Perfect Secrecy System Based on Chaotic Key Generator

2018 ◽  
Vol 1 (2) ◽  
pp. 1-12 ◽  
Author(s):  
Mahmood Khalel Ibrahem

Shannon defines perfect secrecy for a cryptographic system as such a cryptographic system in which the ciphertext yields no possible information about the plaintext. Diffie and Hellman suggest computationally secure cryptographic systems even if the intercepted data contains sufficient information to allow a unique solution to the cryptographic problems. In this paper, we present the new idea to cipher data called a perfect secrecy and its implementation based on the chaotic maps for generating a one-time random key used to encrypt data. The output ciphertext has been examined and shows perfect random properties.

2017 ◽  
Vol 56 (3) ◽  
pp. 745-765 ◽  
Author(s):  
Derek J. Posselt ◽  
James Kessler ◽  
Gerald G. Mace

AbstractRetrievals of liquid cloud properties from remote sensing observations by necessity assume sufficient information is contained in the measurements, and in the prior knowledge of the cloudy state, to uniquely determine a solution. Bayesian algorithms produce a retrieval that consists of the joint probability distribution function (PDF) of cloud properties given the measurements and prior knowledge. The Bayesian posterior PDF provides the maximum likelihood estimate, the information content in specific measurements, the effect of observation and forward model uncertainties, and quantitative error estimates. It also provides a test of whether, and in which contexts, a set of observations is able to provide a unique solution. In this work, a Bayesian Markov chain Monte Carlo (MCMC) algorithm is used to sample the joint posterior PDF for retrieved cloud properties in shallow liquid clouds over the remote Southern Ocean. Combined active and passive observations from spaceborne W-band cloud radar and visible and near-infrared reflectance are used to retrieve the parameters of a gamma particle size distribution (PSD) for cloud droplets and drizzle. Combined active and passive measurements are able to distinguish between clouds with and without precipitation; however, unique retrieval of PSD properties requires specification of a scene-appropriate prior estimate. While much of the uncertainty in an unconstrained retrieval can be mitigated by use of information from 94-GHz passive brightness temperature measurements, simply increasing measurement accuracy does not render a unique solution. The results demonstrate the robustness of a Bayesian retrieval methodology and highlight the importance of an appropriately scene-consistent prior constraint in underdetermined remote sensing retrievals.


2019 ◽  
Vol 32 (2) ◽  
pp. 131 ◽  
Author(s):  
Intisar Abid Yousif

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block cipher algorithm


2014 ◽  
Vol 24 (04) ◽  
pp. 1450054 ◽  
Author(s):  
Hongjun Wang ◽  
Bingbing Song ◽  
Qiang Liu ◽  
Jing Pan ◽  
Qun Ding

FPGA technology, applied to the case of electronic system, needs to make full use of hardware resources, to achieve great efficiency and yield the largest returns. To apply digital chaotic sequence which consume least resource in encryption system, this paper seeks a tradeoff between logistic and skew tent discrete map aiming at hardware utilization through the method of testing critical precision. Critical precision (or delay) is firstly proposed to weigh the effect of different precision (or delay) on chaotic system according to the autocorrelation property of output sequences. In tests, a controlled variable approach is adopted. Firstly, build graphical module on DSP builder platform in Simulink library, and then transform that into VHDL hardware language running in Quartus II, in which way, considerable time is saved. The results show that: in respective critical precision, the logistic map allows higher hardware utilization and is suitable to lower resource implementation. Meanwhile, compared with skew tent map in the same precision, the autocorrelation, run and balance properties of logistic map are all more superior. Therefore, a logistic map is selected as a key generator in hardware cryptographic system.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Data is big, data is diverse, data comes in zillion formats, it is important to ensure the safety and security of the shared data. With existing systems limited and evolving, the objective of the current research work is to develop a robust Image Encryption technique that is adept and effective at handling heterogeneous data and can withstand state-of-the-art hacking efforts such as brute force attacks, cropping attacks, mathematical attacks, and differential attacks. The proposed Efficient DNA Cryptographic System (EDCS) model presents a pseudorandom substitution method using logistic sine cosine chaotic maps, wherein there is very little correlation between adjacent pixels, and it can decode the image with or without noise, thereby making the proposed system noise-agnostic. The proposed EDCS-based Image model using Chaotic Maps showed enhancements in parameters such as Unified Average Changing Intensity (UACI), Number of Pixels Change Rate (NPCR), Histogram, and Entropy when compared with existing image security methods.


