Construction of Non-linear Component of Block Cipher by Means of Chaotic Dynamical System and Symmetric Group

2020 ◽  
Vol 112 (1) ◽  
pp. 467-480 ◽  
Author(s):  
Adnan Javeed ◽  
Tariq Shah ◽  
Atta Ullah
2014 ◽  
Vol 24 (06) ◽  
pp. 1450077 ◽  
Author(s):  
Matthew A. Morena ◽  
Kevin M. Short

We report on the tendency of chaotic systems to be controlled onto their unstable periodic orbits in such a way that these orbits are stabilized. The resulting orbits are known as cupolets and collectively provide a rich source of qualitative information on the associated chaotic dynamical system. We show that pairs of interacting cupolets may be induced into a state of mutually sustained stabilization that requires no external intervention in order to be maintained and is thus considered bound or entangled. A number of properties of this sort of entanglement are discussed. For instance, should the interaction be disturbed, then the chaotic entanglement would be broken. Based on certain properties of chaotic systems and on examples which we present, there is further potential for chaotic entanglement to be naturally occurring. A discussion of this and of the implications of chaotic entanglement in future research investigations is also presented.


Author(s):  
Roberto De Luca ◽  
Orazio Faella

The dynamics of an ideal fluid contained in two communicating vessels is studied. Despite the fact that the static properties of this system have been known since antiquity, the knowledge of the dynamical properties of an ideal fluid flowing in two communicating vessels is not similarly widespread. By means of Bernoulli's equation for non-stationary fluid flow, we study the oscillatory motion of the fluid when dissipation can be neglected.


2011 ◽  
Vol 21 (12) ◽  
pp. 3619-3626 ◽  
Author(s):  
ALBERTO CARRASSI ◽  
STÉPHANE VANNITSEM

In this paper, a method to account for model error due to unresolved scales in sequential data assimilation, is proposed. An equation for the model error covariance required in the extended Kalman filter update is derived along with an approximation suitable for application with large scale dynamics typical in environmental modeling. This approach is tested in the context of a low order chaotic dynamical system. The results show that the filter skill is significantly improved by implementing the proposed scheme for the treatment of the unresolved scales.


Population ◽  
1992 ◽  
Vol 47 (5) ◽  
pp. 1320
Author(s):  
J.-M. Z. ◽  
Tong Howell

1970 ◽  
Vol 7 (3) ◽  
pp. 544-564 ◽  
Author(s):  
Niels G. Becker

To explain the growth of interacting populations, non-linear models need to be proposed and it is this non-linearity which proves to be most awkward in attempts at solving the resulting differential equations. A model with a particular non-linear component, initially proposed by Weiss (1965) for the spread of a carrier-borne epidemic, was solved completely by different methods by Dietz (1966) and Downton (1967). Immigration parameters were added to the model of Weiss and the resulting model was made the subject of a paper by Dietz and Downton (1968). It is the aim here to further generalize the model by introducing birth and death parameters so that the result is a linear birth and death process with immigration for each population plus the non-linear interaction component.


3D Research ◽  
2015 ◽  
Vol 6 (1) ◽  
Author(s):  
Iqtadar Hussain ◽  
Muhammad Asif Gondal ◽  
Azkar Hussain

2018 ◽  
Vol 12 (4) ◽  
pp. 241-259
Author(s):  
Avik Chakraborti ◽  
Nilanjan Datta ◽  
Mridul Nandi

Abstract A block is an n-bit string, and a (possibly keyed) block-function is a non-linear mapping that maps one block to another, e.g., a block-cipher. In this paper, we consider various symmetric key primitives with {\ell} block inputs and raise the following question: what is the minimum number of block-function invocations required for a mode to be secure? We begin with encryption modes that generate {\ell^{\prime}} block outputs and show that at least {(\ell+\ell^{\prime}-1)} block-function invocations are necessary to achieve the PRF security. In presence of a nonce, the requirement of block-functions reduces to {\ell^{\prime}} blocks only. If {\ell=\ell^{\prime}} , in order to achieve SPRP security, the mode requires at least {2\ell} many block-function invocations. We next consider length preserving r-block (called chunk) online encryption modes and show that, to achieve online PRP security, each chunk should have at least {2r-1} many and overall at least {2r\ell-1} many block-functions for {\ell} many chunks. Moreover, we show that it can achieve online SPRP security if each chunk contains at least {2r} non-linear block-functions. We next analyze affine MAC modes and show that an integrity-secure affine MAC mode requires at least {\ell} many block-function invocations to process an {\ell} block message. Finally, we consider affine mode authenticated encryption and show that in order to achieve INT-RUP security or integrity security under a nonce-misuse scenario, either (i) the number of non-linear block-functions required to generate the ciphertext is more than {\ell} or (ii) the number of extra non-linear block-functions required to generate the tag depends on {\ell} .


Sign in / Sign up

Export Citation Format

Share Document