Evaluating True Cryptographic Key Space Size

Author(s):  
Albert Carlson ◽  
Garret Gang ◽  
Torsten Gang ◽  
Bhaskar Ghosh ◽  
Indira Kalyan Dutta
2019 ◽  
Vol 62 (11) ◽  
pp. 4001-4014
Author(s):  
Melanie Weirich ◽  
Adrian Simpson

Purpose The study sets out to investigate inter- and intraspeaker variation in German infant-directed speech (IDS) and considers the potential impact that the factors gender, parental involvement, and speech material (read vs. spontaneous speech) may have. In addition, we analyze data from 3 time points prior to and after the birth of the child to examine potential changes in the features of IDS and, particularly also, of adult-directed speech (ADS). Here, the gender identity of a speaker is considered as an additional factor. Method IDS and ADS data from 34 participants (15 mothers, 19 fathers) is gathered by means of a reading and a picture description task. For IDS, 2 recordings were made when the baby was approximately 6 and 9 months old, respectively. For ADS, an additional recording was made before the baby was born. Phonetic analyses comprise mean fundamental frequency (f0), variation in f0, the 1st 2 formants measured in /i: ɛ a u:/, and the vowel space size. Moreover, social and behavioral data were gathered regarding parental involvement and gender identity. Results German IDS is characterized by an increase in mean f0, a larger variation in f0, vowel- and formant-specific differences, and a larger acoustic vowel space. No effect of gender or parental involvement was found. Also, the phonetic features of IDS were found in both spontaneous and read speech. Regarding ADS, changes in vowel space size in some of the fathers and in mean f0 in mothers were found. Conclusion Phonetic features of German IDS are robust with respect to the factors gender, parental involvement, speech material (read vs. spontaneous speech), and time. Some phonetic features of ADS changed within the child's first year depending on gender and parental involvement/gender identity. Thus, further research on IDS needs to address also potential changes in ADS.


Author(s):  
Aarushi Shrivastava ◽  
Janki Ballabh Sharma ◽  
Sunil Dutt Purohit

Objective: In the recent multimedia technology images play an integral role in communication. Here in this paper, we propose a new color image encryption method using FWT (Fractional Wavelet transform), double random phases and Arnold transform in HSV color domain. Methods: Firstly the image is changed into the HSV domain and the encoding is done using the FWT which is the combination of the fractional Fourier transform with wavelet transform and the two random phase masks are used in the double random phase encoding. In this one inverse DWT is taken at the end in order to obtain the encrypted image. To scramble the matrices the Arnold transform is used with different iterative values. The fractional order of FRFT, the wavelet family and the iterative numbers of Arnold transform are used as various secret keys in order to enhance the level of security of the proposed method. Results: The performance of the scheme is analyzed through its PSNR and SSIM values, key space, entropy, statistical analysis which demonstrates its effectiveness and feasibility of the proposed technique. Stimulation result verifies its robustness in comparison to nearby schemes. Conclusion: This method develops the better security, enlarged and sensitive key space with improved PSNR and SSIM. FWT reflecting time frequency information adds on to its flexibility with additional variables and making it more suitable for secure transmission.


Entropy ◽  
2019 ◽  
Vol 21 (7) ◽  
pp. 678 ◽  
Author(s):  
Yixuan Song ◽  
Fang Yuan ◽  
Yuxia Li

In this paper, a new voltage-controlled memristor is presented. The mathematical expression of this memristor has an absolute value term, so it is called an absolute voltage-controlled memristor. The proposed memristor is locally active, which is proved by its DC V–I (Voltage–Current) plot. A simple three-order Wien-bridge chaotic circuit without inductor is constructed on the basis of the presented memristor. The dynamical behaviors of the simple chaotic system are analyzed in this paper. The main properties of this system are coexisting attractors and multistability. Furthermore, an analog circuit of this chaotic system is realized by the Multisim software. The multistability of the proposed system can enlarge the key space in encryption, which makes the encryption effect better. Therefore, the proposed chaotic system can be used as a pseudo-random sequence generator to provide key sequences for digital encryption systems. Thus, the chaotic system is discretized and implemented by Digital Signal Processing (DSP) technology. The National Institute of Standards and Technology (NIST) test and Approximate Entropy analysis of the proposed chaotic system are conducted in this paper.


Mathematics ◽  
2021 ◽  
Vol 9 (15) ◽  
pp. 1821
Author(s):  
Lazaros Moysis ◽  
Karthikeyan Rajagopal ◽  
Aleksandra V. Tutueva ◽  
Christos Volos ◽  
Beteley Teka ◽  
...  

This work proposes a one-dimensional chaotic map with a simple structure and three parameters. The phase portraits, bifurcation diagrams, and Lyapunov exponent diagrams are first plotted to study the dynamical behavior of the map. It is seen that the map exhibits areas of constant chaos with respect to all parameters. This map is then applied to the problem of pseudo-random bit generation using a simple technique to generate four bits per iteration. It is shown that the algorithm passes all statistical NIST and ENT tests, as well as shows low correlation and an acceptable key space. The generated bitstream is applied to the problem of chaotic path planning, for an autonomous robot or generally an unmanned aerial vehicle (UAV) exploring a given 3D area. The aim is to ensure efficient area coverage, while also maintaining an unpredictable motion. Numerical simulations were performed to evaluate the performance of the path planning strategy, and it is shown that the coverage percentage converges exponentially to 100% as the number of iterations increases. The discrete motion is also adapted to a smooth one through the use of B-Spline curves.


Science ◽  
2007 ◽  
Vol 317 (5834) ◽  
pp. 38a-38a
Author(s):  
B. Cipra
Keyword(s):  

1987 ◽  
Vol 25 (3) ◽  
pp. 327-336 ◽  
Author(s):  
C. P. KOULAMAS ◽  
B. K. LAMBERT ◽  
M. L. SMITH

2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Mei Zhang ◽  
Danling Wang ◽  
Lequan Min ◽  
Xue Wang

Firstly, this study introduces a definition of generalized stability (GST) in discrete-time nonautonomous chaos system (DNCS), which is an extension for chaos generalized synchronization. Secondly, a constructive theorem of DNCS has been proposed. As an example, a GST DNCS is constructed based on a novel 4-dimensional discrete chaotic map. Numerical simulations show that the dynamic behaviors of this map have chaotic attractor characteristics. As one application, we design a chaotic pseudorandom number generator (CPRNG) based on the GST DNCS. We use the SP800-22 test suite to test the randomness of four 100-key streams consisting of 1,000,000 bits generated by the CPRNG, the RC4 algorithm, the ZUC algorithm, and a 6-dimensional CGS-based CPRNG, respectively. The numerical results show that the randomness performances of the two CPRNGs are promising. In addition, theoretically the key space of the CPRNG is larger than 21116. As another application, this study designs a stream avalanche encryption scheme (SAES) in RGB image encryption. The results show that the GST DNCS is able to generate the avalanche effects which are similar to those generated via ideal CPRNGs.


2016 ◽  
Vol 136 (9) ◽  
pp. 879-882 ◽  
Author(s):  
Taeko Ito ◽  
Tadashi Kitahara ◽  
Hiroshi Inui ◽  
Toshiteru Miyasaka ◽  
Kimihiko Kichikawa ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document