2007 ◽  
Vol 30 (4) ◽  
pp. 77
Author(s):  
Derek Cool ◽  
Shi Sherebrin ◽  
Jonathan Izawa ◽  
Joseph Chin ◽  
Aaron Fenster

Introduction: Transrectal ultrasound (TRUS) prostate biopsy (Bx) is currently confined to 2D information to both target and record 3D Bx locations. Accurate placement of Bx needles cannot be verified without 3D information, and recording Bx sites in 2D does not provide sufficient information to accurately guide the high incidence of repeat Bx. We have designed a 3D TRUS prostate Bx system that augments the current 2D TRUS system and provides tools for biopsy-planning, needle guidance, and recording of the biopsy core locations entirely in 3D. Methods: Our Bx system displays a 3D model of the patient’s prostate, which is generated intra-procedure from a collection of 2D TRUS images, representative of the particular prostate shape. Bx targets are selected, needle guidance is facilitated, and 3D Bx sites are recorded within the 3D context of the prostate model. The complete 3D Bx system was validated, in vitro, by performing standard ten-core Bx on anatomical phantoms of two patient’s prostates. The accuracy of the needle-guidance, Bx location recording, and 3D model volume and surface topology were validated against a CT gold standard. Results: The Bx system successfully reconstructed the 3D patient prostate models with a mean volume error of 3.2 ± 7.6%. Using the 3D system, needles were accurately guided to the pre-determined targets with a mean error of 2.26 ± 1.03 mm and the 3D locations of the Bx cores were accurately recorded with a mean distance error of 1.47 ± 0.79 mm. Conclusion: We have successfully developed a 3D TRUS prostate biopsy system and validated the system in vitro. A pilot study has been initiated to apply the system clinically.


Author(s):  
Erin Wiringi ◽  
Ralph Youngen ◽  
Lisa Janicke Hinchliffe
Keyword(s):  

2020 ◽  
Vol 1 (2) ◽  
pp. 162
Author(s):  
Muhammad Iqbal

<strong>Abstrak: </strong>Studi ini membahas perspektif Syiah Imamiyah tentang dimensi tauhid. Dengan pendekatan tafsir al-Qur’an, tulisan ini mengungkapkan temuan bahwa Al-Qur’an sebagai pedoman bagi umat manusia memuat ayat-ayat tauhid yang merupakan asas dan dasar kajian Islam. Ayat-ayat ini diklasifikasi oleh ulama Syiah ke dalam dua kelompok. Kelompok pertama, ayat-ayat yang memuat tentang tauhid teoretis; pemikiran konsep serta pemahaman yang mentauhidkan Allah swt. baik dalam hal zat, sifat maupun perbuatan-Nya. Kelompok kedua adalah ayat-ayat yang mengulas tentang tauhid praktis atau yang disebut dengan tindakan atau amal yang berlandaskan tauhid teoretis. Pada gilirannya baik tauhid teoretis maupun tauhid praktis memiliki cabang dan variannya masing-masing.<br /><br /><strong>Kata Kunci</strong><strong>:</strong><strong> </strong>Syiah Imamiyah, tauhid, al-Qur’an<br /> <br /><strong>Abstract: Shia Imamiyah Perspective on Theology</strong>. This study examines the Shiite Imamiyah school of thought on the dimension of monotheism in the Qur’an. This study is a literature study where the works of Shiite scholars are analyzed by content analysis methods. This study is hoped to become as sufficient information about monotheism according to the Shiah school as explained by scholars of Shi’ism. This study proposes that there are two dimensions of monotheism in the Shia school, namely theoretical monotheism and practical dimensions. The theoretical dimension of monotheism constitutes three categories which include first, substance monotheism, second monotheism of character, and third, monotheism of action. In addition, the practical dimension in monotheism is divided into three namely monotheism in worship (<em>taw<span style="text-decoration: underline;">h</span>îd</em> ‘<em>ibâdah</em>), monotheism in obedience and observance, and monotheism in acquiring comfort and assistance.<br /> <br /><strong>Keywords:</strong> Shia Imamiyah, theology, Qur’an<strong></strong>


2017 ◽  
pp. 106
Author(s):  
Dhaher Abass Redha ◽  
Marwa Mohamed ali Mohsen
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document