scholarly journals Key Generation based on Henon map and Lorenz system

2020 ◽  
Vol 31 (1) ◽  
pp. 41
Author(s):  
Ansam Sabah Bader ◽  
Shaymaa Hameed ◽  
Maisa’a Abid Ali K.

Securing information has been the most significant process for communication and data store. Orderly to secure information such as data authentication,  data integrity, and confidentiality must be verified based on algorithms of cryptography. Where, the most important part of any encryption algorithms is the key which specifies if the system is strong enough or not. The proposal of this paper is a new method to generate keys based on two kinds of chaos theory in order to improve the security of cryptographic algorithms. The base of this proposal is to investigate a new method for generating random numbers by using the 3D Lorenz system and 2D Henon map. The newly generated keys have successfully passed the National Institute of Standards and Technology (NIST) statistical test suite

2014 ◽  
Vol 651-653 ◽  
pp. 2164-2167
Author(s):  
Hang Zhang ◽  
Xiao Jun Tong

Many methods of constructing S-box often adopt the classical chaotic equations. Yet study found that some of the chaotic equations exists drawbacks. Based on that, this paper proposed a new method to generate S-Box by improving the Logistic map and Henon map, and combining the real and imaginary part of complex produced by the Mandelbrot set. By comparing with several other S-boxes proposed previously, the results show the S-box here has better cryptographic properties. So it has a good application prospect in block ciphers.


2012 ◽  
Vol 580 ◽  
pp. 432-436
Author(s):  
Peng Yao ◽  
Wei Zhang

The procedure resolves the insertion of new mesh point, the searching of the image (or pre-image) and computation of the 1D sub-manifolds following the new mesh point tactfully, it does not require the 1D sub-manifolds to be computed from the initial circle and avoids the assembling of mesh points. The performance of the algorithm is demonstrated with hyper chaotic 3D Hénon map and Lorenz system.


Author(s):  
Liping Chen ◽  
Yin Hao ◽  
Liguo Yuan ◽  
J.A. Tenreiro Machado ◽  
Ranchao Wu ◽  
...  

Author(s):  
Leandro Arosio ◽  
Luka Boc Thaler ◽  
Han Peters
Keyword(s):  

1996 ◽  
Vol 54 (6) ◽  
pp. 6201-6206 ◽  
Author(s):  
Michael E. Brandt ◽  
Ahmet Ademoǧlu ◽  
Dejian Lai ◽  
Guanrong Chen

Webology ◽  
2021 ◽  
Vol 18 (05) ◽  
pp. 1158-1167
Author(s):  
Jagadeesan S ◽  
Mani C ◽  
Sambasivam S ◽  
Jaisankar P ◽  
Sasikala S

In the brand new technology of cutting-edge technological know-how and era is advanced day via way of means of day. The information confidentiality is danger everywhere in the global and it will increase rapidly. Steganography and cryptography are very vital strategies applied in facts safety to cowl and steady mystery messages in transmitting facts. In this we launch, put in force and check a completely sole technique that can be used as a steady and extraordinarily budget friendly technique {of facts|of knowledge|} interest in addition to information extracting (Jagadeesan, S., 2020). Some efficiency parameters are going to be thru an test received and in comparison with opportunity current approaches parameters to show the efficiency of the deliberate technique. Here we proposes a brand new method to hiding the information the use of steganography strategies primarily based totally on AES and RC5 set of rules cryptosystem. The word Steganography is the splendor of hiding mystery information in the back of the photos, videos, sound and textual content to cowl the name of the game communication. Cryptosystem is the system which given our technique extra perfection. The visible first-class of the quilt photo certainly nice, nobody can consider it how personal information are transmitted the use of this technique. This suggest technique and set of rules ability is exceedingly bendy than different posted set of rules. The AES and RC5 set of rules has no more difficulty and it looks as if thoroughly to hiding the personal information.


2018 ◽  
Vol 27 (2018) ◽  
pp. 73-78
Author(s):  
Dumitru Deleanu

The predictive control method is one of the proposed techniques based on the location and stabilization of the unstable periodic orbits (UPOs) embedded in the strange attractor of a nonlinear mapping. It assumes the addition of a small control term to the uncontrolled state of the discrete system. This term depends on the predictive state ps + 1 and p(s + 1) + 1 iterations forward, where s is the length of the UPO, and p is a large enough nonnegative integer. In this paper, extensive numerical simulations on the Henon map are carried out to confirm the ability of the predictive control to detect and stabilize all the UPOs up to a maximum length of the period. The role played by each involved parameter is investigated and additional results to those reported in the literature are presented.


Sign in / Sign up

Export Citation Format

Share Document