A FRACTAL ENCRYPTION ALGORITHM

Slides:



Advertisements
Similar presentations
This algorithm is used for dimension reduction. Input: a set of vectors {Xn є }, and dimension d,d
Advertisements

CAP Cryptographic Analysis Program
1 Design of Key-Sharing System Based on a Unique Device Kenji Imamoto (Kyushu Univ.) Hiromi Fukaya (Pastel) Kouichi Sakurai (Kyushu Univ.)
Fractals Part 1: In which we attempt to describe what a fractal is, because people will ask (but perhaps they will not really want to know the answer).
7. Asymmetric encryption-
Jochen Triesch, UC San Diego, 1 Rendering of the Mandelbrot set: perhaps the most famous fractal Fractals.
Numbers
Chapter 9: Recursive Methods and Fractals E. Angel and D. Shreiner: Interactive Computer Graphics 6E © Addison-Wesley Mohan Sridharan Based on Slides.
Fractals Ed Angel Professor of Computer Science, Electrical and Computer Engineering, and Media Arts Director, Arts Technology Center University of New.
The infinitely complex… Fractals Jennifer Chubb Dean’s Seminar November 14, 2006 Sides available at
Ref: STAL03More Concepts of Cryptography and Cryptanalysis 1 Reference –William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall.
CS4395: Computer Graphics 1 Fractals Mohan Sridharan Based on slides created by Edward Angel.
Remarks on Voting using Cryptography Ronald L. Rivest MIT Laboratory for Computer Science.
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
ADDIE Model UbD Unit Math II Statistics By Phyllis Freeman.
Fractals. Similar Figures Same shape Corresponding angles are congruent Corresponding sides are proportional.
The Chaos Game.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Chapter 20 Symmetric Encryption and Message Confidentiality.
How many of you like Math? Do you think it is scary? Well, for most part it is not scary! ?
Improving Encryption Algorithms Betty Huang Computer Systems Lab
RSA Prepared by: SITI ZAINAH ADNAN
AVALANCHE EFFECT IN THE FAMILY OF BLOCK CIPHERS “SD-(n,k)” University “Ss Cyril and Methodius” – Skopje, RM S. Markovski, PhD A. Mileva, MSc D. Gligoroski,
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Key Exchange Methods Diffie-Hellman and RSA CPE 701 Research Case Study Derek Eiler | April 2012.
Mathematics Numbers: Percentages Science and Mathematics Education Research Group Supported by UBC Teaching and Learning Enhancement Fund Department.
Fractional Dimensions, Strange Attractors & Chaos
{ Fractals, iterations and the Sierpinski Triangle an iterative approach Central Arizona College Science Night at San Tan Campus.
1/9 최신정보보호기술 경일대학교 사이버보안학과 김 현성. 읽기 단계 (1) 문장 분석  주어, 동사  구, 절, 관계사, and or  모르는 단어 찾기 (2) 의미 파악  문맥의 흐름에 맞는 단어의 의미 찾기 (3) 문맥 연계  앞뒷 문장과 연계한 문장의.
Homework #1 J. H. Wang Oct. 2, 2013.
CSE 423 Computer Graphics | MUSHFIQUR ROUF CSE423:
Fractals Ed Angel Professor Emeritus of Computer Science
 Introduction  Definition of a fractal  Special fractals: * The Mandelbrot set * The Koch snowflake * Sierpiński triangle  Fractals in nature  Conclusion.
Vigenère Tableau Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Fractals What are fractals? Who is Benoit Mandlebrot? How can you recognize a fractal pattern? Who is Waclaw Sierpinski?
Simplified DES.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Calculating Fractal Dimension from Vector Images Kelly Ran.
Development of a Fractal Dimension Calculator Kelly Ran.
Fractals.
A Primer on Chaos and Fractals Bruce Kessler Western Kentucky University as a prelude to Arcadia at Lipscomb University.
10-1 人生与责任 淮安工业园区实验学校 连芳芳 “ 自我介绍 ” “ 自我介绍 ” 儿童时期的我.
Homework #1 J. H. Wang Oct. 9, 2012.
12-1A Fractals What are fractals? Who is Benoit Mandlebrot?
Cesar & Vigenere Encryption
Geometry Creating Line Equations Part 1
CAP Cryptographic Analysis Program
Information and Computer Security CPIS 312 Lab 2
Fractal geometry.
Yahoo Mail Customer Support Number
Most Effective Techniques to Park your Manual Transmission Car
How do Power Car Windows Ensure Occupants Safety
Equation Review Given in class 10/4/13.
THANK YOU!.
Thank you.
Thank you.
Equation Review.
Practice Geometry Practice
X ⦁ X = 64 ±8 ±14 X ⦁ X ⦁ X =
How to Use Charm Crypto Lib
Presentation transcript:

A FRACTAL ENCRYPTION ALGORITHM PENG Hai, GUO Qing-ping 1,2 Computer Processing & Distributing Laboratory, Wuhan University of Technology

the Mandlebrot Set Fractal The Fractal geometry was set up by Mandelbrot at 1973. Here it is the famous Mandlbrot Set Fractal which generate by the follow Mandlbrot Set Equation. Zk+1 = Zk2 + C (Z0 = 0)

Famous Fractals The Sierpinski triangle The Sierpinski carpet

Fractal Dimension Dimension: m - edges numbers s - sub-triangles numbers Dimension: n=1 n=2 n=3 n=4

Procedure of Eryption key: 0000 0011 0001 plaintext: 011001110 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

Procedure of Eryption key: 0000 0011 0001 plaintext: 011001110 ciphertext: 011101010 1 1 1 1 1 1 1 1 1 1 1 1

How to implement? 1 ^ 1 1 100 010 111 1 1 1 1

How to implement? 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 110 101 100 001 011 100 100 001 110 1 1 1 1 1 1 1 1 1 1 1 1 1

How to implement? 1 1 1 1 1 1 1 1 1 … … … … … … … … 1

Some Extension 1 Change the data inputing order 2 Change location key: 0000 0011 key: 0001 0000 0011 111010010 plaintext: 100010111 plaintext: 100010111 00101011 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

Thank you!