled Chaotic Systems  System Coupled 1D Maps: Invariant Synchronization Line: y = x  =0: Symmetrical.
Low-Dimensional Chaotic Signal Characterization Using Approximate Entropy Soundararajan Ezekiel Matthew Lang Computer Science Department Indiana University.
Synchronization in complex network topologies
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security,
Elliptic Curve Cryptography
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Novel Cascaded Chaotic Masking for Secure Communications
Cryptography Readings Encryption, Decryption, & Digital Certificates.
Your Wireless Network has No Clothes* William A. Arbaugh, Narendar Shankar Y.C. Justin Wan University of Maryland Presentation by Eddy Purnomo,
Amir massoud Farahmand
Control and Synchronization of Chaos Li-Qun Chen Department of Mechanics, Shanghai University Shanghai Institute of Applied Mathematics and Mechanics Shanghai.
CS555Spring 2012/Topic 71 Cryptography CS 555 Topic 7: Stream Ciphers and CPA Security.
1 Quasiperiodic Dynamics in Coupled Period-Doubling Systems Sang-Yoon Kim Department of Physics Kangwon National University Korea Nonlinear Systems with.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Network Security Celia Li Computer Science and Engineering York University.
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
NATO ARW, 6-9 October, 2008, Veliko Tarnovo, Bulgaria Error Correcting Cryptcodes Based on Quasigroups SMILE MARKOVSKI “Ss Cyril and Methodius” University.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
 Plain Text : The original message (text, image,video,… etc.  Cipher Key : Encryption works by running the data (represented as numbers) through a special.
L’Aquila 1 of 26 “Chance or Chaos?” Climate 2005, PIK, Jan 2005 Gabriele Curci, University of L’Aquila
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography & Pseudo-Random Coding Li ShujunLi Shujun 1, Li Qi 2, Li.
10.Deterministic Randomness 1.Random Sequences Random Sequences A sequence of numbers r 1, r 2,... is random if there are no discernible patterns.
Homework #1 J. H. Wang Oct. 9, 2012.
Chaos Control (Part III)
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
ATM using fingerprint
Cryptography and Security Fall 2009 Steve Lai
Chaos in Cryptography What is Chaos in Cryptography Chaos Functions
Lattices. Svp & cvp. lll algorithm. application in cryptography
Install AD Certificate Services
A new chaotic algorithm for image encryption
2. Perfect Secret Encryption
Privacy Protection for E-Health Systems by
Localizing the Chaotic Strange Attractors of Multiparameter Nonlinear Dynamical Systems using Competitive Modes A Literary Analysis.
Reversible data hiding in encrypted binary images by pixel prediction
CIS 5371 Cryptography 2. Perfect Secret Encryption
Presentation transcript:

1 Chaotic Generator in Digital Secure Communication 張 書 銘 交通大學應用數學系 2008 年 12 月 20 日

2  Chaos  Secure Communication  Chaotic Generator  Conclusions Outline

3 Chaos Chaos is “ mess, disorder, uncontrollable ! ? Smoke of Cigarette Mike in coffee

4 Lorenz strange attractor

5 Three planar charged particles

6

7

8 Henon map

9 Discrete predator-prey map

10 Logistic map

11 Secure Communication

12 Digital secure communication TransmitterReceiver Source Digital Data Chaotic Encryption Unit Acquire Digital Data Ciphertext Plaintext Encryption Decryption Chaotic Decryption Unit

13 Applications - 1 CommunicationInformation EntertainmentTransaction

14 Applications - 2

15 Chaotic Generator

16 Logistic map

17 Modified Logistic map

18 Properties of MLM Chaotic map No windows Uniform distribution Equivalent Pseudorandom

19 MLM: chaotic map

20 MLM: no windows

21 MLM: no windows

22 MLM: uniform distribution r = 5.9

23 MLM: uniform distribution r = 10.8

24 MLM: equivalent

25 MLM: equivalent

26 MLM: pseudorandom

27 MLM: pseudorandom

28 Conclusions Propose Modified Logistic Map (MLM) Show that MLM is a chaotic map (Devaney's definition) No windows Uniform distribution, equivalent Pseudorandom

29 Thank you for your attention!

30 Random vs. Chaos Identity : 1. Continuous Spectrum 2. Correlation Function : Random numbers: Chaotic signals:

31 Random vs. Chaos Observable : Temporal Average for (1): Perturbation : Temporal Average for (2): 3. Stability :

32 Random vs. Chaos Distinction :

33 Further Based on MLMs, we establish Modified Logistic Hyper-Chaotic System (MLHCS) Apply MLHCS to develop a symmetric cryptography algorithm Asymptotic Synchronization of Modified Logistic Hyper-Chaotic System (ASMLHCS)

34 Digital secure communication TransmitterReceiver Source Digital Data MLHCS Encryption Unit Acquire Digital Data Ciphertext Plaintext Encryption Decryption ASMLHCS Decryption Unit

35 S. M. Chang, M. C. Li and W. W. Lin, Asymptotic synchronization of modified logistic hyper-chaotic systems and its applications. Nonlinear Analysis: Real World Applications, Vol. 10, Issue 2 (2009), pp. 869–880. S. M. Chang, T. C. Lin and W. W. Lin, Chaotic and Quasiperiodic Motions of Three Planar Charged Particles. Int. J. Bifurcation Chaos, Vol. 11, No. 7 (2001), pp. 1937–1951. S. L. Chen, S. M. Chang, T. T. Hwang and W. W. Lin, Digital secure-communication using robust hyper-chaotic systems. Int. J. Bifurcation Chaos, Vol. 18, No. 11 (2008), pp. 1–14. References